instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2020-3631.
CVE ID: CVE-2020-3631 Date Updated: 2021-12-20T22:52:10 Date Published: 2021-12-20T22:52:10 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2963.
CVE ID: CVE-2010-2963 Date Updated: 2024-08-07T02:55:45.531Z Date Published: 2010-11-26T18:23:00 Description: drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L) implementation in the Linux kernel before 2.6.36 on 64-bit platforms does not validate the destination of a memory copy operation, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via a VIDIOCSTUNER ioctl call on a /dev/video device, followed by a VIDIOCSMICROCODE ioctl call on this device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ubuntu.com/usn/USN-1000-1 - http://www.securitytracker.com/id?1024710 - http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html - http://www.vupen.com/english/advisories/2010/3321 - http://www.outflux.net/blog/archives/2010/10/19/cve-2010-2963-v4l-compat-exploit/ - http://www.mandriva.com/security/advisories?name=MDVSA-2010:257 - http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3e645d6b485446c54c6745c5e2cf5c528fe4deec - http://www.securityfocus.com/bid/44242 - https://bugzilla.redhat.com/show_bug.cgi?id=642465 - http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 - http://secunia.com/advisories/42745 - http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html - http://www.debian.org/security/2010/dsa-2126 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38544.
CVE ID: CVE-2021-38544 Date Updated: 2024-08-04T01:44:23.537Z Date Published: 2021-08-11T15:25:43 Description: Sony SRS-XB33 and SRS-XB43 devices through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.nassiben.com/glowworm-attack No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-44151.
CVE ID: CVE-2022-44151 Date Updated: 2024-08-03T13:47:05.684Z Date Published: 2022-11-30T00:00:00 Description: Simple Inventory Management System v1.0 is vulnerable to SQL Injection via /ims/login.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/li-baige/bug_report/blob/main/vendors/oretnom23/Simple%20Inventory%20Management%20System/SQLi-1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12655.
CVE ID: CVE-2020-12655 Date Updated: 2024-08-04T12:04:22.557Z Date Published: 2020-05-05T05:16:02 Description: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lore.kernel.org/linux-xfs/20200221153803.GP9506%40magnolia/ - https://github.com/torvalds/linux/commit/d0c7feaf87678371c2c09b3709400be416b2dc62 - https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d0c7feaf87678371c2c09b3709400be416b2dc62 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ES5C6ZCMALBEBMKNNCTBSLLSYGFZG3FF/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IO5XIQSRI747P4RVVTNX7TUPEOCF4OPU/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZ2X3TM6RGRUS3KZAS26IJO5XGU7TBBR/ - https://security.netapp.com/advisory/ntap-20200608-0001/ - http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html - https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html - https://usn.ubuntu.com/4465-1/ - https://usn.ubuntu.com/4483-1/ - https://usn.ubuntu.com/4485-1/ - https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html - https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39497.
CVE ID: CVE-2021-39497 Date Updated: 2024-08-04T02:06:42.610Z Date Published: 2021-09-07T19:57:08 Description: eyoucms 1.5.4 lacks sanitization of input data, allowing an attacker to inject a url to trigger blind SSRF via the saveRemote() function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/eyoucms/eyoucms/releases/tag/v1.5.4 - http://hptcybersec.com/ssrf_PoC.jpg - https://github.com/KietNA-HPT/CVE No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18245.
CVE ID: CVE-2017-18245 Date Updated: 2024-08-05T21:13:49.212Z Date Published: 2018-03-23T19:00:00 Description: The mpc8_probe function in libavformat/mpc8.c in Libav 12.2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted audio file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.libav.org/show_bug.cgi?id=1094 - https://lists.debian.org/debian-lts-announce/2019/12/msg00003.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-45805.
CVE ID: CVE-2022-45805 Date Updated: 2024-09-05T15:36:00.661Z Date Published: 2023-11-03T12:18:12.106Z Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Paytm Paytm Payment Gateway paytm-payments allows SQL Injection.This issue affects Paytm Payment Gateway: from n/a through 2.7.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/paytm-payments/wordpress-paytm-payment-gateway-plugin-2-7-3-auth-sql-injection-sqli-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-35523.
CVE ID: CVE-2020-35523 Date Updated: 2024-08-04T17:02:08.176Z Date Published: 2021-03-09T19:17:24 Description: An integer overflow flaw was found in libtiff that exists in the tif_getimage.c file. This flaw allows an attacker to inject and execute arbitrary code when a user opens a crafted TIFF file. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/libtiff/libtiff/-/commit/c8d613ef497058fe653c467fc84c70a62a4a71b2 - https://gitlab.com/libtiff/libtiff/-/merge_requests/160 - https://bugzilla.redhat.com/show_bug.cgi?id=1932040 - https://www.debian.org/security/2021/dsa-4869 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/ - https://security.gentoo.org/glsa/202104-06 - https://security.netapp.com/advisory/ntap-20210521-0009/ - https://lists.debian.org/debian-lts-announce/2021/06/msg00023.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41619.
CVE ID: CVE-2022-41619 Date Updated: 2024-08-03T12:49:43.581Z Date Published: 2024-01-17T17:02:41.406Z Description: Missing Authorization vulnerability in SedLex Image Zoom.This issue affects Image Zoom: from n/a through 1.8.8. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/image-zoom/wordpress-image-zoom-plugin-1-8-8-multiple-broken-access-control-vulnerabilities?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-31233.
CVE ID: CVE-2023-31233 Date Updated: 2024-08-02T14:53:29.694Z Date Published: 2023-05-18T09:30:55.703Z Description: Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Haoqisir Baidu Tongji generator plugin <= 1.0.2 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/baidu-tongji-generator/wordpress-baidu-tongji-generator-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6074.
CVE ID: CVE-2015-6074 Date Updated: 2024-08-06T07:15:11.574Z Date Published: 2015-11-11T11:00:00 Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6066, CVE-2015-6070, CVE-2015-6071, CVE-2015-6076, and CVE-2015-6087. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1034112 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-112 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3216.
CVE ID: CVE-2012-3216 Date Updated: 2024-08-06T19:57:50.252Z Date Published: 2012-10-16T21:29:00 Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/51313 - http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html - http://security.gentoo.org/glsa/glsa-201406-32.xml - http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html - http://rhn.redhat.com/errata/RHSA-2012-1466.html - http://rhn.redhat.com/errata/RHSA-2012-1386.html - http://secunia.com/advisories/51315 - http://secunia.com/advisories/51438 - http://secunia.com/advisories/51141 - http://marc.info/?l=bugtraq&m=135758563611658&w=2 - http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00011.html - http://www-01.ibm.com/support/docview.wss?uid=swg21621154 - http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html - http://rhn.redhat.com/errata/RHSA-2013-1455.html - http://rhn.redhat.com/errata/RHSA-2012-1391.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16538 - http://www-01.ibm.com/support/docview.wss?uid=swg21620037 - http://secunia.com/advisories/51029 - http://marc.info/?l=bugtraq&m=135758563611658&w=2 - http://secunia.com/advisories/51166 - http://secunia.com/advisories/51390 - http://www.securityfocus.com/bid/56075 - http://rhn.redhat.com/errata/RHSA-2012-1392.html - http://www-01.ibm.com/support/docview.wss?uid=swg21631786 - http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00010.html - http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 - http://secunia.com/advisories/51327 - http://rhn.redhat.com/errata/RHSA-2012-1467.html - http://rhn.redhat.com/errata/RHSA-2012-1465.html - http://secunia.com/advisories/51328 - http://marc.info/?l=bugtraq&m=135542848327757&w=2 - http://secunia.com/advisories/51028 - http://rhn.redhat.com/errata/RHSA-2013-1456.html - http://secunia.com/advisories/51393 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html - http://secunia.com/advisories/51326 - http://rhn.redhat.com/errata/RHSA-2012-1385.html - http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf - http://marc.info/?l=bugtraq&m=135542848327757&w=2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0429.
CVE ID: CVE-2009-0429 Date Updated: 2024-08-07T04:31:26.214Z Date Published: 2009-02-05T00:00:00 Description: Multiple SQL injection vulnerabilities in Active Bids allow remote attackers to execute arbitrary SQL commands via the (1) search parameter to search.asp, (2) SortDir parameter to auctionsended.asp, and the (3) catid parameter to wishlist.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/500144/100/0/threaded - http://www.securityfocus.com/bid/33306 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18500.
CVE ID: CVE-2019-18500 Date Updated: 2019-10-28T14:42:37 Date Published: 2019-10-28T14:42:37 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0494.
CVE ID: CVE-2018-0494 Date Updated: 2024-08-05T03:28:10.610Z Date Published: 2018-05-06T22:00:00 Description: GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt - https://access.redhat.com/errata/RHSA-2018:3052 - https://savannah.gnu.org/bugs/?53763 - https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd - https://security.gentoo.org/glsa/201806-01 - https://www.debian.org/security/2018/dsa-4195 - http://www.securityfocus.com/bid/104129 - http://www.securitytracker.com/id/1040838 - https://www.exploit-db.com/exploits/44601/ - https://usn.ubuntu.com/3643-2/ - https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html - https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html - https://usn.ubuntu.com/3643-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33948.
CVE ID: CVE-2022-33948 Date Updated: 2024-08-03T08:16:15.975Z Date Published: 2022-07-04T01:50:49 Description: HOME SPOT CUBE2 V102 contains an OS command injection vulnerability due to improper processing of data received from DHCP server. An adjacent attacker may execute an arbitrary OS command on the product if a malicious DHCP server is placed on the WAN side of the product. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.au.com/support/service/mobile/guide/wlan/home_spot_cube_2/ - https://jvn.jp/en/jp/JVN41017328/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41169.
CVE ID: CVE-2021-41169 Date Updated: 2024-08-04T02:59:31.756Z Date Published: 2021-10-21T20:25:10 Description: Sulu is an open-source PHP content management system based on the Symfony framework. In versions before 1.6.43 are subject to stored cross site scripting attacks. HTML input into Tag names is not properly sanitized. Only admin users are allowed to create tags. Users are advised to upgrade. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/sulu/sulu/security/advisories/GHSA-h58v-g3q6-q9fx - https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18673.
CVE ID: CVE-2017-18673 Date Updated: 2024-08-05T21:28:55.967Z Date Published: 2020-04-07T14:39:55 Description: An issue was discovered on Samsung mobile devices with N(7.x) software. An attacker can disable the Location service on a locked device, making it impossible for the rightful owner to find a stolen device. The Samsung ID is SVE-2017-8524 (May 2017). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4111.
CVE ID: CVE-2014-4111 Date Updated: 2024-08-06T11:04:28.806Z Date Published: 2014-09-10T01:00:00 Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2799, CVE-2014-4059, CVE-2014-4065, CVE-2014-4079, CVE-2014-4081, CVE-2014-4083, CVE-2014-4085, CVE-2014-4088, CVE-2014-4090, CVE-2014-4094, CVE-2014-4097, CVE-2014-4100, CVE-2014-4103, CVE-2014-4104, CVE-2014-4105, CVE-2014-4106, CVE-2014-4107, CVE-2014-4108, CVE-2014-4109, and CVE-2014-4110. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/69615 - http://www.securitytracker.com/id/1030818 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11290.
CVE ID: CVE-2019-11290 Date Updated: 2024-09-16T21:02:44.357Z Date Published: 2019-11-25T23:56:17.082402Z Description: Cloud Foundry UAA Release, versions prior to v74.8.0, logs all query parameters to tomcat’s access file. If the query parameters are used to provide authentication, ie. credentials, then they will be logged as well. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cloudfoundry.org/blog/cve-2019-11290 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1137.001 : Office Template Macros
Name: Office Template Macros ID: T1137.001 URL: https://attack.mitre.org/techniques/T1137/001 Platforms: Windows, Office 365 Kill Chain Phases: Persistence Description: Adversaries may abuse Microsoft Office templates to obtain persistence on a compromised system. Microsoft Office contains templates that are part of common Office applications and are used to customize styles. The base templates within the application are used each time an application starts. (Citation: Microsoft Change Normal Template) Office Visual Basic for Applications (VBA) macros (Citation: MSDN VBA in Office) can be inserted into the base template and used to execute code when the respective Office application starts in order to obtain persistence. Examples for both Word and Excel have been discovered and published. By default, Word has a Normal.dotm template created that can be modified to include a malicious macro. Excel does not have a template file created by default, but one can be added that will automatically be loaded.(Citation: enigma0x3 normal.dotm)(Citation: Hexacorn Office Template Macros) Shared templates may also be stored and pulled from remote locations.(Citation: GlobalDotName Jun 2019) Word Normal.dotm location: `C:\Users\&lt;username&gt;\AppData\Roaming\Microsoft\Templates\Normal.dotm` Excel Personal.xlsb location: `C:\Users\&lt;username&gt;\AppData\Roaming\Microsoft\Excel\XLSTART\PERSONAL.XLSB` Adversaries may also change the location of the base template to point to their own by hijacking the application's search order, e.g. Word 2016 will first look for Normal.dotm under `C:\Program Files (x86)\Microsoft Office\root\Office16\`, or by modifying the GlobalDotName registry key. By modifying the GlobalDotName registry key an adversary can specify an arbitrary location, file name, and file extension to use for the template that will be loaded on application startup. To abuse GlobalDotName, adversaries may first need to register the template as a trusted document or place it in a trusted location.(Citation: GlobalDotName Jun 2019) An adversary may need to enable macros to execute unrestricted depending on the system or enterprise security policy on use of macros. Data Sources: File: File Creation, Windows Registry: Windows Registry Key Modification, Command: Command Execution, Process: Process Creation, Windows Registry: Windows Registry Key Creation, File: File Modification Detection: Many Office-related persistence mechanisms require changes to the Registry and for binaries, files, or scripts to be written to disk or existing files modified to include malicious scripts. Collect events related to Registry key creation and modification for keys that could be used for Office-based persistence.(Citation: CrowdStrike Outlook Forms)(Citation: Outlook Today Home Page) Modification to base templates, like Normal.dotm, should also be investigated since the base templates should likely not contain VBA macros. Changes to the Office macro security settings should also be investigated.(Citation: GlobalDotName Jun 2019)
Provide detailed information about CVE-2011-3305.
CVE ID: CVE-2011-3305 Date Updated: 2024-08-06T23:29:56.785Z Date Published: 2011-10-06T10:00:00 Description: Directory traversal vulnerability in Cisco Network Admission Control (NAC) Manager 4.8.x allows remote attackers to read arbitrary files via crafted traffic to TCP port 443, aka Bug ID CSCtq10755. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml - http://www.securitytracker.com/id?1026142 - http://secunia.com/advisories/46309 - http://www.securityfocus.com/bid/49954 - http://osvdb.org/76080 - https://exchange.xforce.ibmcloud.com/vulnerabilities/70335 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32368.
CVE ID: CVE-2023-32368 Date Updated: 2024-08-02T15:10:24.980Z Date Published: 2023-06-23T00:00:00 Description: An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, macOS Monterey 12.6.6, iOS 16.5 and iPadOS 16.5. Processing a 3D model may result in disclosure of process memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213758 - https://support.apple.com/en-us/HT213759 - https://support.apple.com/en-us/HT213764 - https://support.apple.com/en-us/HT213757 - https://support.apple.com/en-us/HT213761 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5437.
CVE ID: CVE-2017-5437 Date Updated: 2017-04-25T20:57:01 Date Published: 2017-04-25T21:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-41605.
CVE ID: CVE-2024-41605 Date Updated: 2024-09-27T12:55:43.863262 Date Published: 2024-09-26T00:00:00 Description: In Foxit PDF Reader before 2024.3, and PDF Editor before 2024.3 and 13.x before 13.1.4, an attacker can replace an update file with a Trojan horse via side loading, because the update service lacks integrity validation for the updater. Attacker-controlled code may thus be executed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.foxit.com/support/security-bulletins.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4994.
CVE ID: CVE-2012-4994 Date Updated: 2024-08-06T20:50:18.324Z Date Published: 2012-09-19T19:00:00 Description: SQL injection vulnerability in admin/admin.php in LimeSurvey before 1.91+ Build 120224 allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a browse action. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/79688 - http://www.limesurvey.org/en/stable-release - https://exchange.xforce.ibmcloud.com/vulnerabilities/73564 - http://freecode.com/projects/limesurvey/releases/342070 - http://secunia.com/advisories/48184 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10632.
CVE ID: CVE-2018-10632 Date Updated: 2024-09-17T03:23:02.337Z Date Published: 2018-07-24T17:00:00Z Description: In Moxa NPort 5210, 5230, and 5232 versions 2.9 build 17030709 and prior, the amount of resources requested by a malicious actor are not restricted, allowing for a denial-of-service condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/104863 - https://ics-cert.us-cert.gov/advisories/ICSA-18-200-04 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6249.
CVE ID: CVE-2012-6249 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10279.
CVE ID: CVE-2019-10279 Date Updated: 2024-08-04T22:17:19.742Z Date Published: 2019-04-04T15:38:49 Description: A missing permission check in Jenkins jenkins-reviewbot Plugin in the ReviewboardDescriptor#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/107790 - http://www.openwall.com/lists/oss-security/2019/04/12/2 - https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1091 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-46062.
CVE ID: CVE-2022-46062 Date Updated: 2024-08-03T14:24:03.201Z Date Published: 2022-12-13T00:00:00 Description: Gym Management System v0.0.1 is vulnerable to Cross Site Request Forgery (CSRF). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/rdyx0/CVE/blob/master/Gym%20Management%20System/CSRF/delete_user/delete_user.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-28448.
CVE ID: CVE-2021-28448 Date Updated: 2024-08-03T21:40:14.338Z Date Published: 2021-04-13T19:33:31 Description: Visual Studio Code Kubernetes Tools Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28448 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20628.
CVE ID: CVE-2022-20628 Date Updated: 2024-09-16T21:02:40.742Z Date Published: 2022-05-03T03:16:39.517948Z Description: Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-qXz4uAkM No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2690.
CVE ID: CVE-2022-2690 Date Updated: 2024-08-03T00:46:03.380Z Date Published: 2022-08-06T17:20:48 Description: A vulnerability classified as problematic was found in SourceCodester Wedding Hall Booking System. Affected by this vulnerability is an unknown functionality of the file /whbs/?page=my_bookings of the component Booking Form. The manipulation of the argument Remarks leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-205813 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Jamison2022/Wedding-Hall-Booking-System/blob/main/WHBS-XSS.md - https://vuldb.com/?id.205813 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5840.
CVE ID: CVE-2017-5840 Date Updated: 2024-08-05T15:11:48.806Z Date Published: 2017-02-09T15:00:00 Description: The qtdemux_parse_samples function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving the current stts index. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/96001 - http://www.debian.org/security/2017/dsa-3820 - https://access.redhat.com/errata/RHSA-2017:2060 - https://bugzilla.gnome.org/show_bug.cgi?id=777469 - http://www.openwall.com/lists/oss-security/2017/02/02/9 - https://gstreamer.freedesktop.org/releases/1.10/#1.10.3 - https://security.gentoo.org/glsa/201705-10 - http://www.openwall.com/lists/oss-security/2017/02/01/7 - https://lists.debian.org/debian-lts-announce/2020/05/msg00029.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2958.
CVE ID: CVE-2010-2958 Date Updated: 2024-08-07T02:55:46.503Z Date Published: 2010-09-08T19:00:00 Description: Cross-site scripting (XSS) vulnerability in libraries/Error.class.php in phpMyAdmin 3.x before 3.3.6 allows remote attackers to inject arbitrary web script or HTML via vectors related to a PHP backtrace and error messages (aka debugging messages), a different vulnerability than CVE-2010-3056. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/41206 - http://www.openwall.com/lists/oss-security/2010/09/01/2 - http://www.openwall.com/lists/oss-security/2010/09/01/3 - http://www.phpmyadmin.net/home_page/security/PMASA-2010-6.php - http://www.vupen.com/english/advisories/2010/2242 - http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=133a77fac7d31a38703db2099a90c1b49de62e37 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-2630.
CVE ID: CVE-2020-2630 Date Updated: 2024-09-30T16:03:17.464Z Date Published: 2020-01-15T16:34:04 Description: Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Extensibility Framework). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujan2020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8898.
CVE ID: CVE-2014-8898 Date Updated: 2024-08-06T13:33:11.924Z Date Published: 2014-12-22T16:00:00 Description: Cross-site scripting (XSS) vulnerability in the Collaboration Server in IBM InfoSphere Master Data Management Server for Product Information Management 9.x through 9.1 and InfoSphere Master Data Management - Collaborative Edition 10.x through 10.1, 11.0 before FP7, and 11.3 and 11.4 before 11.4 FP1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2014-8897 and CVE-2014-8899. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21692176 - https://exchange.xforce.ibmcloud.com/vulnerabilities/99051 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1005
The MITRE ATT&CK technique T1005: Data from Local System is related to the vulnerability CVE-CVE-2019-3786. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact.
Provide detailed information about CVE-2021-3453.
CVE ID: CVE-2021-3453 Date Updated: 2024-08-03T16:53:17.675Z Date Published: 2021-07-16T20:30:17 Description: Some Lenovo Notebook, ThinkPad, and Lenovo Desktop systems have BIOS modules unprotected by Intel Boot Guard that could allow an attacker with physical access the ability to write to the SPI flash storage. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.lenovo.com/us/en/product_security/LEN-65529 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-24123.
CVE ID: CVE-2023-24123 Date Updated: 2024-08-02T10:49:09.040Z Date Published: 2023-03-01T00:00:00 Description: Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepauth parameter at /goform/WifiBasicSet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://eagle.com - http://jensen.com - https://oxnan.com/posts/WifiBasic_wepauth_DoS No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24198.
CVE ID: CVE-2021-24198 Date Updated: 2024-08-03T19:21:18.665Z Date Published: 2021-04-12T13:58:49 Description: The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 has Improper Access Control. A low privilege authenticated user that visits the page where the table is published can tamper the parameters to delete the data of another user that are present in the same table through id_key and id_val parameters. By exploiting this issue an attacker is able to delete the data of all users in the same table. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpdatatables.com/help/whats-new-changelog/ - https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ - https://wpscan.com/vulnerability/d953bc62-8a6f-445b-a556-bc25cdd200e3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-29442.
CVE ID: CVE-2022-29442 Date Updated: 2024-09-17T04:20:39.948Z Date Published: 2022-06-15T15:38:43.691687Z Description: Authenticated (subscriber or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in Messages For WordPress <= 2.1.10 at WordPress. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/private-messages-for-wordpress/ - https://patchstack.com/database/vulnerability/private-messages-for-wordpress/wordpress-private-messages-for-wordpress-plugin-2-1-10-authenticated-stored-cross-site-scripting-xss-vulnerability No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32891.
CVE ID: CVE-2022-32891 Date Updated: 2024-08-03T07:54:03.134Z Date Published: 2023-02-27T00:00:00 Description: The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213446 - https://support.apple.com/en-us/HT213442 - https://support.apple.com/en-us/HT213486 - https://support.apple.com/en-us/HT213487 - https://security.gentoo.org/glsa/202305-32 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3325.
CVE ID: CVE-2015-3325 Date Updated: 2024-08-06T05:47:57.252Z Date Published: 2015-05-15T18:00:00 Description: SQL injection vulnerability in forum.php in the WP Symposium plugin before 15.4 for WordPress allows remote attackers to execute arbitrary SQL commands via the show parameter in the QUERY_STRING to the default URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/74237 - http://packetstormsecurity.com/files/131801/WordPress-WP-Symposium-15.1-SQL-Injection.html - https://www.exploit-db.com/exploits/37080/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3172.
CVE ID: CVE-2011-3172 Date Updated: 2024-09-17T04:28:45.768Z Date Published: 2018-06-08T13:00:00Z Description: A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://build.opensuse.org/request/show/80346 - https://bugzilla.suse.com/show_bug.cgi?id=707645 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3247.
CVE ID: CVE-2024-3247 Date Updated: 2024-08-01T20:05:08.335Z Date Published: 2024-04-02T22:57:35.394Z Description: In Xpdf 4.05 (and earlier), a PDF object loop in an object stream leads to infinite recursion and a stack overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://forum.xpdfreader.com/viewtopic.php?t=43597 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3048.
CVE ID: CVE-2023-3048 Date Updated: 2024-08-02T06:41:04.121Z Date Published: 2023-06-13T11:44:32.696Z Description: Authorization Bypass Through User-Controlled Key vulnerability in TMT Lockcell allows Authentication Abuse, Authentication Bypass.This issue affects Lockcell: before 15. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.usom.gov.tr/bildirim/tr-23-0345 - https://fordefence.com/cve-2023-3048-authorization-bypass-through-user-controlled-key-vulnerability-allows-authentication-abuse-authentication-bypass/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9462.
CVE ID: CVE-2016-9462 Date Updated: 2024-08-06T02:50:38.584Z Date Published: 2017-03-28T02:46:00 Description: Nextcloud Server before 9.0.52 & ownCloud Server before 9.0.4 are not properly verifying restore privileges when restoring a file. The restore capability of Nextcloud/ownCloud was not verifying whether a user has only read-only access to a share. Thus a user with read-only access was able to restore old versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/nextcloud/server/commit/1208953ba1d4d55a18a639846bbcdd66a2d5bc5e - https://github.com/owncloud/core/commit/c93eca49c32428ece03dd67042772d5fa62c8d6e - https://owncloud.org/security/advisory/?id=oc-sa-2016-015 - https://github.com/owncloud/core/commit/3b056fa68ce502ceb0db9b446dab3b9e7b10dd13 - https://github.com/owncloud/core/commit/d31720b6f1e8c8dfeb5e8805ab35ad7c8000b2f1 - http://www.securityfocus.com/bid/97285 - https://hackerone.com/reports/146067 - https://github.com/owncloud/core/commit/23383080731d092e079986464a8c4c9ffcb79f4c - https://nextcloud.com/security/advisory/?id=nc-sa-2016-005 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2534.
CVE ID: CVE-2010-2534 Date Updated: 2024-08-07T02:39:37.201Z Date Published: 2010-07-27T22:00:00 Description: The NetworkSyncCommandQueue function in network/network_command.cpp in OpenTTD before 1.0.3 does not properly clear a pointer in a linked list, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted request, related to the client command queue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/60568 - http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044565.html - http://www.vupen.com/english/advisories/2010/1888 - http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch - http://security.openttd.org/en/CVE-2010-2534 - http://www.openwall.com/lists/oss-security/2010/07/20/1 - http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044516.html - http://bugs.openttd.org/task/3909 - http://www.securityfocus.com/bid/41804 - http://osvdb.org/66503 - http://secunia.com/advisories/40760 - http://secunia.com/advisories/40630 - http://www.vupen.com/english/advisories/2010/1916 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12400.
CVE ID: CVE-2018-12400 Date Updated: 2024-08-05T08:38:04.959Z Date Published: 2019-02-28T18:00:00 Description: In private browsing mode on Firefox for Android, favicons are cached in the cache/icons folder as they are in non-private mode. This allows information leakage of sites visited during private browsing sessions. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox < 63. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1448305 - https://www.mozilla.org/security/advisories/mfsa2018-26/ - http://www.securityfocus.com/bid/105721 - http://www.securitytracker.com/id/1041944 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11220.
CVE ID: CVE-2017-11220 Date Updated: 2024-09-17T04:25:13.124Z Date Published: 2017-08-11T19:00:00Z Description: Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable heap overflow vulnerability in an internal data structure. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/100180 - https://helpx.adobe.com/security/products/acrobat/apsb17-24.html - http://www.securitytracker.com/id/1039098 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0065.
CVE ID: CVE-2021-0065 Date Updated: 2024-08-03T15:25:01.768Z Date Published: 2021-11-17T19:19:10 Description: Incorrect default permissions in the Intel(R) PROSet/Wireless WiFi software installer for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00509.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39135.
CVE ID: CVE-2023-39135 Date Updated: 2024-10-01T20:23:46.367Z Date Published: 2023-08-30T00:00:00 Description: An issue in Zip Swift v2.1.2 allows attackers to execute a path traversal attack via a crafted zip entry. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/marmelroy/Zip/issues/245 - https://security.snyk.io/research/zip-slip-vulnerability - https://blog.ostorlab.co/zip-packages-exploitation.html - https://ostorlab.co/vulndb/advisory/OVE-2023-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10758.
CVE ID: CVE-2019-10758 Date Updated: 2024-08-04T22:32:01.669Z Date Published: 2019-12-24T21:08:36 Description: mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method. A misuse of the `vm` dependency to perform `exec` commands in a non-safe environment. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12426.
CVE ID: CVE-2018-12426 Date Updated: 2024-08-05T08:38:05.886Z Date Published: 2018-07-02T17:00:00 Description: The WP Live Chat Support Pro plugin before 8.0.07 for WordPress is vulnerable to unauthenticated Remote Code Execution due to client-side validation of allowed file types, as demonstrated by a v1/remote_upload request with a .php filename and the image/jpeg content type. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/RiieCco/write-ups/tree/master/CVE-2018-12426 - https://github.com/CodeCabin/wp-live-chat-support/blob/master/readme.txt - https://wpvulndb.com/vulnerabilities/9697 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21381.
CVE ID: CVE-2021-21381 Date Updated: 2024-08-03T18:09:15.945Z Date Published: 2021-03-11T00:00:00 Description: Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4 and before version 1.10.2 has a vulnerability in the "file forwarding" feature which can be used by an attacker to gain access to files that would not ordinarily be allowed by the app's permissions. By putting the special tokens `@@` and/or `@@u` in the Exec field of a Flatpak app's .desktop file, a malicious app publisher can trick flatpak into behaving as though the user had chosen to open a target file with their Flatpak app, which automatically makes that file available to the Flatpak app. This is fixed in version 1.10.2. A minimal solution is the first commit "`Disallow @@ and @@U usage in desktop files`". The follow-up commits "`dir: Reserve the whole @@ prefix`" and "`dir: Refuse to export .desktop files with suspicious uses of @@ tokens`" are recommended, but not strictly required. As a workaround, avoid installing Flatpak apps from untrusted sources, or check the contents of the exported `.desktop` files in `exports/share/applications/*.desktop` (typically `~/.local/share/flatpak/exports/share/applications/*.desktop` and `/var/lib/flatpak/exports/share/applications/*.desktop`) to make sure that literal filenames do not follow `@@` or `@@u`. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/flatpak/flatpak/security/advisories/GHSA-xgh4-387p-hqpp - https://github.com/flatpak/flatpak/pull/4156 - https://github.com/flatpak/flatpak/commit/8279c5818425b6812523e3805bbe242fb6a5d961 - https://github.com/flatpak/flatpak/commit/a7401e638bf0c03102039e216ab1081922f140ae - https://github.com/flatpak/flatpak/commit/eb7946bb6248923d8c90fe9b84425fef97ae580d - https://github.com/flatpak/flatpak/releases/tag/1.10.2 - https://www.debian.org/security/2021/dsa-4868 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXNVFOIB6ZP4DGOVKAM25T6OIEP3YLGV/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MXXLXC2DPJ45HSMTI5MZYHMYEGQN6AA/ - https://security.gentoo.org/glsa/202312-12 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3183.
CVE ID: CVE-2012-3183 Date Updated: 2024-08-06T19:57:50.205Z Date Published: 2012-10-17T00:00:00 Description: Unspecified vulnerability in the Oracle WebCenter Sites component in Oracle Fusion Middleware 6.1, 6.2, 6.3.x, 7, 7.0.1, 7.0.2, 7.0.3, 7.5, 7.6.1, 7.6.2, and 11.1.1.6.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Advanced UI, a different vulnerability than CVE-2012-3185 and CVE-2012-3186. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html - http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3834.
CVE ID: CVE-2014-3834 Date Updated: 2024-08-06T10:57:17.560Z Date Published: 2014-06-04T14:00:00 Description: ownCloud Server before 6.0.3 does not properly check permissions, which allows remote authenticated users to (1) access the contacts of other users via the address book or (2) rename files via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://owncloud.org/about/security/advisories/oc-sa-2014-011/ - http://owncloud.org/about/security/advisories/oc-sa-2014-013/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-43773.
CVE ID: CVE-2024-43773 Date Updated: 2024-09-03T14:21:34.214Z Date Published: 2024-09-02T04:01:43.939Z Description: SQL Injection in download class learning course function of Easytest Online Test Platform ver.24E01 and earlier allow remote attackers to execute arbitrary SQL commands via the cstr parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://zuso.ai/advisory/za-2024-06 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4465.
CVE ID: CVE-2013-4465 Date Updated: 2024-09-16T22:09:41.285Z Date Published: 2013-10-25T23:00:00Z Description: Unrestricted file upload vulnerability in the avatar upload functionality in Simple Machines Forum before 2.0.6 and 2.1 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/SimpleMachines/SMF2.1/issues/701 - http://download.simplemachines.org/index.php?thanks%3Bfilename=smf_2-0-6_changelog.txt - http://www.securityfocus.com/bid/63275 - http://www.openwall.com/lists/oss-security/2013/10/25/3 - http://www.openwall.com/lists/oss-security/2013/10/23/6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0629.
CVE ID: CVE-2014-0629 Date Updated: 2024-08-06T09:20:19.739Z Date Published: 2014-03-06T11:00:00 Description: EMC Documentum TaskSpace (TSP) 6.7SP1 before P25 and 6.7SP2 before P11 does not properly handle the interaction between the dm_world group and the dm_superusers_dynamic group, which allows remote authenticated users to obtain sensitive information and gain privileges in opportunistic circumstances by leveraging an incorrect group-addition implementation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/bugtraq/2014/Mar/33 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49781.
CVE ID: CVE-2023-49781 Date Updated: 2024-08-02T22:01:25.824Z Date Published: 2024-05-13T18:54:54.196Z Description: NocoDB is software for building databases as spreadsheets. Prior to 0.202.9, a stored cross-site scripting vulnerability exists within the Formula virtual cell comments functionality. The nc-gui/components/virtual-cell/Formula.vue displays a v-html tag with the value of "urls" whose contents are processed by the function replaceUrlsWithLink(). This function recognizes the pattern URI::(XXX) and creates a hyperlink tag <a> with href=XXX. However, it leaves all the other contents outside of the pattern URI::(XXX) unchanged. This vulnerability is fixed in 0.202.9. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/nocodb/nocodb/security/advisories/GHSA-h6r4-xvw6-jc5h - https://github.com/nocodb/nocodb/commit/7f58ce3726dfec71537d8b80474a0f95a48a1574 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39376.
CVE ID: CVE-2021-39376 Date Updated: 2024-08-04T02:06:42.428Z Date Published: 2021-08-24T12:38:05 Description: Philips Healthcare Tasy Electronic Medical Record (EMR) 3.06 allows SQL injection via the CorCad_F2/executaConsultaEspecifico IE_CORPO_ASSIST or CD_USUARIO_CONVENIO parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://diesec.home.blog/2021/08/24/philips-tasy-emr-3-06-sql-injection-cve-2021-39375cve-2021-39376/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32696.
CVE ID: CVE-2021-32696 Date Updated: 2024-08-03T23:25:31.066Z Date Published: 2021-06-18T19:35:13 Description: The npm package "striptags" is an implementation of PHP's strip_tags in Typescript. In striptags before version 3.2.0, a type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function. This can lead to a XSS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r - https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca - https://github.com/ericnorris/striptags/releases/tag/v3.2.0 - https://www.npmjs.com/package/striptags No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2525.
CVE ID: CVE-2012-2525 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33574.
CVE ID: CVE-2021-33574 Date Updated: 2024-08-03T23:50:43.098Z Date Published: 2021-05-25T00:00:00 Description: The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sourceware.org/bugzilla/show_bug.cgi?id=27896 - https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ - https://security.netapp.com/advisory/ntap-20210629-0005/ - https://security.gentoo.org/glsa/202107-07 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/ - https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27834.
CVE ID: CVE-2024-27834 Date Updated: 2024-08-02T00:41:55.789Z Date Published: 2024-05-13T23:00:50.836Z Description: The issue was addressed with improved checks. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, Safari 17.5, watchOS 10.5, macOS Sonoma 14.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT214101 - https://support.apple.com/en-us/HT214106 - https://support.apple.com/en-us/HT214104 - https://support.apple.com/en-us/HT214103 - https://support.apple.com/en-us/HT214102 - http://seclists.org/fulldisclosure/2024/May/17 - http://www.openwall.com/lists/oss-security/2024/05/21/1 - http://seclists.org/fulldisclosure/2024/May/10 - http://seclists.org/fulldisclosure/2024/May/9 - http://seclists.org/fulldisclosure/2024/May/12 - http://seclists.org/fulldisclosure/2024/May/16 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4886.
CVE ID: CVE-2010-4886 Date Updated: 2024-09-17T04:09:58.649Z Date Published: 2011-10-07T10:00:00Z Description: Cross-site scripting (XSS) vulnerability in the "official twitter tweet button for your page" (tweetbutton) extension before 1.0.5 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/42941 - http://secunia.com/advisories/41268 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-018/ - http://typo3.org/extensions/repository/view/tweetbutton/1.0.5/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-35086.
CVE ID: CVE-2023-35086 Date Updated: 2024-08-02T16:23:59.139Z Date Published: 2023-07-21T06:32:20.831Z Description: It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. A remote attacker with administrator privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. This issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.twcert.org.tw/tw/cp-132-7240-a5f96-1.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10759.
CVE ID: CVE-2016-10759 Date Updated: 2024-08-06T03:38:55.191Z Date Published: 2019-05-24T17:41:57 Description: The Xinha plugin in Precurio 2.1 allows Directory Traversal, with resultant arbitrary code execution, via ExtendedFileManager/Classes/ExtendedFileManager.php because ExtendedFileManager can be used to rename the .htaccess file that blocks .php uploads. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.ripstech.com/2016/precurio-remote-command-execution-via-xinha-plugin/ - https://demo.ripstech.com/projects/precurio_2.1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10596.
CVE ID: CVE-2016-10596 Date Updated: 2024-09-17T00:40:50.717Z Date Published: 2018-06-01T18:00:00Z Description: imageoptim is a Node.js wrapper for some images compression algorithms. imageoptim downloads zipped resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested tarball with an attacker controlled tarball if the attacker is on the network or positioned in between the user and the remote server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nodesecurity.io/advisories/194 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46265.
CVE ID: CVE-2021-46265 Date Updated: 2024-08-04T05:02:10.381Z Date Published: 2022-02-15T19:08:31 Description: Tenda AC Series Router AC11_V02.03.01.104_CN was discovered to contain a stack buffer overflow in the wanBasicCfg module. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Ainevsia/CVE-Request/tree/main/Tenda/13 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41462.
CVE ID: CVE-2021-41462 Date Updated: 2024-08-04T03:15:28.343Z Date Published: 2021-10-01T15:42:15 Description: Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the ctID parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/concrete5/concrete5-legacy/issues/2006 - https://github.com/concrete5/concrete5-legacy No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2928.
CVE ID: CVE-2017-2928 Date Updated: 2024-08-05T14:09:17.795Z Date Published: 2017-01-11T04:40:00 Description: Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to setting visual mode effects. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201702-20 - https://helpx.adobe.com/security/products/flash-player/apsb17-02.html - http://rhn.redhat.com/errata/RHSA-2017-0057.html - http://www.securitytracker.com/id/1037570 - http://www.securityfocus.com/bid/95350 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4719.
CVE ID: CVE-2010-4719 Date Updated: 2024-08-07T03:55:35.128Z Date Published: 2011-02-01T22:00:00 Description: Directory traversal vulnerability in JRadio (com_jradio) component before 1.5.1 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the controller parameter to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.fxwebdesign.nl/index.php?option=com_content&view=article&id=20&Itemid=56 - http://packetstormsecurity.org/files/view/96751/joomlajradio-lfi.txt - https://exchange.xforce.ibmcloud.com/vulnerabilities/64143 - http://www.securityfocus.com/bid/45440 - http://secunia.com/advisories/42600 - http://www.exploit-db.com/exploits/15749 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39666.
CVE ID: CVE-2024-39666 Date Updated: 2024-08-19T13:41:17.377Z Date Published: 2024-08-18T13:37:18.254Z Description: Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Automattic WooCommerce.This issue affects WooCommerce: from n/a through 9.1.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/woocommerce/wordpress-woocommerce-plugin-9-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22249.
CVE ID: CVE-2021-22249 Date Updated: 2024-08-03T18:37:18.281Z Date Published: 2021-08-23T19:53:20 Description: A verbose error message in GitLab EE affecting all versions since 12.2 could disclose the private email address of a user invited to a group No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab/-/issues/331857 - https://hackerone.com/reports/1204320 - https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22249.json No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0261.
CVE ID: CVE-2020-0261 Date Updated: 2024-08-04T05:55:12.517Z Date Published: 2020-08-13T15:47:19 Description: In C2 flame devices, there is a possible bypass of seccomp due to a missing configuration file. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-146059841 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2020-08-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-35816.
CVE ID: CVE-2024-35816 Date Updated: 2024-09-11T17:32:51.333Z Date Published: 2024-05-17T13:23:21.051Z Description: In the Linux kernel, the following vulnerability has been resolved: firewire: ohci: prevent leak of left-over IRQ on unbind Commit 5a95f1ded28691e6 ("firewire: ohci: use devres for requested IRQ") also removed the call to free_irq() in pci_remove(), leading to a leftover irq of devm_request_irq() at pci_disable_msi() in pci_remove() when unbinding the driver from the device remove_proc_entry: removing non-empty directory 'irq/136', leaking at least 'firewire_ohci' Call Trace: ? remove_proc_entry+0x19c/0x1c0 ? __warn+0x81/0x130 ? remove_proc_entry+0x19c/0x1c0 ? report_bug+0x171/0x1a0 ? console_unlock+0x78/0x120 ? handle_bug+0x3c/0x80 ? exc_invalid_op+0x17/0x70 ? asm_exc_invalid_op+0x1a/0x20 ? remove_proc_entry+0x19c/0x1c0 unregister_irq_proc+0xf4/0x120 free_desc+0x3d/0xe0 ? kfree+0x29f/0x2f0 irq_free_descs+0x47/0x70 msi_domain_free_locked.part.0+0x19d/0x1d0 msi_domain_free_irqs_all_locked+0x81/0xc0 pci_free_msi_irqs+0x12/0x40 pci_disable_msi+0x4c/0x60 pci_remove+0x9d/0xc0 [firewire_ohci 01b483699bebf9cb07a3d69df0aa2bee71db1b26] pci_device_remove+0x37/0xa0 device_release_driver_internal+0x19f/0x200 unbind_store+0xa1/0xb0 remove irq with devm_free_irq() before pci_disable_msi() also remove it in fail_msi: of pci_probe() as this would lead to an identical leak No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/43c70cbc2502cf2557105c662eeed6a15d082b88 - https://git.kernel.org/stable/c/318f6d53dd425c400e35f1a9b7af682c2c6a66d6 - https://git.kernel.org/stable/c/575801663c7dc38f826212b39e3b91a4a8661c33 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-28176.
CVE ID: CVE-2021-28176 Date Updated: 2024-09-17T01:41:07.100Z Date Published: 2021-04-06T05:01:59.929256Z Description: The DNS configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.asus.com/content/ASUS-Product-Security-Advisory/ - https://www.asus.com/tw/support/callus/ - https://www.twcert.org.tw/tw/cp-132-4544-0a409-1.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29593.
CVE ID: CVE-2021-29593 Date Updated: 2024-08-03T22:11:06.253Z Date Published: 2021-05-14T19:22:17 Description: TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `BatchToSpaceNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82). An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfx7-2xpc-8w4h - https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-19768.
CVE ID: CVE-2020-19768 Date Updated: 2024-08-04T14:15:28.699Z Date Published: 2021-09-07T21:59:24 Description: A lack of target address verification in the selfdestructs() function of ICOVO 1.0 allows attackers to steal tokens from victim users via a crafted script. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/OSUPlayer/CVEs/blob/master/Suicidal/2019-07-09-02.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7786.
CVE ID: CVE-2019-7786 Date Updated: 2024-08-04T20:54:28.469Z Date Published: 2019-05-22T13:49:40 Description: Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-18.html - http://www.securityfocus.com/bid/108320 - https://www.zerodayinitiative.com/advisories/ZDI-19-487/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3890.
CVE ID: CVE-2023-3890 Date Updated: 2024-08-02T07:08:50.664Z Date Published: 2023-07-25T08:31:03.628Z Description: A vulnerability classified as problematic has been found in Campcodes Beauty Salon Management System 1.0. This affects an unknown part of the file /admin/edit-accepted-appointment.php. The manipulation of the argument id leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235251. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.235251 - https://vuldb.com/?ctiid.235251 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2021.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16060.
CVE ID: CVE-2017-16060 Date Updated: 2024-09-17T03:48:25.761Z Date Published: 2018-06-07T02:00:00Z Description: babelcli was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nodesecurity.io/advisories/499 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6013.
CVE ID: CVE-2008-6013 Date Updated: 2024-08-07T11:13:13.995Z Date Published: 2009-01-30T18:03:00 Description: Multiple SQL injection vulnerabilities in Freeway before 1.4.3.210 allow remote attackers to execute arbitrary SQL commands via unspecified vectors involving the (1) advanced search result and (2) service resource pages. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32003 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45549 - http://www.openfreeway.org/download/change-log.html - http://www.securityfocus.com/bid/31508 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5220.
CVE ID: CVE-2024-5220 Date Updated: 2024-08-01T21:03:11.064Z Date Published: 2024-05-25T01:51:00.452Z Description: The ND Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's upload feature in all versions up to, and including, 7.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/5cbd6040-0446-41fe-8fef-c9065beeaa3a?source=cve - https://plugins.trac.wordpress.org/browser/nd-shortcodes/tags/7.3/nd-shortcodes.php#L63 - https://plugins.trac.wordpress.org/changeset/3091778/nd-shortcodes/trunk/nd-shortcodes.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-10052.
CVE ID: CVE-2015-10052 Date Updated: 2024-08-06T08:58:26.400Z Date Published: 2023-01-15T18:58:03.486Z Description: ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The patch is named 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.218379 - https://vuldb.com/?ctiid.218379 - https://github.com/calesanz/gibb-modul-151/commit/88a517dc19443081210c804b655e72770727540d No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2562.
CVE ID: CVE-2016-2562 Date Updated: 2024-08-05T23:32:20.950Z Date Published: 2016-03-01T11:00:00 Description: The checkHTTP function in libraries/Config.class.php in phpMyAdmin 4.5.x before 4.5.5.1 does not verify X.509 certificates from api.github.com SSL servers, which allows man-in-the-middle attackers to spoof these servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178562.html - https://github.com/phpmyadmin/phpmyadmin/commit/e42b7e3aedd29dd0f7a48575f20bfc5aca0ff976 - https://www.phpmyadmin.net/security/PMASA-2016-13/ - http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178869.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-22014.
CVE ID: CVE-2023-22014 Date Updated: 2024-09-13T17:50:27.809Z Date Published: 2023-07-18T20:18:12.204Z Description: Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where PeopleSoft Enterprise PeopleTools executes to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in takeover of PeopleSoft Enterprise PeopleTools. CVSS 3.1 Base Score 8.4 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujul2023.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20833.
CVE ID: CVE-2019-20833 Date Updated: 2024-08-05T02:53:09.391Z Date Published: 2020-06-04T16:49:30 Description: An issue was discovered in Foxit PhantomPDF before 8.3.10. It has mishandling of cloud credentials, as demonstrated by Google Drive. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.foxitsoftware.com/support/security-bulletins.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8020.
CVE ID: CVE-2018-8020 Date Updated: 2024-09-17T01:20:59.717Z Date Published: 2018-07-31T13:00:00Z Description: Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 has a flaw that does not properly check OCSP pre-produced responses, which are lists (multiple entries) of certificate statuses. Subsequently, revoked client certificates may not be properly identified, allowing for users to authenticate with revoked certificates to connections that require mutual TLS. Users not using OCSP checks are not affected by this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180721101944.GA45239%40minotaur.apache.org%3E - https://access.redhat.com/errata/RHSA-2018:2469 - http://www.securityfocus.com/bid/104934 - https://lists.debian.org/debian-lts-announce/2018/08/msg00023.html - https://access.redhat.com/errata/RHSA-2018:2470 - http://www.securitytracker.com/id/1041507 - https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E - https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E - https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E - https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E - https://lists.apache.org/thread.html/r831e0548fad736a98140d0b3b7dc575af0c50faea0b266434ba813cc%40%3Cdev.rocketmq.apache.org%3E - https://lists.apache.org/thread.html/rcddf723a4b4117f8ed6042e9ac25e8c5110a617bab77694b61b14833%40%3Cdev.rocketmq.apache.org%3E - https://lists.apache.org/thread.html/rb25b42f666d2cac5e6e6b3f771faf60d1f1aa58073dcdd8db14edf8a%40%3Cdev.rocketmq.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0829.
CVE ID: CVE-2008-0829 Date Updated: 2024-08-07T08:01:39.013Z Date Published: 2008-02-19T21:00:00 Description: SQL injection vulnerability in jooget.php in the Joomlapixel Jooget! (com_jooget) 2.6.8 component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail task. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/27836 - https://www.exploit-db.com/exploits/5132 - http://secunia.com/advisories/28998 - http://forum.joomlaitalia.com/index.php?topic=388.0 - http://members.joomlapixel.eu/download/componenti/patch-jooget-2.6.8-sql-injection/details.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-28488.
CVE ID: CVE-2020-28488 Date Updated: 2021-02-02T18:48:22 Date Published: 2021-01-22T13:40:14 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32884.
CVE ID: CVE-2023-32884 Date Updated: 2024-08-02T15:32:46.441Z Date Published: 2024-01-02T02:49:56.354Z Description: In netdagent, there is a possible information disclosure due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07944011; Issue ID: ALPS07944011. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/January-2024 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7627.
CVE ID: CVE-2015-7627 Date Updated: 2024-08-06T07:58:58.372Z Date Published: 2015-10-14T23:00:00 Description: Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2015-2024.html - http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html - http://www.securityfocus.com/bid/77065 - http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html - http://rhn.redhat.com/errata/RHSA-2015-1893.html - https://security.gentoo.org/glsa/201511-02 - http://www.securitytracker.com/id/1033797 - https://helpx.adobe.com/security/products/flash-player/apsb15-25.html - http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html - http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1400.
CVE ID: CVE-2010-1400 Date Updated: 2024-08-07T01:21:19.067Z Date Published: 2010-06-11T17:28:00 Description: Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving caption elements. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 - http://support.apple.com/kb/HT4220 - http://www.vupen.com/english/advisories/2010/2722 - http://secunia.com/advisories/43068 - http://www.ubuntu.com/usn/USN-1006-1 - http://secunia.com/advisories/41856 - http://www.vupen.com/english/advisories/2011/0212 - http://support.apple.com/kb/HT4225 - http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html - http://secunia.com/advisories/40196 - http://secunia.com/advisories/40105 - http://www.vupen.com/english/advisories/2010/1373 - http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - http://www.vupen.com/english/advisories/2010/1512 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7031 - http://www.securityfocus.com/bid/40620 - http://www.vupen.com/english/advisories/2011/0552 - http://securitytracker.com/id?1024067 - http://support.apple.com/kb/HT4196 - http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html - http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=870 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0344.
CVE ID: CVE-2024-0344 Date Updated: 2024-08-01T18:04:49.021Z Date Published: 2024-01-09T21:00:05.468Z Description: A vulnerability, which was classified as critical, has been found in soxft TimeMail up to 1.1. Affected by this issue is some unknown functionality of the file check.php. The manipulation of the argument c leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250112. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.250112 - https://vuldb.com/?ctiid.250112 - https://note.zhaoj.in/share/VSutvlpgCJkD No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-5864.
CVE ID: CVE-2020-5864 Date Updated: 2024-08-04T08:39:25.957Z Date Published: 2020-04-23T18:32:40 Description: In versions of NGINX Controller prior to 3.2.0, communication between NGINX Controller and NGINX Plus instances skip TLS verification by default. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.f5.com/csp/article/K27205552 - https://security.netapp.com/advisory/ntap-20200430-0005/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.