instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2023-20684.
CVE ID: CVE-2023-20684 Date Updated: 2024-08-02T09:14:39.847Z Date Published: 2023-04-06T00:00:00 Description: In vdec, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07671069; Issue ID: ALPS07671069. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/April-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38031.
CVE ID: CVE-2024-38031 Date Updated: 2024-09-19T17:36:48.455Z Date Published: 2024-07-09T17:03:09.006Z Description: Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38031 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7833.
CVE ID: CVE-2018-7833 Date Updated: 2024-08-05T06:37:59.565Z Date Published: 2018-12-17T22:00:00 Description: An Improper Check for Unusual or Exceptional Conditions vulnerability exists in the embedded web servers in all Modicon M340, Premium, Quantum PLCs and BMXNOR0200 where an unauthenticated user can send a specially crafted XML data via a POST request to cause the web server to become unavailable No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7434.
CVE ID: CVE-2018-7434 Date Updated: 2024-08-05T06:24:11.985Z Date Published: 2018-02-24T03:00:00 Description: zzcms 8.2 allows remote attackers to discover the full path via a direct request to 3/qq_connect2.0/API/class/ErrorCase.class.php or 3/ucenter_api/code/friend.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/kongxin520/zzcms/blob/master/zzcms_8.2_bug.md - https://kongxin.gitbook.io/zzcms-8-2-bug/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3568.
CVE ID: CVE-2014-3568 Date Updated: 2024-08-06T10:50:17.862Z Date Published: 2014-10-19T01:00:00 Description: OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://marc.info/?l=bugtraq&m=142103967620673&w=2 - http://marc.info/?l=bugtraq&m=142804214608580&w=2 - http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html - http://marc.info/?l=bugtraq&m=141477196830952&w=2 - http://secunia.com/advisories/61130 - https://www.openssl.org/news/secadv_20141015.txt - http://secunia.com/advisories/62070 - http://www.securityfocus.com/bid/70585 - http://secunia.com/advisories/61073 - http://marc.info/?l=bugtraq&m=142791032306609&w=2 - https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=26a59d9b46574e457870197dffa802871b4c8fc7 - http://security.gentoo.org/glsa/glsa-201412-39.xml - http://www.debian.org/security/2014/dsa-3053 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888 - http://marc.info/?l=bugtraq&m=142495837901899&w=2 - https://support.apple.com/HT205217 - http://marc.info/?l=bugtraq&m=142103967620673&w=2 - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 - http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html - http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html - https://kc.mcafee.com/corporate/index?page=content&id=SB10091 - https://exchange.xforce.ibmcloud.com/vulnerabilities/97037 - ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc - http://support.apple.com/HT204244 - http://marc.info/?l=bugtraq&m=141477196830952&w=2 - http://secunia.com/advisories/61207 - http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html - http://secunia.com/advisories/62124 - http://secunia.com/advisories/59627 - http://marc.info/?l=bugtraq&m=142495837901899&w=2 - http://marc.info/?l=bugtraq&m=143290437727362&w=2 - http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html - http://secunia.com/advisories/61959 - https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6 - http://marc.info/?l=bugtraq&m=142624590206005&w=2 - http://marc.info/?l=bugtraq&m=143290522027658&w=2 - http://secunia.com/advisories/61058 - http://secunia.com/advisories/62030 - https://support.citrix.com/article/CTX216642 - http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html - http://www.securitytracker.com/id/1031053 - http://secunia.com/advisories/61819 - http://www-01.ibm.com/support/docview.wss?uid=swg21686997 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20528.
CVE ID: CVE-2022-20528 Date Updated: 2024-08-03T02:17:52.663Z Date Published: 2022-12-16T00:00:00 Description: In findParam of HevcUtils.cpp there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-230172711 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2022-12-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0022.
CVE ID: CVE-2011-0022 Date Updated: 2024-08-06T21:43:13.719Z Date Published: 2011-02-23T18:00:00 Description: The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (daemon outage or arbitrary process termination) by replacing PID files contained in this directory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id?1025102 - http://www.redhat.com/support/errata/RHSA-2011-0293.html - https://bugzilla.redhat.com/show_bug.cgi?id=671199 - http://www.securityfocus.com/bid/46489 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-26203.
CVE ID: CVE-2023-26203 Date Updated: 2024-08-02T11:39:06.592Z Date Published: 2023-05-03T21:27:00.343Z Description: A use of hard-coded credentials vulnerability [CWE-798] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions may allow an authenticated attacker to access to the database via shell commands. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/psirt/FG-IR-22-520 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-43216.
CVE ID: CVE-2023-43216 Date Updated: 2024-09-24T15:19:32.002Z Date Published: 2023-09-26T00:00:00 Description: SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_ip.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/H3ppo/vulnerabilities/blob/main/SeaCMS%20V12.9%20Arbitrary%20file%20write%20vulnerability.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26260.
CVE ID: CVE-2021-26260 Date Updated: 2024-08-03T20:19:20.135Z Date Published: 2021-06-08T00:00:00 Description: An integer overflow leading to a heap-buffer overflow was found in the DwaCompressor of OpenEXR in versions before 3.0.1. An attacker could use this flaw to crash an application compiled with OpenEXR. This is a different flaw from CVE-2021-23215. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BXFLD4ZAXKAIWO6ZPBCQEEDZB5IG676K/ - https://bugzilla.redhat.com/show_bug.cgi?id=1947582 - https://lists.debian.org/debian-lts-announce/2021/07/msg00001.html - https://www.debian.org/security/2022/dsa-5299 - https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4101.
CVE ID: CVE-2015-4101 Date Updated: 2022-07-08T17:37:01 Date Published: 2022-07-08T17:37:01 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0349.
CVE ID: CVE-2010-0349 Date Updated: 2024-09-16T19:09:27.902Z Date Published: 2010-01-15T20:00:00Z Description: Cross-site scripting (XSS) vulnerability in C3 Corp. WebCalenderC3 0.32 and earlier allows remote attackers to inject arbitrary web script or HTML via unknown vectors. NOTE: this issue could not be reproduced by the vendor, but a patch was provided anyway. The original researcher is reliable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.osvdb.org/61629 - http://webcal.c-3.jp/zeijakusei.html - http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000002.html - http://secunia.com/advisories/38135 - http://jvn.jp/en/jp/JVN33977065/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2454.
CVE ID: CVE-2013-2454 Date Updated: 2024-08-06T15:36:46.544Z Date Published: 2013-06-18T22:00:00 Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=975129 - http://rhn.redhat.com/errata/RHSA-2013-1060.html - http://marc.info/?l=bugtraq&m=137545592101387&w=2 - https://access.redhat.com/errata/RHSA-2014:0414 - http://security.gentoo.org/glsa/glsa-201406-32.xml - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html - http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html - http://marc.info/?l=bugtraq&m=137545505800971&w=2 - http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html - http://secunia.com/advisories/54154 - http://rhn.redhat.com/errata/RHSA-2013-1455.html - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19237 - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880 - http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19470 - http://rhn.redhat.com/errata/RHSA-2013-1059.html - http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/ec931d812faa - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17236 - http://www.securityfocus.com/bid/60650 - http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html - http://rhn.redhat.com/errata/RHSA-2013-1081.html - http://www.us-cert.gov/ncas/alerts/TA13-169A - http://advisories.mageia.org/MGASA-2013-0185.html - http://rhn.redhat.com/errata/RHSA-2013-0963.html - http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html - http://rhn.redhat.com/errata/RHSA-2013-1456.html - http://www.mandriva.com/security/advisories?name=MDVSA-2013:183 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19407 - http://www-01.ibm.com/support/docview.wss?uid=swg21642336 - http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6764.
CVE ID: CVE-2015-6764 Date Updated: 2024-08-06T07:29:24.749Z Date Published: 2015-12-06T01:00:00 Description: The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://googlechromereleases.blogspot.com/2015/12/stable-channel-update.html - https://code.google.com/p/chromium/issues/detail?id=554946 - http://lists.opensuse.org/opensuse-updates/2016-01/msg00045.html - https://chromium.googlesource.com/v8/v8/+/6df9a1db8c85ab63dee63879456b6027df53fabc - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html - https://codereview.chromium.org/1440223002 - https://security.gentoo.org/glsa/201603-09 - http://www.debian.org/security/2015/dsa-3415 - http://www.securityfocus.com/bid/78209 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html - http://www.securitytracker.com/id/1034298 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33873.
CVE ID: CVE-2022-33873 Date Updated: 2024-08-03T08:09:22.674Z Date Published: 2022-10-10T00:00:00 Description: An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerabilities [CWE-78] in Console login components of FortiTester 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an unauthenticated attacker to execute arbitrary command in the underlying shell. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/psirt/FG-IR-22-237 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-0272.
CVE ID: CVE-2022-0272 Date Updated: 2024-08-02T23:25:40.273Z Date Published: 2022-04-21T16:20:10 Description: Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/23e37ba7-96d5-4037-a90a-8c8f4a70ce44 - https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8288.
CVE ID: CVE-2014-8288 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0623.
CVE ID: CVE-2021-0623 Date Updated: 2024-08-03T15:47:28.200Z Date Published: 2021-11-18T14:55:44 Description: In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/November-2021 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9157.
CVE ID: CVE-2016-9157 Date Updated: 2024-08-06T02:42:11.024Z Date Published: 2016-12-05T08:09:00 Description: A vulnerability in Siemens SICAM PAS (all versions before V8.09) could allow a remote attacker to cause a Denial of Service condition and potentially lead to unauthenticated remote code execution by sending specially crafted packets to port 19234/TCP. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/94549 - http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-946325.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3551.
CVE ID: CVE-2008-3551 Date Updated: 2024-08-07T09:45:18.936Z Date Published: 2008-08-08T19:00:00 Description: Multiple unspecified vulnerabilities in Sun Java Platform Micro Edition (aka Java ME, J2ME, or mobile Java), as distributed in Sun Wireless Toolkit 2.5.2, allow remote attackers to execute arbitrary code via unknown vectors. NOTE: as of 20080807, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a company led by a well-known researcher, it is being assigned a CVE identifier for tracking purposes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/44478 - http://www.security-explorations.com/n2vendors.htm - http://www.securityfocus.com/archive/1/495224/100/0/threaded - http://www.security-explorations.com/n2srp.htm - http://www.securityfocus.com/bid/30591 - http://www.security-explorations.com/report_toc.pdf - http://www.security-explorations.com/n2press.htm No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8414.
CVE ID: CVE-2020-8414 Date Updated: 2021-04-13T20:41:42 Date Published: 2021-04-13T20:41:42 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20885.
CVE ID: CVE-2023-20885 Date Updated: 2024-08-02T09:21:33.133Z Date Published: 2023-06-16T12:18:35.886Z Description: Vulnerability in Cloud Foundry Notifications, Cloud Foundry SMB-volume release, Cloud FOundry cf-nfs-volume release.This issue affects Notifications: All versions prior to 63; SMB-volume release: All versions prior to 3.1.19; cf-nfs-volume release: 5.0.X versions prior to 5.0.27, 7.1.X versions prior to 7.1.19. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cloudfoundry.org/blog/cve-2023-20885-cf-workflows-leak-credentials-in-system-audit-logs/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42134.
CVE ID: CVE-2021-42134 Date Updated: 2024-08-04T03:30:36.355Z Date Published: 2021-10-11T00:55:43 Description: The Unicorn framework before 0.36.1 for Django allows XSS via a component. NOTE: this issue exists because of an incomplete fix for CVE-2021-42053. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/adamghill/django-unicorn/commit/3a832a9e3f6455ddd3b87f646247269918ad10c6 - https://github.com/adamghill/django-unicorn/compare/0.36.0...0.36.1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2302.
CVE ID: CVE-2017-2302 Date Updated: 2024-08-05T13:48:05.249Z Date Published: 2017-05-30T14:00:00 Description: On Juniper Networks products or platforms running Junos OS 12.1X46 prior to 12.1X46-D55, 12.1X47 prior to 12.1X47-D45, 12.3R13 prior to 12.3R13, 12.3X48 prior to 12.3X48-D35, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D40, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R6, 15.1 prior to 15.1F2 or 15.1R1, 15.1X49 prior to 15.1X49-D20 where the BGP add-path feature is enabled with 'send' option or with both 'send' and 'receive' options, a network based attacker can cause the Junos OS rpd daemon to crash and restart. Repeated crashes of the rpd daemon can result in an extended denial of service condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.juniper.net/JSA10771 - http://www.securitytracker.com/id/1037595 - http://www.securityfocus.com/bid/95394 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-0777.
CVE ID: CVE-2012-0777 Date Updated: 2024-08-06T18:38:14.325Z Date Published: 2012-04-10T23:00:00 Description: The JavaScript API in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 on Mac OS X and Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2012-0469.html - http://secunia.com/advisories/48756 - http://www.adobe.com/support/security/bulletins/apsb12-08.html - http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00017.html - http://www.securityfocus.com/bid/52950 - http://secunia.com/advisories/48846 - http://www.us-cert.gov/cas/techalerts/TA12-101B.html - http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00016.html - http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00013.html - http://www.securitytracker.com/id?1026908 - https://exchange.xforce.ibmcloud.com/vulnerabilities/74735 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10912.
CVE ID: CVE-2017-10912 Date Updated: 2024-08-05T17:50:12.720Z Date Published: 2017-07-05T01:00:00 Description: Xen through 4.8.x mishandles page transfer, which allows guest OS users to obtain privileged host OS access, aka XSA-217. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201708-03 - http://www.debian.org/security/2017/dsa-3969 - http://www.securityfocus.com/bid/99158 - http://www.securitytracker.com/id/1038721 - https://xenbits.xen.org/xsa/advisory-217.html - https://security.gentoo.org/glsa/201710-17 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-37308.
CVE ID: CVE-2023-37308 Date Updated: 2024-08-02T17:09:34.215Z Date Published: 2023-07-07T00:00:00 Description: Zoho ManageEngine ADAudit Plus before 7100 allows XSS via the username field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.manageengine.com/products/active-directory-audit/cve-2023-37308.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0207.
CVE ID: CVE-2024-0207 Date Updated: 2024-08-29T15:04:53.867Z Date Published: 2024-01-03T07:31:10.632Z Description: HTTP3 dissector crash in Wireshark 4.2.0 allows denial of service via packet injection or crafted capture file No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wireshark.org/security/wnpa-sec-2024-03.html - https://gitlab.com/wireshark/wireshark/-/issues/19502 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3411.
CVE ID: CVE-2012-3411 Date Updated: 2024-08-06T20:05:12.123Z Date Published: 2013-03-04T21:00:00 Description: Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mandriva.com/security/advisories?name=MDVSA-2013:072 - http://rhn.redhat.com/errata/RHSA-2013-0276.html - http://www.openwall.com/lists/oss-security/2012/07/12/5 - http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147 - https://bugzilla.redhat.com/show_bug.cgi?id=833033 - http://rhn.redhat.com/errata/RHSA-2013-0579.html - http://www.thekelleys.org.uk/dnsmasq/CHANGELOG - http://www.securityfocus.com/bid/54353 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372 - http://rhn.redhat.com/errata/RHSA-2013-0277.html - http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10788.
CVE ID: CVE-2019-10788 Date Updated: 2024-08-04T22:32:02.072Z Date Published: 2020-02-04T20:06:21 Description: im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184 - https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1337.
CVE ID: CVE-2008-1337 Date Updated: 2024-08-07T08:17:34.565Z Date Published: 2008-03-14T20:00:00 Description: The instant message service in Timbuktu Pro 8.6.5 RC 229 and earlier for Windows allows remote attackers to cause (1) a denial of service (daemon crash) via an invalid Version field or (2) a denial of service (CPU consumption and daemon termination) via an invalid or partial message. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/489360/100/0/threaded - http://secunia.com/advisories/29316 - http://securityreason.com/securityalert/3741 - http://aluigi.org/poc/timbuto.zip - http://aluigi.altervista.org/adv/timbuto-adv.txt - http://www.vupen.com/english/advisories/2008/0840 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10712.
CVE ID: CVE-2019-10712 Date Updated: 2024-08-04T22:32:01.465Z Date Published: 2019-05-07T21:20:03 Description: The Web-GUI on WAGO Series 750-88x (750-330, 750-352, 750-829, 750-831, 750-852, 750-880, 750-881, 750-882, 750-884, 750-885, 750-889) and Series 750-87x (750-830, 750-849, 750-871, 750-872, 750-873) devices has undocumented service access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert.vde.com/de-de/advisories/vde-2019-008 - http://www.securityfocus.com/bid/108482 - https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d%40%3Ccommits.cassandra.apache.org%3E - https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2%40%3Ccommits.cassandra.apache.org%3E - https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25%40%3Ccommits.cassandra.apache.org%3E - https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf%40%3Ccommits.cassandra.apache.org%3E - https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1%40%3Ccommits.cassandra.apache.org%3E - https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e%40%3Ccommits.cassandra.apache.org%3E - https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a%40%3Ccommits.cassandra.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11073.
CVE ID: CVE-2019-11073 Date Updated: 2024-08-04T22:40:16.289Z Date Published: 2020-03-16T18:41:58 Description: A Remote Code Execution vulnerability exists in PRTG Network Monitor before 19.4.54.1506 that allows attackers to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Transaction Sensor and set specific settings when the sensor is executed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.paessler.com/prtg/history/stable - https://sensepost.com/blog/2019/being-stubborn-pays-off-pt.-1-cve-2018-19204/ - https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/2019/11/warnmeldung_cb-k19-1019.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16807.
CVE ID: CVE-2020-16807 Date Updated: 2021-12-20T22:51:45 Date Published: 2021-12-20T22:51:45 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23828.
CVE ID: CVE-2023-23828 Date Updated: 2024-08-02T10:42:26.261Z Date Published: 2023-08-10T12:22:15.735Z Description: Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Swashata WP Category Post List Widget plugin <= 2.0.3 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/wp-category-posts-list/wordpress-wp-category-post-list-widget-plugin-2-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3436.
CVE ID: CVE-2024-3436 Date Updated: 2024-08-26T14:40:43.954Z Date Published: 2024-04-07T23:31:06.911Z Description: A vulnerability was found in SourceCodester Prison Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /Admin/edit-photo.php of the component Avatar Handler. The manipulation of the argument avatar leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259630 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.259630 - https://vuldb.com/?ctiid.259630 - https://vuldb.com/?submit.311919 - https://github.com/fubxx/CVE/blob/main/PrisonManagementSystemRCE.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15857.
CVE ID: CVE-2018-15857 Date Updated: 2024-08-05T10:10:04.755Z Date Published: 2018-08-25T21:00:00 Description: An invalid free in ExprAppendMultiKeysymList in xkbcomp/ast-build.c in xkbcommon before 0.8.1 could be used by local attackers to crash xkbcommon keymap parsers or possibly have unspecified other impact by supplying a crafted keymap file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201810-05 - https://usn.ubuntu.com/3786-1/ - https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb - https://usn.ubuntu.com/3786-2/ - https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html - https://access.redhat.com/errata/RHSA-2019:2079 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1923.
CVE ID: CVE-2015-1923 Date Updated: 2024-08-06T05:02:41.778Z Date Published: 2015-06-30T15:00:00 Description: Buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1032773 - http://www.securityfocus.com/bid/75445 - http://www.zerodayinitiative.com/advisories/ZDI-15-264 - http://www-01.ibm.com/support/docview.wss?uid=swg21959398 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6635.
CVE ID: CVE-2023-6635 Date Updated: 2024-08-02T08:35:14.917Z Date Published: 2024-02-05T21:21:42.520Z Description: The EditorsKit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation on the 'import_styles' function in versions up to, and including, 1.40.3. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/4528f9a1-7027-4aa9-b006-bea84aa19c84?source=cve - https://plugins.trac.wordpress.org/browser/block-options/tags/1.40.3/includes/addons/styles-manager/rest-api/gutenberghub-styles-import-export-controller.php#L100 - https://plugins.trac.wordpress.org/changeset/3010794/block-options No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7306.
CVE ID: CVE-2020-7306 Date Updated: 2024-08-04T09:25:48.986Z Date Published: 2020-08-13T03:10:17 Description: Unprotected Storage of Credentials vulnerability in McAfee Data Loss Prevention (DLP) for Mac prior to 11.5.2 allows local users to gain access to the ADRMS username and password via unprotected log files containing plain text No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kc.mcafee.com/corporate/index?page=content&id=SB10326 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-27812.
CVE ID: CVE-2022-27812 Date Updated: 2024-08-03T05:32:59.970Z Date Published: 2022-08-24T00:00:00 Description: Flooding SNS firewall versions 3.7.0 to 3.7.29, 3.11.0 to 3.11.17, 4.2.0 to 4.2.10, and 4.3.0 to 4.3.6 with specific forged traffic, can lead to SNS DoS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://advisories.stormshield.eu/2022-009/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47583.
CVE ID: CVE-2021-47583 Date Updated: 2024-08-04T05:39:59.828Z Date Published: 2024-06-19T14:53:49.459Z Description: In the Linux kernel, the following vulnerability has been resolved: media: mxl111sf: change mutex_init() location Syzbot reported, that mxl111sf_ctrl_msg() uses uninitialized mutex. The problem was in wrong mutex_init() location. Previous mutex_init(&state->msg_lock) call was in ->init() function, but dvb_usbv2_init() has this order of calls: dvb_usbv2_init() dvb_usbv2_adapter_init() dvb_usbv2_adapter_frontend_init() props->frontend_attach() props->init() Since mxl111sf_* devices call mxl111sf_ctrl_msg() in ->frontend_attach() internally we need to initialize state->msg_lock before frontend_attach(). To achieve it, ->probe() call added to all mxl111sf_* devices, which will simply initiaize mutex. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/4b2d9600b31f9ba7adbc9f3c54a068615d27b390 - https://git.kernel.org/stable/c/96f182c9f48b984447741f054ec301fdc8517035 - https://git.kernel.org/stable/c/b99bdf127af91d53919e96292c05f737c45ea59a - https://git.kernel.org/stable/c/8c6fdf62bfe1bc72bfceeaf832ef7499c7ed09ba - https://git.kernel.org/stable/c/44870a9e7a3c24acbb3f888b2a7cc22c9bdf7e7f No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-37906.
CVE ID: CVE-2022-37906 Date Updated: 2024-08-03T10:37:42.048Z Date Published: 2022-11-03T19:18:21.610Z Description: An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of the vulnerability results in the ability to delete arbitrary files on the underlying operating system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0756.
CVE ID: CVE-2016-0756 Date Updated: 2024-08-05T22:30:04.031Z Date Published: 2016-01-29T20:00:00 Description: The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176796.html - http://www.securityfocus.com/bid/82241 - http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176914.html - https://prosody.im/issues/issue/596 - http://www.openwall.com/lists/oss-security/2016/01/27/10 - http://blog.prosody.im/prosody-0-9-10-released/ - http://www.debian.org/security/2016/dsa-3463 - https://prosody.im/security/advisory_20160127/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-23741.
CVE ID: CVE-2020-23741 Date Updated: 2024-08-04T15:05:10.411Z Date Published: 2020-12-03T18:28:11 Description: In AnyView (network police) network monitoring software 4.6.0.1, there is a local denial of service vulnerability in AnyView, attackers can use a constructed program to cause a computer crash (BSOD). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.amoisoft.com/ - https://github.com/y5s5k5/POCtemp9 - https://github.com/y5s5k5/CVE-2020-23741 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8778.
CVE ID: CVE-2018-8778 Date Updated: 2024-08-05T07:02:26.126Z Date Published: 2018-04-03T22:00:00 Description: In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/ - https://access.redhat.com/errata/RHSA-2018:3729 - https://usn.ubuntu.com/3626-1/ - http://www.securitytracker.com/id/1042004 - https://access.redhat.com/errata/RHSA-2018:3730 - https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html - https://access.redhat.com/errata/RHSA-2018:3731 - https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/ - https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/ - https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html - https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/ - https://www.debian.org/security/2018/dsa-4259 - https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/ - https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html - http://www.securityfocus.com/bid/103693 - http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html - https://access.redhat.com/errata/RHSA-2019:2028 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46913.
CVE ID: CVE-2021-46913 Date Updated: 2024-08-04T05:17:42.990Z Date Published: 2024-02-27T06:53:52.780Z Description: In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: clone set element expression template memcpy() breaks when using connlimit in set elements. Use nft_expr_clone() to initialize the connlimit expression list, otherwise connlimit garbage collector crashes when walking on the list head copy. [ 493.064656] Workqueue: events_power_efficient nft_rhash_gc [nf_tables] [ 493.064685] RIP: 0010:find_or_evict+0x5a/0x90 [nf_conncount] [ 493.064694] Code: 2b 43 40 83 f8 01 77 0d 48 c7 c0 f5 ff ff ff 44 39 63 3c 75 df 83 6d 18 01 48 8b 43 08 48 89 de 48 8b 13 48 8b 3d ee 2f 00 00 <48> 89 42 08 48 89 10 48 b8 00 01 00 00 00 00 ad de 48 89 03 48 83 [ 493.064699] RSP: 0018:ffffc90000417dc0 EFLAGS: 00010297 [ 493.064704] RAX: 0000000000000000 RBX: ffff888134f38410 RCX: 0000000000000000 [ 493.064708] RDX: 0000000000000000 RSI: ffff888134f38410 RDI: ffff888100060cc0 [ 493.064711] RBP: ffff88812ce594a8 R08: ffff888134f38438 R09: 00000000ebb9025c [ 493.064714] R10: ffffffff8219f838 R11: 0000000000000017 R12: 0000000000000001 [ 493.064718] R13: ffffffff82146740 R14: ffff888134f38410 R15: 0000000000000000 [ 493.064721] FS: 0000000000000000(0000) GS:ffff88840e440000(0000) knlGS:0000000000000000 [ 493.064725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 493.064729] CR2: 0000000000000008 CR3: 00000001330aa002 CR4: 00000000001706e0 [ 493.064733] Call Trace: [ 493.064737] nf_conncount_gc_list+0x8f/0x150 [nf_conncount] [ 493.064746] nft_rhash_gc+0x106/0x390 [nf_tables] No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/e51ff3ffc316377cca21de8b80404eed0c37b3c3 - https://git.kernel.org/stable/c/47d8de3c226574a3ddb8b87d0c152028d1bafef4 - https://git.kernel.org/stable/c/4d8f9065830e526c83199186c5f56a6514f457d2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3751.
CVE ID: CVE-2013-3751 Date Updated: 2024-08-06T16:22:00.578Z Date Published: 2013-07-17T10:00:00 Description: Unspecified vulnerability in the XML Parser component in Oracle Database Server 11.2.0.2, 11.2.0.3, and 12.1.0.1 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1028789 - http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00000.html - http://www.vmware.com/security/advisories/VMSA-2014-0012.html - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html - http://www.securityfocus.com/archive/1/534161/100/0/threaded - https://exchange.xforce.ibmcloud.com/vulnerabilities/85650 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - http://seclists.org/fulldisclosure/2014/Dec/23 - http://osvdb.org/95264 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1823.
CVE ID: CVE-2015-1823 Date Updated: 2020-11-05T22:17:33 Date Published: 2020-11-05T22:17:33 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50762.
CVE ID: CVE-2023-50762 Date Updated: 2024-08-02T22:16:47.310Z Date Published: 2023-12-19T13:38:34.261Z Description: When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1862625 - https://www.mozilla.org/security/advisories/mfsa2023-55/ - https://www.debian.org/security/2023/dsa-5582 - https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4000.
CVE ID: CVE-2013-4000 Date Updated: 2024-08-06T16:30:49.354Z Date Published: 2013-12-14T22:00:00 Description: Multiple cross-site request forgery (CSRF) vulnerabilities in IBM Cognos Command Center before 10.2 allow remote attackers to hijack the authentication of administrators for requests that (1) start or (2) stop services. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/85150 - http://www-01.ibm.com/support/docview.wss?uid=swg21657932 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-42679.
CVE ID: CVE-2024-42679 Date Updated: 2024-09-06T16:30:30.356Z Date Published: 2024-08-15T00:00:00 Description: SQL Injection vulnerability in Super easy enterprise management system v.1.0.0 and before allows a local attacker to execute arbitrary code via a crafted script to the/ajax/Login.ashx component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/WarmBrew/web_vul/blob/main/CYGLXT/CYsqli.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-31165.
CVE ID: CVE-2023-31165 Date Updated: 2024-08-02T14:45:25.790Z Date Published: 2023-05-10T19:25:34.186Z Description: An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code. See SEL Service Bulletin dated 2022-11-15 for more details. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://selinc.com/support/security-notifications/external-reports/ - https://www.nozominetworks.com/blog/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2542.
CVE ID: CVE-2014-2542 Date Updated: 2024-08-06T10:14:26.653Z Date Published: 2014-04-08T17:00:00 Description: Cross-site scripting (XSS) vulnerability in the Rendezvous Daemon (rvd), Rendezvous Routing Daemon (rvrd), Rendezvous Secure Daemon (rvsd), and Rendezvous Secure Routing Daemon (rvsrd) in TIBCO Rendezvous before 8.4.2, Messaging Appliance before 8.7.1, and Substation ES before 2.8.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/66737 - http://www.tibco.com/multimedia/rendezvous_advisory_20140408_tcm8-20763.txt - http://www.tibco.com/mk/advisory.jsp - http://www.securitytracker.com/id/1030070 - http://www.securityfocus.com/bid/101873 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0353.
CVE ID: CVE-2013-0353 Date Updated: 2024-08-06T14:25:10.055Z Date Published: 2013-01-17T01:30:00 Description: Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control EM Base Platform 10.2.0.5 and 11.1.0.1; EM DB Control 11.1.0.7, 11.2.0.2, and 11.2.0.3; and EM Plugin for DB 12.1.0.1 allows remote attackers to affect integrity via unknown vectors related to Enterprise Configuration Management. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html - http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-42364.
CVE ID: CVE-2022-42364 Date Updated: 2024-09-16T16:42:56.608Z Date Published: 2022-12-21T01:21:43.830108Z Description: Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5647.
CVE ID: CVE-2015-5647 Date Updated: 2024-08-06T06:59:04.038Z Date Published: 2015-10-12T10:00:00 Description: The RSS Reader component in Cybozu Garoon 3.x through 3.7.5 and 4.x through 4.0.3 allows remote authenticated users to execute arbitrary PHP code via unspecified vectors, aka CyVDB-866. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jvndb.jvn.jp/jvndb/JVNDB-2015-000151 - https://support.cybozu.com/ja-jp/article/8810 - http://jvn.jp/en/jp/JVN21025396/index.html - http://jvn.jp/en/jp/JVN21025396/374951/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-4273.
CVE ID: CVE-2009-4273 Date Updated: 2024-08-07T06:54:10.227Z Date Published: 2010-01-26T18:00:00 Description: stap-server in SystemTap before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in stap command-line arguments in a request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11417 - http://secunia.com/advisories/38154 - http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034036.html - http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034041.html - http://sourceware.org/systemtap/ftp/releases/systemtap-1.1.tar.gz - http://secunia.com/advisories/39656 - https://bugzilla.redhat.com/show_bug.cgi?id=550172 - http://secunia.com/advisories/38216 - http://lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.html - http://www.vupen.com/english/advisories/2010/0169 - http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html - http://sourceware.org/ml/systemtap/2010-q1/msg00142.html - http://sourceware.org/bugzilla/show_bug.cgi?id=11105 - http://www.redhat.com/support/errata/RHSA-2010-0124.html - http://secunia.com/advisories/38765 - http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html - http://www.vupen.com/english/advisories/2010/1001 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10466.
CVE ID: CVE-2018-10466 Date Updated: 2024-08-05T07:39:07.588Z Date Published: 2018-05-29T20:00:00 Description: Zoho ManageEngine ADAudit Plus before 5.0.0 build 5100 allows blind SQL Injection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.manageengine.com/products/active-directory-audit/adaudit-plus-release-notes.html - https://vulmon.com/vulnerabilitydetails?qid=CVE-2018-10466 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-7027.
CVE ID: CVE-2013-7027 Date Updated: 2024-08-06T17:53:45.836Z Date Published: 2013-12-09T18:00:00 Description: The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html - http://www.ubuntu.com/usn/USN-2129-1 - http://www.ubuntu.com/usn/USN-2128-1 - http://secunia.com/advisories/55606 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7 - http://www.ubuntu.com/usn/USN-2073-1 - http://www.securitytracker.com/id/1029413 - http://www.ubuntu.com/usn/USN-2076-1 - http://www.ubuntu.com/usn/USN-2069-1 - http://www.securityfocus.com/bid/64013 - http://www.ubuntu.com/usn/USN-2066-1 - http://www.ubuntu.com/usn/USN-2071-1 - https://github.com/torvalds/linux/commit/f5563318ff1bde15b10e736e97ffce13be08bc1a - http://www.ubuntu.com/usn/USN-2074-1 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f5563318ff1bde15b10e736e97ffce13be08bc1a - http://www.ubuntu.com/usn/USN-2068-1 - http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html - http://www.ubuntu.com/usn/USN-2072-1 - http://www.ubuntu.com/usn/USN-2067-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3497.
CVE ID: CVE-2008-3497 Date Updated: 2024-08-07T09:37:27.078Z Date Published: 2008-08-06T18:00:00 Description: SQL injection vulnerability in pages.php in MyPHP CMS 0.3.1 allows remote attackers to execute arbitrary SQL commands via the pid parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/5937 - http://www.vupen.com/english/advisories/2008/1953/references - http://securityreason.com/securityalert/4115 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43358 - http://www.securityfocus.com/bid/29940 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12917.
CVE ID: CVE-2018-12917 Date Updated: 2024-09-16T23:06:46.377Z Date Published: 2018-06-27T18:00:00Z Description: In libpbc.a in PBC through 2017-03-02, there is a heap-based buffer over-read in _pbcM_ip_new in map.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/cloudwu/pbc/issues/119 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2202.
CVE ID: CVE-2012-2202 Date Updated: 2024-08-06T19:26:08.984Z Date Published: 2012-07-27T10:00:00 Description: Directory traversal vulnerability in javatester_init.php in IBM Lotus Protector for Mail Security 2.1, 2.5, 2.5.1, and 2.8 and IBM ISS Proventia Network Mail Security System allows remote authenticated administrators to read arbitrary files via a .. (dot dot) in the template parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/659791 - http://secunia.com/advisories/49897 - http://www-01.ibm.com/support/docview.wss?uid=swg21605630 - https://exchange.xforce.ibmcloud.com/vulnerabilities/76801 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5007.
CVE ID: CVE-2012-5007 Date Updated: 2024-09-16T18:49:28.698Z Date Published: 2012-09-20T01:00:00Z Description: The Fill PDF module 7.x-1.x before 7.x-1.2 for Drupal allows remote attackers to write to arbitrary PDF files via unspecified vectors related to the fillpdf_merge_pdf function and incorrect arguments, a different vulnerability than CVE-2012-1625. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/51288 - http://drupal.org/node/1394428 - http://secunia.com/advisories/47418 - http://www.openwall.com/lists/oss-security/2012/04/07/1 - http://osvdb.org/78181 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43419.
CVE ID: CVE-2021-43419 Date Updated: 2024-09-05T14:08:29.334Z Date Published: 2023-11-07T00:00:00 Description: An Information Disclosure vulnerability exists in Opay Mobile application 1.5.1.26 and maybe be higher in the logcat app. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.youtube.com/watch?v=HJUj3PgH7Ag - https://github.com/Patrick0x41/Security-Advisories/blob/main/CVE-2021-43419/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4908.
CVE ID: CVE-2010-4908 Date Updated: 2024-08-07T04:02:30.520Z Date Published: 2011-10-08T10:00:00 Description: SQL injection vulnerability in detail.php in Virtue Shopping Mall allows remote attackers to execute arbitrary SQL commands via the prodid parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/43274 - http://packetstormsecurity.org/0908-exploits/vsm-sql.txt - http://securityreason.com/securityalert/8443 - http://secunia.com/advisories/35374 - https://exchange.xforce.ibmcloud.com/vulnerabilities/61875 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1600.
CVE ID: CVE-2019-1600 Date Updated: 2024-09-16T22:40:06.887Z Date Published: 2019-03-07T20:00:00Z Description: A vulnerability in the file system permissions of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to access sensitive information that is stored in the file system of an affected system. The vulnerability is due to improper implementation of file system permissions. An attacker could exploit this vulnerability by accessing and modifying restricted files. A successful exploit could allow the attacker to access sensitive and critical files. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. Firepower 9300 Series Next-Generation Firewalls are affected in versions prior to 2.2.2.91 and 2.3.1.110. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(25), 8.1(1b), and 8.3(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.1(5)N1(1b) and 7.3(3)N1(1). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), and 8.2(3). Nexus 9000 Series Switches-Standalone are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/107399 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190306-nxos-directory - http://www.securityfocus.com/bid/107404 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4751.
CVE ID: CVE-2018-4751 Date Updated: 2023-09-14T18:43:17.520Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5767.
CVE ID: CVE-2016-5767 Date Updated: 2024-08-06T01:15:08.961Z Date Published: 2016-08-07T10:00:00 Description: Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html - http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html - http://rhn.redhat.com/errata/RHSA-2016-2750.html - http://rhn.redhat.com/errata/RHSA-2016-2598.html - http://php.net/ChangeLog-5.php - http://www.openwall.com/lists/oss-security/2016/06/23/4 - http://php.net/ChangeLog-7.php - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 - https://bugs.php.net/bug.php?id=72446 - http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html - http://www.securityfocus.com/bid/91395 - http://github.com/php/php-src/commit/c395c6e5d7e8df37a21265ff76e48fe75ceb5ae6?w=1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2227.
CVE ID: CVE-2022-2227 Date Updated: 2024-08-03T00:32:09.371Z Date Published: 2022-07-01T15:53:58 Description: Improper access control in the runner jobs API in GitLab CE/EE affecting all versions prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows a previous maintainer of a project with a specific runner to access job and project meta data under certain conditions No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab/-/issues/300842 - https://hackerone.com/reports/1092199 - https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2227.json No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-13834.
CVE ID: CVE-2017-13834 Date Updated: 2024-08-05T19:13:40.828Z Date Published: 2017-11-13T03:00:00 Description: An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted mach binary. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT208221 - http://www.securitytracker.com/id/1039710 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22888.
CVE ID: CVE-2022-22888 Date Updated: 2024-08-03T03:28:42.520Z Date Published: 2022-01-20T22:16:43 Description: Jerryscript 3.0.0 was discovered to contain a stack overflow via ecma_op_object_find_own in /ecma/operations/ecma-objects.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jerryscript-project/jerryscript/issues/4848 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32728.
CVE ID: CVE-2021-32728 Date Updated: 2024-08-03T23:33:54.918Z Date Published: 2021-08-18T16:00:13 Description: The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.3.0, the Nextcloud Desktop client fails to check if a private key belongs to previously downloaded public certificate. If the Nextcloud instance serves a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. This issue is fixed in Nextcloud Desktop Client version 3.3.0. There are no known workarounds aside from upgrading. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/1189162 - https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f5fr-5gcv-6cc5 - https://github.com/nextcloud/desktop/pull/3338 - https://www.debian.org/security/2021/dsa-4974 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11386.
CVE ID: CVE-2018-11386 Date Updated: 2024-08-05T08:10:13.702Z Date Published: 2018-06-13T16:00:00 Description: An issue was discovered in the HttpFoundation component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. The PDOSessionHandler class allows storing sessions on a PDO connection. Under some configurations and with a well-crafted payload, it was possible to do a denial of service on a Symfony application without too much resources. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBQK7JDXIELADIPGZIOUCZKMAJM5LSBW/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WU5N2TZFNGXDGMXMPP7LZCWTFLENF6WH/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4XNBMFW33H47O5TZGA7JYCVLDBCXAJV/ - https://symfony.com/blog/cve-2018-11386-denial-of-service-when-using-pdosessionhandler - https://www.debian.org/security/2018/dsa-4262 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15259.
CVE ID: CVE-2019-15259 Date Updated: 2024-09-17T00:42:10.610Z Date Published: 2019-10-02T19:06:55.220464Z Description: A vulnerability in Cisco Unified Contact Center Express (UCCX) Software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request on an affected device. A successful exploit could allow the attacker to perform cross-site scripting attacks, web cache poisoning, access sensitive browser-based information, and similar exploits. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-uccx-http No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-13584.
CVE ID: CVE-2019-13584 Date Updated: 2024-08-04T23:57:39.445Z Date Published: 2019-07-17T18:58:56 Description: The remote admin webserver on FANUC Robotics Virtual Robot Controller 8.23 allows Directory Traversal via a forged HTTP request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://seclists.org/bugtraq/2019/Jul/23 - http://packetstormsecurity.com/files/153672/FANUC-Robotics-Virtual-Robot-Controller-8.23-Path-Traversal.html - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-025.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-36617.
CVE ID: CVE-2020-36617 Date Updated: 2024-08-04T17:30:08.614Z Date Published: 2022-12-18T00:00:00 Description: A vulnerability was found in ewxrjk sftpserver. It has been declared as problematic. Affected by this vulnerability is the function sftp_parse_path of the file parse.c. The manipulation leads to uninitialized pointer. The real existence of this vulnerability is still doubted at the moment. The name of the patch is bf4032f34832ee11d79aa60a226cc018e7ec5eed. It is recommended to apply a patch to fix this issue. The identifier VDB-216205 was assigned to this vulnerability. NOTE: In some deployment models this would be a vulnerability. README specifically warns about avoiding such deployment models. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ewxrjk/sftpserver/commit/bf4032f34832ee11d79aa60a226cc018e7ec5eed - https://vuldb.com/?id.216205 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9142.
CVE ID: CVE-2019-9142 Date Updated: 2024-09-16T20:52:36.730Z Date Published: 2019-02-25T15:00:00Z Description: An issue was discovered in b3log Symphony (aka Sym) before v3.4.7. XSS exists via the userIntro and userNickname fields to processor/SettingsProcessor.java. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/b3log/symphony/issues/860 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-1971.
CVE ID: CVE-2021-1971 Date Updated: 2024-08-03T16:25:06.539Z Date Published: 2021-09-09T07:36:05 Description: Possible assertion due to lack of physical layer state validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4326.
CVE ID: CVE-2023-4326 Date Updated: 2024-09-05T21:54:56.874Z Date Published: 2023-08-15T18:25:38.586Z Description: Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that supports obsolete SHA1-based ciphersuites No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.broadcom.com/support/resources/product-security-center No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6869.
CVE ID: CVE-2018-6869 Date Updated: 2024-08-05T06:17:16.648Z Date Published: 2018-02-09T06:00:00 Description: In ZZIPlib 0.13.68, there is an uncontrolled memory allocation and a crash in the __zzip_parse_root_directory function of zzip/zip.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/103050 - https://usn.ubuntu.com/3699-1/ - https://github.com/gdraheim/zziplib/issues/22 - https://lists.debian.org/debian-lts-announce/2018/02/msg00022.html - https://lists.debian.org/debian-lts-announce/2020/06/msg00029.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22913.
CVE ID: CVE-2021-22913 Date Updated: 2024-08-03T18:58:25.787Z Date Published: 2021-06-11T15:49:37 Description: Nextcloud Deck before 1.2.7, 1.4.1 suffers from an information disclosure vulnerability when searches for sharees utilize the lookup server by default instead of only the local Nextcloud server unless a global search has been explicitly chosen by the user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/1167958 - https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h8f6-wg82-6p7r No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-47022.
CVE ID: CVE-2022-47022 Date Updated: 2024-10-03T14:12:08.305Z Date Published: 2023-08-22T00:00:00 Description: An issue was discovered in open-mpi hwloc 2.1.0 allows attackers to cause a denial of service or other unspecified impacts via glibc-cpuset in topology-linux.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/open-mpi/hwloc/issues/544 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-32127.
CVE ID: CVE-2024-32127 Date Updated: 2024-08-02T02:06:43.954Z Date Published: 2024-04-15T07:36:30.630Z Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Markus Seyer Find Duplicates.This issue affects Find Duplicates: from n/a through 1.4.6. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/find-duplicates/wordpress-find-duplicates-plugin-1-4-6-subscriber-sql-injection-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4058.
CVE ID: CVE-2022-4058 Date Updated: 2024-08-03T01:27:54.541Z Date Published: 2022-12-19T13:41:43.962Z Description: The Photo Gallery by 10Web WordPress plugin before 1.8.3 does not validate and escape some parameters before outputting them back in in JS code later on in another page, which could lead to Stored XSS issue when an attacker makes a logged in admin open a malicious URL or page under their control. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/89656cb3-4611-4ae7-b7f8-1b22eb75cfc4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3739.
CVE ID: CVE-2023-3739 Date Updated: 2024-08-02T07:01:57.561Z Date Published: 2023-08-01T22:39:18.614Z Description: Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html - https://crbug.com/1398986 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15909.
CVE ID: CVE-2018-15909 Date Updated: 2024-08-05T10:10:05.371Z Date Published: 2018-08-27T17:00:00 Description: In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2018:3650 - https://security.gentoo.org/glsa/201811-12 - https://usn.ubuntu.com/3768-1/ - http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=e01e77a36cbb2e0277bc3a63852244bec41be0f6 - http://www.securityfocus.com/bid/105178 - http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0b6cd1918e1ec4ffd087400a754a845180a4522b - https://www.kb.cert.org/vuls/id/332928 - https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101 - https://support.f5.com/csp/article/K24803507?utm_source=f5support&amp%3Butm_medium=RSS No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-2289.
CVE ID: CVE-2021-2289 Date Updated: 2024-09-26T14:12:20.777Z Date Published: 2021-04-22T21:53:59 Description: Vulnerability in the Oracle Product Hub product of Oracle E-Business Suite (component: Template, GTIN search). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Product Hub. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Product Hub accessible data as well as unauthorized access to critical data or complete access to all Oracle Product Hub accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19698.
CVE ID: CVE-2019-19698 Date Updated: 2024-08-05T02:25:12.473Z Date Published: 2019-12-10T06:07:49 Description: marc-q libwav through 2017-04-20 has a NULL pointer dereference in wav_content_read() at libwav.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/marc-q/libwav/issues/25 - https://github.com/xiaoxiongwang/security/tree/master/libwav No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11739.
CVE ID: CVE-2019-11739 Date Updated: 2024-08-04T23:03:32.812Z Date Published: 2019-09-27T17:19:35 Description: Encrypted S/MIME parts in a crafted multipart/alternative message can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird < 68.1 and Thunderbird < 60.9. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1571481 - https://www.mozilla.org/security/advisories/mfsa2019-29/ - https://www.mozilla.org/security/advisories/mfsa2019-30/ - http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html - http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html - https://usn.ubuntu.com/4150-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1222.
CVE ID: CVE-2013-1222 Date Updated: 2024-09-16T18:13:18.544Z Date Published: 2013-05-09T10:00:00Z Description: The Tomcat Web Management feature in Cisco Unified Customer Voice Portal (CVP) Software before 9.0.1 ES 11 does not properly configure Tomcat components, which allows remote attackers to launch arbitrary custom web applications via a crafted (1) HTTP or (2) HTTPS request, aka Bug ID CSCub38379. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1326.
CVE ID: CVE-2024-1326 Date Updated: 2024-08-02T20:16:06.990Z Date Published: 2024-03-12T23:33:52.349Z Description: The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via HTML Tag attributes in all versions up to, and including, 2.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/d108cb36-c072-483e-9746-15b8e7a880c3?source=cve - https://plugins.trac.wordpress.org/browser/jeg-elementor-kit/trunk/class/elements/views/class-post-block-view.php#L375 - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3038362%40jeg-elementor-kit&new=3038362%40jeg-elementor-kit&sfp_email=&sfph_mail= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3449.
CVE ID: CVE-2020-3449 Date Updated: 2024-09-16T17:17:59.342Z Date Published: 2020-08-17T18:00:44.844290Z Description: A vulnerability in the Border Gateway Protocol (BGP) additional paths feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to prevent authorized users from monitoring the BGP status and cause the BGP process to stop processing new updates, resulting in a denial of service (DOS) condition. The vulnerability is due to an incorrect calculation of lexicographical order when displaying additional path information within Cisco IOS XR Software, which causes an infinite loop. An attacker could exploit this vulnerability by sending a specific BGP update from a BGP neighbor peer session of an affected device; an authorized user must then issue a show bgp command for the vulnerability to be exploited. A successful exploit could allow the attacker to prevent authorized users from properly monitoring the BGP status and prevent BGP from processing new updates, resulting in outdated information in the routing and forwarding tables. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bgp-ErKEqAer No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6793.
CVE ID: CVE-2008-6793 Date Updated: 2024-08-07T11:42:00.751Z Date Published: 2009-05-07T17:00:00 Description: The get_file_type function in lib/file_content.php in DFLabs PTK 0.1, 0.2, and 1.0 allows remote attackers to execute arbitrary commands via shell metacharacters after an arg1= sequence in a filename within a forensic image. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ikkisoft.com/stuff/LC-2008-07.txt - http://www.vupen.com/english/advisories/2008/3020 - http://osvdb.org/49574 - http://www.securityfocus.com/archive/1/498081/100/0/threaded - http://secunia.com/advisories/32553 - https://www.exploit-db.com/exploits/7001 - https://exchange.xforce.ibmcloud.com/vulnerabilities/46380 - http://www.securityfocus.com/bid/32128 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1788.
CVE ID: CVE-2020-1788 Date Updated: 2024-08-04T06:46:30.915Z Date Published: 2020-01-21T22:49:53 Description: Honor V30 smartphones with versions earlier than 10.0.1.135(C00E130R4P1) have an improper authentication vulnerability. Certain applications do not properly validate the identity of another application who would call its interface. An attacker could trick the user into installing a malicious application. Successful exploit could allow unauthorized actions leading to information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-02-smartphone-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1335.
CVE ID: CVE-2009-1335 Date Updated: 2024-08-07T05:13:25.139Z Date Published: 2009-04-17T14:00:00 Description: Microsoft Internet Explorer 7 and 8 on Windows XP and Vista allows remote attackers to cause a denial of service (application hang) via a large document composed of unprintable characters, aka MSRC 9011jr. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0111.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/50350 - http://www.securityfocus.com/bid/34478 - http://www.securityfocus.com/archive/1/502617/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-51652.
CVE ID: CVE-2023-51652 Date Updated: 2024-08-02T22:40:34.163Z Date Published: 2024-01-02T20:06:41.333Z Description: OWASP AntiSamy .NET is a library for performing cleansing of HTML coming from untrusted sources. Prior to version 1.2.0, there is a potential for a mutation cross-site scripting (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. This is patched in OWASP AntiSamy .NET 1.2.0 and later. See important remediation details in the reference given below. As a workaround, manually edit the AntiSamy policy file (e.g., antisamy.xml) by deleting the `preserveComments` directive or setting its value to `false`, if present. Also it would be useful to make AntiSamy remove the `noscript` tag by adding a line described in the GitHub Security Advisory to the tag definitions under the `<tagrules>` node, or deleting it entirely if present. As the previously mentioned policy settings are preconditions for the mXSS attack to work, changing them as recommended should be sufficient to protect you against this vulnerability when using a vulnerable version of this library. However, the existing bug would still be present in AntiSamy or its parser dependency (HtmlAgilityPack). The safety of this workaround relies on configurations that may change in the future and don't address the root cause of the vulnerability. As such, it is strongly recommended to upgrade to a fixed version of AntiSamy. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/spassarop/antisamy-dotnet/security/advisories/GHSA-8x6f-956f-q43w - https://github.com/spassarop/antisamy-dotnet/commit/7e500daef6ad9c10e97c68feab78f4cb6e3083c6 - https://github.com/spassarop/antisamy-dotnet/commit/8117911933e75a25cd0054ef017577486338444a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3540.
CVE ID: CVE-2016-3540 Date Updated: 2024-08-06T00:03:32.934Z Date Published: 2016-07-21T10:00:00 Description: Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control 12.1.0.5 and 13.1.0.0 allows remote attackers to affect confidentiality via vectors related to UI Framework. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - http://www.securitytracker.com/id/1036406 - http://www.securityfocus.com/bid/91892 - http://www.securityfocus.com/bid/91787 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-19269.
CVE ID: CVE-2018-19269 Date Updated: 2019-01-08T19:57:01 Date Published: 2019-01-08T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4570.
CVE ID: CVE-2019-4570 Date Updated: 2024-09-16T22:56:49.866Z Date Published: 2019-11-22T15:21:24.316101Z Description: IBM Tivoli Netcool Impact 7.1.0 through 7.1.0.16 generates an error message that includes sensitive information about its environment, users, or associated data. IBM X-Force ID: 166720. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/1110141 - https://exchange.xforce.ibmcloud.com/vulnerabilities/166720 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.