instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2023-6033.
CVE ID: CVE-2023-6033 Date Updated: 2024-09-18T04:08:25.191Z Date Published: 2023-12-01T07:01:38.124Z Description: Improper neutralization of input in Jira integration configuration in GitLab CE/EE, affecting all versions from 15.10 prior to 16.6.1, 16.5 prior to 16.5.3, and 16.4 prior to 16.4.3 allows attacker to execute javascript in victim's browser. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab/-/issues/431201 - https://hackerone.com/reports/2236039 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-25055.
CVE ID: CVE-2018-25055 Date Updated: 2024-08-05T12:26:39.671Z Date Published: 2022-12-28T11:26:20.808Z Description: A vulnerability was found in FarCry Solr Pro Plugin up to 1.5.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file packages/forms/solrProSearch.cfc of the component Search Handler. The manipulation of the argument suggestion leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is b8f3d61511c9b02b781ec442bfb803cbff8e08d5. It is recommended to upgrade the affected component. The identifier VDB-216961 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.216961 - https://vuldb.com/?ctiid.216961 - https://github.com/jeffcoughlin/farcrysolrpro/issues/78 - https://github.com/jeffcoughlin/farcrysolrpro/commit/b8f3d61511c9b02b781ec442bfb803cbff8e08d5 - https://github.com/jeffcoughlin/farcrysolrpro/releases/tag/1.6.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-47147.
CVE ID: CVE-2023-47147 Date Updated: 2024-08-02T21:01:22.807Z Date Published: 2024-03-15T15:09:59.091Z Description: IBM Sterling Secure Proxy 6.0.3 and 6.1.0 could allow an attacker to overwrite a log message under specific conditions. IBM X-Force ID: 270598. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7142038 - https://exchange.xforce.ibmcloud.com/vulnerabilities/270598 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18236.
CVE ID: CVE-2019-18236 Date Updated: 2024-08-05T01:47:14.075Z Date Published: 2019-12-23T19:23:04 Description: Multiple buffer overflow vulnerabilities exist when the PLC Editor Version 1.3.5_20190129 processes project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.us-cert.gov/ics/advisories/icsa-19-353-03 - https://www.zerodayinitiative.com/advisories/ZDI-19-1033/ - https://www.zerodayinitiative.com/advisories/ZDI-19-1034/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-37787.
CVE ID: CVE-2022-37787 Date Updated: 2024-08-03T10:37:41.967Z Date Published: 2023-01-01T00:00:00 Description: An issue was discovered in WeCube platform 3.2.2. A DOM XSS vulnerability has been found on the plugin database execution page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/WeBankPartners/wecube-platform - https://github.com/WeBankPartners/wecube-platform/issues/2328 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2488.
CVE ID: CVE-2024-2488 Date Updated: 2024-08-21T15:21:16.841Z Date Published: 2024-03-15T09:00:08.823Z Description: A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critical. This issue affects the function formSetPPTPServer of the file /goform/SetPptpServerCfg. The manipulation of the argument startIP leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256895. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.256895 - https://vuldb.com/?ctiid.256895 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetPPTPServer.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18852.
CVE ID: CVE-2019-18852 Date Updated: 2024-08-05T02:02:39.803Z Date Published: 2019-11-11T13:42:47 Description: Certain D-Link devices have a hardcoded Alphanetworks user account with TELNET access because of /etc/config/image_sign or /etc/alpha_config/image_sign. This affects DIR-600 B1 V2.01 for WW, DIR-890L A1 v1.03, DIR-615 J1 v100 (for DCN), DIR-645 A1 v1.03, DIR-815 A1 v1.01, DIR-823 A1 v1.01, and DIR-842 C1 v3.00. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ChandlerChin/Dlink_vuls/blob/master/A%20hard%20coded%20telnet%20user%20was%20discovered%20in%20multiple%20Dlink%20routers.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-51840.
CVE ID: CVE-2023-51840 Date Updated: 2024-08-02T22:48:11.863Z Date Published: 2024-01-29T00:00:00 Description: DoraCMS 2.1.8 is vulnerable to Use of Hard-coded Cryptographic Key. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/doramart/DoraCMS/issues/262 - https://github.com/doramart/DoraCMS - https://github.com/tianjk99/Cryptographic-Misuses/blob/main/CVE-2023-51840.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1190
The MITRE ATT&CK technique T1190: Exploit Public-Facing Application is related to the vulnerability CVE-CVE-2020-5345. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact.
Provide detailed information about CVE-2024-26966.
CVE ID: CVE-2024-26966 Date Updated: 2024-09-11T17:33:47.058Z Date Published: 2024-05-01T05:19:36.656Z Description: In the Linux kernel, the following vulnerability has been resolved: clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays The frequency table arrays are supposed to be terminated with an empty element. Add such entry to the end of the arrays where it is missing in order to avoid possible out-of-bound access when the table is traversed by functions like qcom_find_freq() or qcom_find_freq_floor(). Only compile tested. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/5533686e99b04994d7c4877dc0e4282adc9444a2 - https://git.kernel.org/stable/c/b2dfb216f32627c2f6a8041f2d9d56d102ab87c0 - https://git.kernel.org/stable/c/a09aecb6cb482de88301c43bf00a6c8726c4d34f - https://git.kernel.org/stable/c/3aedcf3755c74dafc187eb76acb04e3e6348b1a9 - https://git.kernel.org/stable/c/185de0b7cdeaad8b89ebd4c8a258ff2f21adba99 - https://git.kernel.org/stable/c/9b4c4546dd61950e80ffdca1bf6925f42b665b03 - https://git.kernel.org/stable/c/7e5432401536117c316d7f3b21d46b64c1514f38 - https://git.kernel.org/stable/c/5638330150db2cc30b53eed04e481062faa3ece8 - https://git.kernel.org/stable/c/a903cfd38d8dee7e754fb89fd1bebed99e28003d - https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30937.
CVE ID: CVE-2021-30937 Date Updated: 2024-08-03T22:48:14.228Z Date Published: 2021-08-24T18:50:38 Description: A memory corruption vulnerability was addressed with improved locking. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. A malicious application may be able to execute arbitrary code with kernel privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT212975 - https://support.apple.com/en-us/HT212976 - https://support.apple.com/en-us/HT212978 - https://support.apple.com/en-us/HT212979 - https://support.apple.com/en-us/HT212981 - https://support.apple.com/en-us/HT212980 - http://packetstormsecurity.com/files/165475/XNU-inm_merge-Heap-Use-After-Free.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8282.
CVE ID: CVE-2018-8282 Date Updated: 2024-08-05T06:54:34.843Z Date Published: 2018-07-11T00:00:00 Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8282 - http://www.securitytracker.com/id/1041263 - http://www.securityfocus.com/bid/104668 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-17524.
CVE ID: CVE-2020-17524 Date Updated: 2021-01-25T15:55:55 Date Published: 2021-01-25T15:55:55 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8812.
CVE ID: CVE-2019-8812 Date Updated: 2024-08-04T21:31:37.250Z Date Published: 2019-12-18T17:33:24 Description: Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT210724 - https://support.apple.com/HT210721 - https://support.apple.com/HT210726 - https://support.apple.com/HT210723 - https://support.apple.com/HT210725 - https://security.gentoo.org/glsa/202003-22 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3481.
CVE ID: CVE-2010-3481 Date Updated: 2024-08-07T03:11:44.336Z Date Published: 2010-09-22T19:00:00 Description: Multiple SQL injection vulnerabilities in login.php in ApPHP PHP MicroCMS 1.0.1, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) user_name and (2) password variables, possibly related to include/classes/Login.php. NOTE: some of these details are obtained from third party information. NOTE: the password vector might not be vulnerable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/41492 - https://exchange.xforce.ibmcloud.com/vulnerabilities/61810 - http://www.securityfocus.com/bid/43232 - http://osvdb.org/68073 - http://www.exploit-db.com/exploits/15011 - http://www.attrition.org/pipermail/vim/2010-September/002439.html - http://secunia.com/advisories/41455 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-2215.
CVE ID: CVE-2021-2215 Date Updated: 2024-09-26T15:11:11.357Z Date Published: 2021-04-22T21:53:52 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2021.html - https://security.netapp.com/advisory/ntap-20210513-0002/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-1459.
CVE ID: CVE-2016-1459 Date Updated: 2024-08-05T22:55:14.508Z Date Published: 2016-07-17T22:00:00 Description: Cisco IOS 12.4 and 15.0 through 15.5 and IOS XE 3.13 through 3.17 allow remote authenticated users to cause a denial of service (device reload) via crafted attributes in a BGP message, aka Bug ID CSCuz21061. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160715-bgp - http://www.securityfocus.com/bid/91800 - http://www.securitytracker.com/id/1036321 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23085.
CVE ID: CVE-2024-23085 Date Updated: 2024-08-01T22:51:11.209Z Date Published: 2024-04-08T00:00:00 Description: Apfloat v1.10.1 was discovered to contain a NullPointerException via the component org.apfloat.internal.DoubleScramble::scramble(double[], int, int[]). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://apfloat.com - https://github.com/mtommila/apfloat - https://gist.github.com/LLM4IG/a4a54fc4abe044976a66af9fffedfc94 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0332.
CVE ID: CVE-2011-0332 Date Updated: 2024-08-06T21:51:07.762Z Date Published: 2011-02-25T18:00:00 Description: Integer overflow in Foxit Reader before 4.3.1.0218 and Foxit Phantom before 2.3.3.1112 allows remote attackers to execute arbitrary code via crafted ICC chunks in a PDF file, which triggers a heap-based buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/43440 - http://www.vupen.com/english/advisories/2011/0508 - http://secunia.com/secunia_research/2011-14/ - http://secunia.com/advisories/43329 - http://www.foxitsoftware.com/pdf/reader/security_bulletins.php#memory - http://www.securitytracker.com/id?1025129 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16052.
CVE ID: CVE-2017-16052 Date Updated: 2024-09-17T01:05:54.584Z Date Published: 2018-06-04T19:00:00Z Description: `node-fabric` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nodesecurity.io/advisories/489 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1309.
CVE ID: CVE-2019-1309 Date Updated: 2024-08-04T18:13:30.220Z Date Published: 2019-11-12T18:52:48 Description: A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0712, CVE-2019-1310, CVE-2019-1399. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1309 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3948.
CVE ID: CVE-2010-3948 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2109.
CVE ID: CVE-2016-2109 Date Updated: 2024-08-05T23:17:50.542Z Date Published: 2016-05-05T00:00:00 Description: The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149 - http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103 - http://rhn.redhat.com/errata/RHSA-2016-2056.html - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html - http://rhn.redhat.com/errata/RHSA-2016-2073.html - https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - http://www.debian.org/security/2016/dsa-3566 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - https://kc.mcafee.com/corporate/index?page=content&id=SB10160 - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html - https://source.android.com/security/bulletin/2017-07-01 - https://security.gentoo.org/glsa/201612-16 - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html - http://www.securitytracker.com/id/1035721 - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html - https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html - http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html - https://www.tenable.com/security/tns-2016-18 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202 - http://rhn.redhat.com/errata/RHSA-2016-0996.html - https://security.netapp.com/advisory/ntap-20160504-0001/ - https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c62981390d6cf9e3d612c489b8b77c2913b25807 - http://www.securityfocus.com/bid/91787 - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html - http://rhn.redhat.com/errata/RHSA-2016-2957.html - http://www.ubuntu.com/usn/USN-2959-1 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html - http://www.securityfocus.com/bid/87940 - http://rhn.redhat.com/errata/RHSA-2016-0722.html - https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc - https://www.openssl.org/news/secadv/20160503.txt - https://support.apple.com/HT206903 - https://bto.bluecoat.com/security-advisory/sa123 - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 - https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1855.
CVE ID: CVE-2013-1855 Date Updated: 2024-08-06T15:20:35.175Z Date Published: 2013-03-19T22:00:00 Description: The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html - https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source&output=gplain - http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html - http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html - http://support.apple.com/kb/HT5784 - http://rhn.redhat.com/errata/RHSA-2013-0698.html - http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html - http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html - http://rhn.redhat.com/errata/RHSA-2014-1863.html - http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-4660.
CVE ID: CVE-2009-4660 Date Updated: 2024-08-07T07:08:38.167Z Date Published: 2010-03-03T20:00:00 Description: Stack-based buffer overflow in the AntServer Module (AntServer.exe) in BigAnt IM Server 2.50 allows remote attackers to execute arbitrary code via a long GET request to TCP port 6660. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/9673 - http://www.attrition.org/pipermail/vim/2009-September/002271.html - http://www.exploit-db.com/exploits/9690 - http://secunia.com/advisories/36704 - http://www.vupen.com/english/advisories/2009/2679 - http://www.securityfocus.com/bid/36407 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1193.
CVE ID: CVE-2013-1193 Date Updated: 2024-09-16T16:18:13.827Z Date Published: 2013-04-16T10:00:00Z Description: The Secure Shell (SSH) implementation on Cisco Adaptive Security Appliances (ASA) devices, and in Cisco Firewall Services Module (FWSM), does not properly terminate sessions, which allows remote attackers to cause a denial of service (SSH service outage) by repeatedly establishing SSH connections, aka Bug IDs CSCue63881, CSCuf51892, CSCue78671, and CSCug26937. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1193 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-24560.
CVE ID: CVE-2023-24560 Date Updated: 2024-08-02T11:03:18.954Z Date Published: 2023-02-14T10:36:38.321Z Description: A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to to execute code in the context of the current process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39378.
CVE ID: CVE-2021-39378 Date Updated: 2024-08-04T02:06:42.402Z Date Published: 2021-09-01T12:28:53 Description: A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the NamesList.php str parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://opensis.com/ - https://github.com/OS4ED/openSIS-Classic - https://github.com/security-n/CVE-2021-39378 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2427.
CVE ID: CVE-2012-2427 Date Updated: 2024-09-16T20:43:25.511Z Date Published: 2012-05-25T19:00:00Z Description: Heap-based buffer overflow in the server in xArrow before 3.4.1 allows remote attackers to execute arbitrary code via packets that trigger an invalid free operation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.us-cert.gov/control_systems/pdf/ICSA-12-145-02.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3092.
CVE ID: CVE-2016-3092 Date Updated: 2024-08-05T23:40:15.604Z Date Published: 2016-07-04T22:00:00 Description: The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121 - https://security.netapp.com/advisory/ntap-20190212-0001/ - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759 - http://svn.apache.org/viewvc?view=revision&revision=1743480 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - https://security.gentoo.org/glsa/201705-09 - http://svn.apache.org/viewvc?view=revision&revision=1743738 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840 - http://tomcat.apache.org/security-9.html - http://www.ubuntu.com/usn/USN-3024-1 - http://rhn.redhat.com/errata/RHSA-2016-2069.html - http://www.securitytracker.com/id/1037029 - http://rhn.redhat.com/errata/RHSA-2016-2068.html - http://tomcat.apache.org/security-7.html - http://www.securitytracker.com/id/1036900 - http://www.securityfocus.com/bid/91453 - http://tomcat.apache.org/security-8.html - http://rhn.redhat.com/errata/RHSA-2016-2072.html - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - http://svn.apache.org/viewvc?view=revision&revision=1743722 - http://www.debian.org/security/2016/dsa-3611 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371 - http://rhn.redhat.com/errata/RHSA-2016-2807.html - http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html - http://jvn.jp/en/jp/JVN89379547/index.html - http://www.securitytracker.com/id/1036427 - http://rhn.redhat.com/errata/RHSA-2016-2070.html - http://rhn.redhat.com/errata/RHSA-2017-0457.html - http://rhn.redhat.com/errata/RHSA-2016-2808.html - http://www.securitytracker.com/id/1039606 - http://svn.apache.org/viewvc?view=revision&revision=1743742 - http://rhn.redhat.com/errata/RHSA-2016-2599.html - http://www.debian.org/security/2016/dsa-3609 - https://access.redhat.com/errata/RHSA-2017:0455 - http://www.debian.org/security/2016/dsa-3614 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html - http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E - https://access.redhat.com/errata/RHSA-2017:0456 - https://bugzilla.redhat.com/show_bug.cgi?id=1349468 - http://rhn.redhat.com/errata/RHSA-2016-2071.html - http://www.ubuntu.com/usn/USN-3027-1 - https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E - https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E - https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E - https://www.oracle.com/security-alerts/cpuapr2020.html - https://security.gentoo.org/glsa/202107-39 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35800.
CVE ID: CVE-2022-35800 Date Updated: 2024-08-03T09:44:22.020Z Date Published: 2022-08-09T20:07:54 Description: Azure Site Recovery Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35800 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5008.
CVE ID: CVE-2023-5008 Date Updated: 2024-08-02T07:44:53.786Z Date Published: 2023-12-07T23:16:52.700Z Description: Student Information System v1.0 is vulnerable to an unauthenticated SQL Injection vulnerability on the 'regno' parameter of index.php page, allowing an external attacker to dump all the contents of the database contents and bypass the login control. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fluidattacks.com/advisories/blechacz/ - https://www.kashipara.com/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4146.
CVE ID: CVE-2021-4146 Date Updated: 2024-08-03T17:16:04.270Z Date Published: 2022-01-18T15:30:12 Description: Business Logic Errors in GitHub repository pimcore/pimcore prior to 10.2.6. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/47b37054-cafe-4f48-8b40-c86efc7fb760 - https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559b91fcdb34604a6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2691.
CVE ID: CVE-2016-2691 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1903.
CVE ID: CVE-2018-1903 Date Updated: 2024-09-17T03:23:03.691Z Date Published: 2019-04-10T14:30:27.394161Z Description: IBM Sterling Connect:Direct for UNIX 4.2.0, 4.3.0, and 6.0.0 could allow a user with restricted sudo access on a system to manipulate CD UNIX to gain full sudo access. IBM X-Force ID: 152532. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=ibm10875386 - https://exchange.xforce.ibmcloud.com/vulnerabilities/152532 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34599.
CVE ID: CVE-2024-34599 Date Updated: 2024-08-02T02:59:22.340Z Date Published: 2024-07-02T09:23:39.540Z Description: Improper input validation in Tips prior to version 6.2.9.4 in Android 14 allows local attacker to send broadcast with Tips&#39; privilege. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=07 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39673.
CVE ID: CVE-2024-39673 Date Updated: 2024-08-02T04:26:15.954Z Date Published: 2024-07-25T11:40:24.640Z Description: Vulnerability of serialisation/deserialisation mismatch in the iAware module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2024/7/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24925.
CVE ID: CVE-2024-24925 Date Updated: 2024-08-01T23:36:20.217Z Date Published: 2024-02-13T09:00:34.363Z Description: A vulnerability has been identified in Simcenter Femap (All versions < V2306.0000). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted Catia MODEL files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-22060) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/html/ssa-000072.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-31874.
CVE ID: CVE-2022-31874 Date Updated: 2024-08-03T07:26:01.200Z Date Published: 2022-06-17T19:29:02 Description: ASUS RT-N53 3.0.0.4.376.3754 has a command injection vulnerability in the SystemCmd parameter of the apply.cgi interface. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jayus0821/uai-poc/blob/main/ASUS/RT-N53/command%20injection.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-21068.
CVE ID: CVE-2018-21068 Date Updated: 2024-08-05T12:19:27.535Z Date Published: 2020-04-08T17:23:19 Description: An issue was discovered on Samsung mobile devices with O(8.0) software. Execution of an application in a locked Secure Folder can occur without a password via a split screen. The Samsung ID is SVE-2018-11669 (July 2018). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39764.
CVE ID: CVE-2021-39764 Date Updated: 2024-08-04T02:13:38.421Z Date Published: 2022-03-30T16:02:29 Description: In Settings, there is a possible way to display an incorrect app name due to improper input validation. This could lead to local escalation of privilege via app spoofing with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-170642995 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/android-12l No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8569.
CVE ID: CVE-2015-8569 Date Updated: 2024-08-06T08:20:43.262Z Date Published: 2015-12-28T11:00:00 Description: The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2015/12/15/11 - http://www.ubuntu.com/usn/USN-2886-1 - http://www.ubuntu.com/usn/USN-2890-3 - http://www.securityfocus.com/bid/79428 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ccfd238e5a0e670d8178cf50180ea81ae09ae1 - http://twitter.com/grsecurity/statuses/676744240802750464 - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html - https://lkml.org/lkml/2015/12/14/252 - http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html - http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html - http://www.ubuntu.com/usn/USN-2890-2 - https://github.com/torvalds/linux/commit/09ccfd238e5a0e670d8178cf50180ea81ae09ae1 - http://www.securitytracker.com/id/1034549 - https://bugzilla.redhat.com/show_bug.cgi?id=1292045 - http://www.ubuntu.com/usn/USN-2890-1 - http://www.debian.org/security/2016/dsa-3434 - http://www.ubuntu.com/usn/USN-2888-1 - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21577.
CVE ID: CVE-2021-21577 Date Updated: 2024-09-17T00:26:04.837Z Date Published: 2021-08-03T15:30:18.797761Z Description: Dell EMC iDRAC9 versions prior to 4.40.40.00 contain a DOM-based cross-site scripting vulnerability. A remote attacker could potentially exploit this vulnerability to run malicious HTML or JavaScript in a victim’s browser by tricking a victim in to following a specially crafted link. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/000189193 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3752.
CVE ID: CVE-2020-3752 Date Updated: 2024-08-04T07:44:50.439Z Date Published: 2020-02-13T15:47:39 Description: Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have a buffer error vulnerability. Successful exploitation could lead to arbitrary code execution . No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb20-05.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10763.
CVE ID: CVE-2016-10763 Date Updated: 2024-08-06T03:38:55.172Z Date Published: 2019-07-18T11:22:22 Description: The CampTix Event Ticketing plugin before 1.5 for WordPress allows XSS in the admin section via a ticket title or body. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/camptix/#developers - https://hackerone.com/reports/152958 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1000016.
CVE ID: CVE-2018-1000016 Date Updated: 2018-01-25T16:57:01 Date Published: 2018-01-23T14:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8325.
CVE ID: CVE-2016-8325 Date Updated: 2024-08-06T02:20:30.678Z Date Published: 2017-01-27T22:01:00 Description: Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: Internal Operations). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle One-to-One Fulfillment accessible data as well as unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data. CVSS v3.0 Base Score 9.1 (Confidentiality and Integrity impacts). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/95595 - http://www.securitytracker.com/id/1037639 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11627.
CVE ID: CVE-2019-11627 Date Updated: 2024-08-04T22:55:41.043Z Date Published: 2019-04-30T22:49:10 Description: gpg-key2ps in signing-party 1.1.x and 2.x before 2.10-1 contains an unsafe shell call enabling shell injection via a User ID. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.debian.org/928256 - https://lists.debian.org/debian-lts-announce/2019/05/msg00001.html - http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00029.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-4235.
CVE ID: CVE-2020-4235 Date Updated: 2024-09-16T19:09:15.086Z Date Published: 2020-03-31T14:31:32.193026Z Description: IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.17 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 175408. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6128931 - https://exchange.xforce.ibmcloud.com/vulnerabilities/175408 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15255.
CVE ID: CVE-2020-15255 Date Updated: 2024-08-04T13:08:23.253Z Date Published: 2020-10-16T16:20:16 Description: In Anuko Time Tracker before verion 1.19.23.5325, due to not properly filtered user input a CSV export of a report could contain cells that are treated as formulas by spreadsheet software (for example, when a cell value starts with an equal sign). This is fixed in version 1.19.23.5325. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/anuko/timetracker/security/advisories/GHSA-prjf-9mgh-8fpv - https://github.com/anuko/timetracker/commit/d9472904361495f318c9d0294ffd28acaaeae42f - http://packetstormsecurity.com/files/159996/Anuko-Time-Tracker-1.19.23.5325-CSV-Injection.html - https://www.exploit-db.com/exploits/49027 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21907.
CVE ID: CVE-2021-21907 Date Updated: 2024-08-03T18:30:22.876Z Date Published: 2021-12-22T18:06:49 Description: A directory traversal vulnerability exists in the CMA CLI getenv command functionality of Garrett Metal Detectors’ iC Module CMA Version 5.0. A specially-crafted command line argument can lead to local file inclusion. An attacker can provide malicious input to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1358 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36984.
CVE ID: CVE-2024-36984 Date Updated: 2024-08-02T03:43:50.601Z Date Published: 2024-07-01T16:30:44.270Z Description: In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 on Windows, an authenticated user could execute a specially crafted query that they could then use to serialize untrusted data. The attacker could use the query to execute arbitrary code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://advisory.splunk.com/advisories/SVD-2024-0704 - https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-29639.
CVE ID: CVE-2020-29639 Date Updated: 2024-08-04T16:55:10.625Z Date Published: 2021-04-02T17:44:58 Description: An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0. Processing a maliciously crafted font may result in the disclosure of process memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT211850 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2666.
CVE ID: CVE-2009-2666 Date Updated: 2024-08-07T05:59:56.877Z Date Published: 2009-08-07T18:33:00 Description: socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mandriva.com/security/advisories?name=MDVSA-2009:201 - http://secunia.com/advisories/36175 - http://secunia.com/advisories/36236 - http://www.debian.org/security/2009/dsa-1852 - http://fetchmail.berlios.de/fetchmail-SA-2009-01.txt - http://marc.info/?l=oss-security&m=124949601207156&w=2 - http://www.securityfocus.com/archive/1/505530/100/0/threaded - http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.543463 - http://secunia.com/advisories/36179 - http://www.securitytracker.com/id?1022679 - http://osvdb.org/56855 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11059 - http://www.vupen.com/english/advisories/2009/3184 - http://www.vupen.com/english/advisories/2009/2155 - http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html - http://support.apple.com/kb/HT3937 - http://www.securityfocus.com/bid/35951 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1985.
CVE ID: CVE-2019-1985 Date Updated: 2024-08-04T18:35:52.033Z Date Published: 2019-06-19T19:50:40 Description: In findAvailSpellCheckerLocked of TextServicesManagerService.java, there is a possible way to bypass the warning dialog when selecting an untrusted spell checker due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0Android ID: A-118694079 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2019-03-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22375.
CVE ID: CVE-2021-22375 Date Updated: 2024-08-03T18:44:12.300Z Date Published: 2021-06-30T13:43:58 Description: There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality,availability and integrity. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2021/5/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-33595.
CVE ID: CVE-2024-33595 Date Updated: 2024-08-02T02:36:04.368Z Date Published: 2024-04-29T09:16:00.135Z Description: Missing Authorization vulnerability in Jewel Theme Master Addons for Elementor.This issue affects Master Addons for Elementor: from n/a through 2.0.5.4.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/master-addons/wordpress-master-addons-for-elementor-plugin-2-0-5-4-1-broken-access-control-on-duplicate-post-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-48383.
CVE ID: CVE-2022-48383 Date Updated: 2024-08-03T15:10:59.797Z Date Published: 2023-05-09T01:21:27.473Z Description: .In srtd service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21359.
CVE ID: CVE-2024-21359 Date Updated: 2024-08-01T22:20:40.686Z Date Published: 2024-02-13T18:02:36.736Z Description: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21359 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-43044.
CVE ID: CVE-2024-43044 Date Updated: 2024-08-07T17:29:40.580Z Date Published: 2024-08-07T13:27:11.438Z Description: Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3430 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9757.
CVE ID: CVE-2020-9757 Date Updated: 2024-08-04T10:43:04.369Z Date Published: 2020-03-04T16:03:22 Description: The SEOmatic component before 3.3.0 for Craft CMS allows Server-Side Template Injection that leads to RCE via malformed data to the metacontainers controller. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/nystudio107/craft-seomatic/blob/v3/CHANGELOG.md - https://github.com/giany/CVE/blob/master/CVE-2020-9757.txt - https://github.com/nystudio107/craft-seomatic/commit/65ab659cb6c914c7ad671af1e417c0da2431f79b - https://github.com/nystudio107/craft-seomatic/commit/a1c2cad7e126132d2442ec8ec8e9ab43df02cc0f No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-2426.
CVE ID: CVE-2021-2426 Date Updated: 2024-09-25T19:45:35.886Z Date Published: 2021-07-20T22:44:35 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujul2021.html - https://security.netapp.com/advisory/ntap-20210723-0001/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31215.
CVE ID: CVE-2021-31215 Date Updated: 2024-08-03T22:55:53.511Z Date Published: 2021-05-13T05:51:41 Description: SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.schedmd.com/news.php?id=248#OPT_248 - https://lists.schedmd.com/pipermail/slurm-announce/2021/000055.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ODMJQNY4FAV7G3DSKVIO5KY7Q7DKBPU/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRHTASFAU5FNB2MJOG67YID2ONQS5MCQ/ - https://lists.debian.org/debian-lts-announce/2022/01/msg00011.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0227.
CVE ID: CVE-2009-0227 Date Updated: 2024-08-07T04:24:18.263Z Date Published: 2009-05-12T22:00:00 Description: Stack-based buffer overflow in the PowerPoint 4.2 conversion filter (PP4X32.DLL) in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via a large number of structures in sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0222, CVE-2009-0223, CVE-2009-0226, and CVE-2009-1137. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32428 - http://www.vupen.com/english/advisories/2009/1290 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 - http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=787 - http://osvdb.org/54384 - http://www.securitytracker.com/id?1022205 - http://www.securityfocus.com/bid/34882 - http://www.us-cert.gov/cas/techalerts/TA09-132A.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6239 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26267.
CVE ID: CVE-2024-26267 Date Updated: 2024-08-02T00:07:17.897Z Date Published: 2024-02-20T13:01:23.251Z Description: In Liferay Portal 7.2.0 through 7.4.3.25, and older unsupported versions, and Liferay DXP 7.4 before update 26, 7.3 before update 5, 7.2 before fix pack 19, and older unsupported versions the default value of the portal property `http.header.version.verbosity` is set to `full`, which allows remote attackers to easily identify the version of the application that is running and the vulnerabilities that affect that version via 'Liferay-Portal` response header. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26267 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23993.
CVE ID: CVE-2023-23993 Date Updated: 2024-08-02T10:49:08.943Z Date Published: 2023-07-10T15:27:42.999Z Description: Cross-Site Request Forgery (CSRF) vulnerability in LionScripts.Com LionScripts: IP Blocker Lite plugin <= 11.1.1 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/ip-address-blocker/wordpress-lionscripts-ip-blocker-lite-plugin-11-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22088.
CVE ID: CVE-2022-22088 Date Updated: 2024-08-03T03:00:55.339Z Date Published: 2023-01-06T04:42:10.711Z Description: Memory corruption in Bluetooth HOST due to buffer overflow while parsing the command response received from remote No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4590.
CVE ID: CVE-2013-4590 Date Updated: 2024-08-06T16:45:15.235Z Date Published: 2014-02-26T11:00:00 Description: Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vmware.com/security/advisories/VMSA-2014-0008.html - http://www.mandriva.com/security/advisories?name=MDVSA-2015:052 - http://secunia.com/advisories/59724 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:084 - http://www.debian.org/security/2016/dsa-3530 - http://tomcat.apache.org/security-7.html - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - http://tomcat.apache.org/security-8.html - http://www-01.ibm.com/support/docview.wss?uid=swg21677147 - http://svn.apache.org/viewvc?view=revision&revision=1549528 - http://www-01.ibm.com/support/docview.wss?uid=swg21678231 - http://advisories.mageia.org/MGASA-2014-0148.html - https://bugzilla.redhat.com/show_bug.cgi?id=1069911 - http://secunia.com/advisories/59722 - http://www.securityfocus.com/bid/65768 - http://tomcat.apache.org/security-6.html - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013 - http://secunia.com/advisories/59873 - http://www-01.ibm.com/support/docview.wss?uid=swg21667883 - http://svn.apache.org/viewvc?view=revision&revision=1558828 - http://marc.info/?l=bugtraq&m=144498216801440&w=2 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html - http://www-01.ibm.com/support/docview.wss?uid=swg21675886 - http://svn.apache.org/viewvc?view=revision&revision=1549529 - http://secunia.com/advisories/59036 - https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E - https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E - https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E - https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E - https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E - https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0200.
CVE ID: CVE-2020-0200 Date Updated: 2024-08-04T05:55:12.403Z Date Published: 2020-06-11T14:43:48 Description: In ReadLittleEndian of raw_bit_reader.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure in the media server with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-147231862 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2020-06-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26758.
CVE ID: CVE-2021-26758 Date Updated: 2024-08-03T20:33:41.058Z Date Published: 2021-04-07T20:50:20 Description: Privilege Escalation in LiteSpeed Technologies OpenLiteSpeed web server version 1.7.8 allows attackers to gain root terminal access and execute commands on the host system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/litespeedtech/openlitespeed/issues/217 - https://www.exploit-db.com/exploits/49556 - https://docs.unsafe-inline.com/0day/openlitespeed-web-server-1.7.8-command-injection-to-privilege-escalation-cve-2021-26758 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1289.
CVE ID: CVE-2009-1289 Date Updated: 2024-08-07T05:04:49.533Z Date Published: 2009-04-13T16:00:00 Description: private/login.ssi in the Advanced Management Module (AMM) on the IBM BladeCenter, including the BladeCenter H with BPET36H 54, allows remote attackers to discover the access roles and scopes of arbitrary user accounts via a modified WEBINDEX parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/502582/100/0/threaded - http://osvdb.org/53659 - http://www.securityfocus.com/bid/34447 - http://securitytracker.com/id?1022025 - http://www.louhinetworks.fi/advisory/ibm_090409.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28681.
CVE ID: CVE-2022-28681 Date Updated: 2024-08-03T06:03:52.077Z Date Published: 2022-07-18T18:42:06 Description: This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the deletePages method. By performing actions in JavaScript, an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16825. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.foxit.com/support/security-bulletins.html - https://www.zerodayinitiative.com/advisories/ZDI-22-772/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7404.
CVE ID: CVE-2015-7404 Date Updated: 2024-08-06T07:51:27.455Z Date Published: 2015-11-14T02:00:00 Description: IBM Tivoli Storage Manager for Databases: Data Protection for Microsoft SQL Server (aka Spectrum Protect for Databases) 5.5 before 5.5.6.2, 6.3 before 6.3.1.6, 6.4 before 6.4.1.8, and 7.1 before 7.1.4; Tivoli Storage Manager for Mail: Data Protection for Microsoft Exchange Server (aka Spectrum Protect for Mail) 5.5 before 5.5.1.1, 6.1 and 6.3 before 6.3.1.6, 6.4 before 6.4.1.8, and 7.1 before 7.1.4; and Tivoli Storage FlashCopy Manager for Windows (aka Spectrum Protect Snapshot) 2.x and 3.1 before 3.1.1.6, 3.2 before 3.2.1.8, and 4.1 before 4.1.4, when application tracing is configured, write cleartext passwords during changetsmpassword command execution, which allows local users to obtain sensitive information by reading the application trace output. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21969514 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT11349 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24908.
CVE ID: CVE-2024-24908 Date Updated: 2024-08-01T23:36:20.220Z Date Published: 2024-05-08T15:48:07.079Z Description: Dell PowerProtect DM5500 version 5.15.0.0 and prior contain an Arbitrary File Delete via Path Traversal vulnerability. A remote attacker with high privileges could potentially exploit this vulnerability to deletion of arbitrary files stored on the server filesystem. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000224843/dsa-2024-083-security-update-for-dell-powerprotect-data-manager-appliance-for-multiple-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20325.
CVE ID: CVE-2021-20325 Date Updated: 2024-08-03T17:37:23.945Z Date Published: 2022-02-18T17:50:47 Description: Missing fixes for CVE-2021-40438 and CVE-2021-26691 in the versions of httpd, as shipped in Red Hat Enterprise Linux 8.5.0, causes a security regression compared to the versions shipped in Red Hat Enterprise Linux 8.4. A user who installs or updates to Red Hat Enterprise Linux 8.5.0 would be vulnerable to the mentioned CVEs, even if they were properly fixed in Red Hat Enterprise Linux 8.4. CVE-2021-20325 was assigned to that Red Hat specific security regression and it does not affect the upstream versions of httpd. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=2017321 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0498.
CVE ID: CVE-2016-0498 Date Updated: 2024-08-05T22:22:55.201Z Date Published: 2016-01-21T02:00:00 Description: Unspecified vulnerability in the Oracle Agile Engineering Data Management component in Oracle Supply Chain Products Suite 6.1.2.2, 6.1.3.0, and 6.2.0.0 allows local users to affect confidentiality via unknown vectors related to Install. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html - http://www.securitytracker.com/id/1034727 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0763.
CVE ID: CVE-2015-0763 Date Updated: 2024-08-06T04:17:32.913Z Date Published: 2015-06-04T10:00:00 Description: Cisco Unified MeetingPlace 8.6(1.2) does not properly validate session IDs in http URLs, which allows remote attackers to obtain sensitive session information via a crafted URL, aka Bug ID CSCuu60338. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/viewAlert.x?alertId=39162 - http://www.securitytracker.com/id/1032471 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10741.
CVE ID: CVE-2019-10741 Date Updated: 2024-08-04T22:32:01.213Z Date Published: 2019-04-07T14:37:51 Description: K-9 Mail v5.600 can include the original quoted HTML code of a specially crafted, benign looking, email within (digitally signed) reply messages. The quoted part can contain conditional statements that show completely different text if opened in a different email client. This can be abused by an attacker to obtain valid S/MIME or PGP signatures for arbitrary content to be displayed to a third party. NOTE: the vendor states "We don't plan to take any action because of this." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/k9mail/k-9/issues/3925 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26529.
CVE ID: CVE-2021-26529 Date Updated: 2024-08-03T20:26:25.389Z Date Published: 2021-02-08T20:13:36 Description: The mg_tls_init function in Cesanta Mongoose HTTPS server 7.0 and 6.7-6.18 (compiled with mbedTLS support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/cesanta/mongoose/issues/1203 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4415.
CVE ID: CVE-2011-4415 Date Updated: 2024-08-07T00:09:18.511Z Date Published: 2011-11-08T11:00:00 Description: The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to cause a denial of service (memory consumption or NULL pointer dereference) via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, related to (1) the "len +=" statement and (2) the apr_pcalloc function call, a different vulnerability than CVE-2011-3607. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html - http://www.gossamer-threads.com/lists/apache/dev/403775 - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13352.
CVE ID: CVE-2018-13352 Date Updated: 2024-08-05T09:00:35.135Z Date Published: 2018-11-27T21:00:00 Description: Session Exposure in the web application for TerraMaster TOS version 3.1.03 allows attackers to view active session tokens in a world-readable directory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-44415.
CVE ID: CVE-2021-44415 Date Updated: 2024-08-04T04:17:25.095Z Date Published: 2022-01-28T21:42:54 Description: A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. ModifyUser param is not object. An attacker can send an HTTP request to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0744.
CVE ID: CVE-2014-0744 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46839.
CVE ID: CVE-2021-46839 Date Updated: 2024-08-04T05:17:42.606Z Date Published: 2022-10-14T00:00:00 Description: The HW_KEYMASTER module has a vulnerability of missing bounds check on length.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2022/10/ - https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3099.
CVE ID: CVE-2022-3099 Date Updated: 2024-08-03T01:00:10.845Z Date Published: 2022-09-03T00:00:00 Description: Use After Free in GitHub repository vim/vim prior to 9.0.0360. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/403210c7-6cc7-4874-8934-b57f88bd4f5e - https://github.com/vim/vim/commit/35d21c6830fc2d68aca838424a0e786821c5891c - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DVWBI4BVTBUMNW4NMB3WZZDQJBKIGXI3/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LLK2RMZEECKKWUQK7J46D2FQZOXFQLTC/ - https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html - https://security.gentoo.org/glsa/202305-16 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-47649.
CVE ID: CVE-2023-47649 Date Updated: 2024-08-14T18:00:07.515Z Date Published: 2023-11-18T21:27:43.748Z Description: Cross-Site Request Forgery (CSRF) vulnerability in PriceListo Best Restaurant Menu by PriceListo.This issue affects Best Restaurant Menu by PriceListo: from n/a through 1.3.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/best-restaurant-menu-by-pricelisto/wordpress-best-restaurant-menu-by-pricelisto-plugin-1-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-41015.
CVE ID: CVE-2024-41015 Date Updated: 2024-09-15T17:52:05.627Z Date Published: 2024-07-29T06:37:01.651Z Description: In the Linux kernel, the following vulnerability has been resolved: ocfs2: add bounds checking to ocfs2_check_dir_entry() This adds sanity checks for ocfs2_dir_entry to make sure all members of ocfs2_dir_entry don't stray beyond valid memory region. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/13d38c00df97289e6fba2e54193959293fd910d2 - https://git.kernel.org/stable/c/564d23cc5b216211e1694d53f7e45959396874d0 - https://git.kernel.org/stable/c/77495e5da5cb110a8fed27b052c77853fe282176 - https://git.kernel.org/stable/c/53de17ad01cb5f6f8426f597e9d5c87d4cf53bb7 - https://git.kernel.org/stable/c/fd65685594ee707cbf3ddf22ebb73697786ac114 - https://git.kernel.org/stable/c/e05a24289db90f76ff606086aadd62d068a88dcd - https://git.kernel.org/stable/c/624b380074f0dc209fb8706db3295c735079f34c - https://git.kernel.org/stable/c/edb2e67dd4626b06fd7eb37252d5067912e78d59 - https://git.kernel.org/stable/c/255547c6bb8940a97eea94ef9d464ea5967763fb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0156.
CVE ID: CVE-2018-0156 Date Updated: 2024-08-05T03:14:16.905Z Date Published: 2018-03-28T22:00:00 Description: A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi - http://www.securitytracker.com/id/1040596 - http://www.securityfocus.com/bid/103569 - https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2108.
CVE ID: CVE-2014-2108 Date Updated: 2024-08-06T10:05:59.461Z Date Published: 2014-03-27T21:00:00 Description: Cisco IOS 12.2 and 15.0 through 15.3 and IOS XE 3.2 through 3.7 before 3.7.5S and 3.8 through 3.10 before 3.10.1S allow remote attackers to cause a denial of service (device reload) via a malformed IKEv2 packet, aka Bug ID CSCui88426. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2015-7935
CVE-CVE-2015-7935 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1005: Data from Local System. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2015 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2022-42110.
CVE ID: CVE-2022-42110 Date Updated: 2024-08-03T13:03:45.457Z Date Published: 2022-11-14T00:00:00 Description: A Cross-site scripting (XSS) vulnerability in the Announcements module in Liferay Portal 7.1.0 through 7.4.2, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 17, and 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42110 - https://issues.liferay.com/browse/LPE-17403 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6450.
CVE ID: CVE-2024-6450 Date Updated: 2024-09-06T12:48:48.832Z Date Published: 2024-08-28T11:50:20.929Z Description: HyperView Geoportal Toolkit in versions lower than 8.5.0 is vulnerable to Reflected Cross-Site Scripting (XSS). An unauthenticated attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert.pl/en/posts/2024/08/CVE-2024-6449 - https://cert.pl/posts/2024/08/CVE-2024-6449 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21371.
CVE ID: CVE-2024-21371 Date Updated: 2024-08-01T22:20:40.763Z Date Published: 2024-02-13T18:02:17.321Z Description: Windows Kernel Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21371 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-17092.
CVE ID: CVE-2018-17092 Date Updated: 2024-08-05T10:39:59.618Z Date Published: 2018-09-16T21:00:00 Description: An issue was discovered in DonLinkage 6.6.8. SQL injection in /pages/proxy/php.php and /pages/proxy/add.php can be exploited via specially crafted input, allowing an attacker to obtain information from a database. The vulnerability can only be triggered by an authorized user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.safecomp.com/blog/donlinkage.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-10595.
CVE ID: CVE-2020-10595 Date Updated: 2024-08-04T11:06:09.951Z Date Published: 2020-03-31T12:36:10 Description: pam-krb5 before 4.9 has a buffer overflow that might cause remote code execution in situations involving supplemental prompting by a Kerberos library. It may overflow a buffer provided by the underlying Kerberos library by a single '\0' byte if an attacker responds to a prompt with an answer of a carefully chosen length. The effect may range from heap corruption to stack corruption depending on the structure of the underlying Kerberos library, with unknown effects but possibly including code execution. This code path is not used for normal authentication, but only when the Kerberos library does supplemental prompting, such as with PKINIT or when using the non-standard no_prompt PAM configuration option. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/rra/pam-krb5/commit/e7879e27a37119fad4faf133a9f70bdcdc75d760 - http://www.openwall.com/lists/oss-security/2020/03/31/1 - https://www.debian.org/security/2020/dsa-4648 - https://lists.debian.org/debian-lts-announce/2020/04/msg00000.html - https://usn.ubuntu.com/4314-1/ - https://www.eyrie.org/~eagle/software/pam-krb5/security/2020-03-30.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8488.
CVE ID: CVE-2015-8488 Date Updated: 2024-08-06T08:20:42.444Z Date Published: 2016-02-17T02:00:00 Description: Cybozu Office 10.3.0 allows remote attackers to read image files via a crafted e-mail message, a different vulnerability than CVE-2015-8487. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cs.cybozu.co.jp/2015/006075.html - http://jvn.jp/en/jp/JVN28042424/index.html - http://jvndb.jvn.jp/jvndb/JVNDB-2016-000021 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2014-1815
CVE-CVE-2014-1815 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1203: Exploitation for Client Execution. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2014 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2013-3388.
CVE ID: CVE-2013-3388 Date Updated: 2024-09-16T20:31:23.909Z Date Published: 2013-08-25T01:00:00Z Description: Cisco Prime Central for Hosted Collaboration Solution (HCS) Assurance 8.6 and 9.x before 9.2(1) allows remote attackers to cause a denial of service (memory consumption) via a flood of TCP packets to port 44444, aka Bug ID CSCtz92776. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130821-hcm No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-37563.
CVE ID: CVE-2024-37563 Date Updated: 2024-08-02T03:57:39.519Z Date Published: 2024-07-20T09:04:33.202Z Description: Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in TOCHAT.BE allows Stored XSS.This issue affects TOCHAT.BE: from n/a through 1.3.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/tochat-be/wordpress-tochat-be-plugin-1-3-0-unauthenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1643.
CVE ID: CVE-2009-1643 Date Updated: 2024-08-07T05:20:35.181Z Date Published: 2009-05-15T15:00:00 Description: Stack-based buffer overflow in Sorinara Soritong MP3 Player 1.0 allows remote attackers to execute arbitrary code via a crafted .m3u file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/8624 - https://exchange.xforce.ibmcloud.com/vulnerabilities/50398 - http://www.securityfocus.com/bid/34863 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.