instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2013-6220.
CVE ID: CVE-2013-6220 Date Updated: 2024-08-06T17:29:43.060Z Date Published: 2014-05-10T01:00:00 Description: Cross-site scripting (XSS) vulnerability in HP Network Node Manager i (NNMi) 9.0, 9.10, and 9.20 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04273695 - http://www.securitytracker.com/id/1030218 - https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04273695 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6226.
CVE ID: CVE-2015-6226 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36309.
CVE ID: CVE-2022-36309 Date Updated: 2024-08-03T10:00:04.309Z Date Published: 2022-08-16T00:33:24 Description: Airspan AirVelocity 1500 software versions prior to 15.18.00.2511 have a root command injection vulnerability in the ActiveBank parameter of the recoverySubmit.cgi script running on the eNodeB's web management UI. This issue may affect other AirVelocity and AirSpeed models. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpdesk.airspan.com/browse/TRN3-1690 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32915.
CVE ID: CVE-2022-32915 Date Updated: 2024-08-03T07:54:03.399Z Date Published: 2022-11-01T00:00:00 Description: A type confusion issue was addressed with improved checks. This issue is fixed in macOS Ventura 13. An app may be able to execute arbitrary code with kernel privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213488 - https://support.apple.com/kb/HT213604 - http://seclists.org/fulldisclosure/2023/Jan/20 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3243.
CVE ID: CVE-2012-3243 Date Updated: 2024-08-06T19:57:50.401Z Date Published: 2015-05-20T18:00:00 Description: Cross-site scripting (XSS) vulnerability in the SEOgento plugin for Magento allows remote attackers to inject arbitrary web script or HTML via the id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/53927 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38154.
CVE ID: CVE-2023-38154 Date Updated: 2024-08-02T17:30:14.123Z Date Published: 2023-08-08T17:08:58.162Z Description: Windows Kernel Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38154 - http://packetstormsecurity.com/files/174568/Microsoft-Windows-Kernel-Recovery-Memory-Corruption.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6321.
CVE ID: CVE-2018-6321 Date Updated: 2024-08-05T06:01:48.679Z Date Published: 2018-03-12T21:00:00 Description: Unquoted Windows search path vulnerability in the panda_url_filtering service in Panda Global Protection 17.0.1 allows local users to gain privileges via a malicious artefact. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2018/Mar/25 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3439.
CVE ID: CVE-2011-3439 Date Updated: 2024-08-06T23:37:47.528Z Date Published: 2011-11-11T18:00:00 Description: FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html - http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html - http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html - http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html - http://support.apple.com/kb/HT5052 - http://secunia.com/advisories/46921 - http://secunia.com/advisories/48951 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9867.
CVE ID: CVE-2019-9867 Date Updated: 2024-08-04T22:01:54.996Z Date Published: 2019-03-19T15:53:29 Description: An issue was discovered in the Web Console in Veritas NetBackup Appliance through 3.1.2. The proxy server password is displayed to an administrator. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.veritas.com/content/support/en_US/security/VTS19-001.html#Issue2 - http://www.securityfocus.com/bid/107567 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-22209.
CVE ID: CVE-2020-22209 Date Updated: 2024-08-04T14:51:10.699Z Date Published: 2021-06-16T17:48:05 Description: SQL Injection in 74cms 3.2.0 via the query parameter to plus/ajax_common.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/blindkey/cve_like/issues/12 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27952.
CVE ID: CVE-2024-27952 Date Updated: 2024-08-02T00:41:55.853Z Date Published: 2024-03-13T16:18:11.351Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Codeus Advanced Sermons allows Reflected XSS.This issue affects Advanced Sermons: from n/a through 3.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/advanced-sermons/wordpress-advanced-sermons-plugin-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2783.
CVE ID: CVE-2008-2783 Date Updated: 2024-08-07T09:14:14.642Z Date Published: 2008-06-19T20:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware, Groupware Webmail Edition, and Kronolith allow remote attackers to inject arbitrary web script or HTML via the timestamp parameter to (1) week.php, (2) workweek.php, and (3) day.php; and (4) the horde parameter in the PATH_INFO to the default URI. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/29365 - https://exchange.xforce.ibmcloud.com/vulnerabilities/42640 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0124.
CVE ID: CVE-2009-0124 Date Updated: 2024-08-07T04:24:17.983Z Date Published: 2009-01-15T17:00:00 Description: The tqsl_verifyDataBlock function in openssl_cert.cpp in American Radio Relay League (ARRL) tqsllib 2.0 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://openwall.com/lists/oss-security/2009/01/12/4 - http://secunia.com/advisories/33543 - https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00557.html - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511509 - https://bugzilla.redhat.com/show_bug.cgi?id=479650 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0115.
CVE ID: CVE-2008-0115 Date Updated: 2024-08-07T07:32:23.902Z Date Published: 2008-03-11T23:00:00 Description: Unspecified vulnerability in Microsoft Excel 2000 SP3 through 2007, Viewer 2003, Compatibility Pack, and Office for Mac 2004 allows user-assisted remote attackers to execute arbitrary code via malformed formulas, aka "Excel Formula Parsing Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/28167 - http://www.us-cert.gov/cas/techalerts/TA08-071A.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5512 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-014 - http://marc.info/?l=bugtraq&m=120585858807305&w=2 - http://marc.info/?l=bugtraq&m=120585858807305&w=2 - http://www.vupen.com/english/advisories/2008/0846/references - http://www.securitytracker.com/id?1019585 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2228.
CVE ID: CVE-2024-2228 Date Updated: 2024-08-01T19:03:39.121Z Date Published: 2024-03-22T15:50:09.729Z Description: This vulnerability allows an authenticated user to perform a Lifecycle Manager flow or other QuickLink for a target user outside of the defined QuickLink Population. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sailpoint.com/security-advisories/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3885.
CVE ID: CVE-2009-3885 Date Updated: 2024-08-07T06:45:51.071Z Date Published: 2009-11-09T19:00:00 Description: Sun Java SE 5.0 before Update 22 and 6 before Update 17 on Windows allows remote attackers to cause a denial of service via a BMP file containing a link to a UNC share pathname for an International Color Consortium (ICC) profile file, probably a related issue to CVE-2007-2789, aka Bug Id 6632445. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7094 - http://java.sun.com/javase/6/webnotes/6u17.html - https://bugzilla.redhat.com/show_bug.cgi?id=530114 - http://java.sun.com/j2se/1.5.0/ReleaseNotes.html - http://www.mandriva.com/security/advisories?name=MDVSA-2010:084 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20749.
CVE ID: CVE-2018-20749 Date Updated: 2024-08-05T12:12:27.679Z Date Published: 2019-01-30T18:00:00 Description: LibVNC before 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.debian.org/debian-lts-announce/2019/01/msg00029.html - http://www.securityfocus.com/bid/106825 - https://github.com/LibVNC/libvncserver/commit/15bb719c03cc70f14c36a843dcb16ed69b405707 - https://github.com/LibVNC/libvncserver/issues/273 - https://usn.ubuntu.com/3877-1/ - https://www.openwall.com/lists/oss-security/2018/12/10/8 - https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html - https://usn.ubuntu.com/4547-1/ - https://usn.ubuntu.com/4587-1/ - https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7737.
CVE ID: CVE-2019-7737 Date Updated: 2024-08-04T20:54:28.424Z Date Published: 2019-02-11T21:00:00 Description: A CSRF vulnerability was found in Verydows v2.0 that can add an admin account via index.php?m=backend&c=admin&a=add&step=submit. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Verytops/verydows/issues/10 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8551.
CVE ID: CVE-2014-8551 Date Updated: 2024-08-06T13:18:48.431Z Date Published: 2014-11-26T11:00:00 Description: The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to execute arbitrary code via crafted packets. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-134508.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-34714.
CVE ID: CVE-2021-34714 Date Updated: 2024-09-16T20:12:12.264Z Date Published: 2021-09-23T02:25:58.322621Z Description: A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software, Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. This vulnerability is due to improper input validation of the UDLD packets. An attacker could exploit this vulnerability by sending specifically crafted UDLD packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. An attacker must have full control of a directly connected device. On Cisco IOS XR devices, the impact is limited to the reload of the UDLD process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16985.
CVE ID: CVE-2019-16985 Date Updated: 2024-08-05T01:24:48.576Z Date Published: 2019-10-21T15:27:06 Description: In FusionPBX up to v4.5.7, the file app\xml_cdr\xml_cdr_delete.php uses an unsanitized "rec" variable coming from the URL, which is base64 decoded and allows deletion of any file of the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/fusionpbx/fusionpbx/commit/284b0a91968f126fd6be0a486a84e065926905ca - https://resp3ctblog.wordpress.com/2019/10/19/fusionpbx-path-traversal-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8692.
CVE ID: CVE-2016-8692 Date Updated: 2024-08-06T02:27:41.270Z Date Published: 2017-02-15T19:00:00 Description: The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1385502 - http://www.debian.org/security/2017/dsa-3785 - http://www.securityfocus.com/bid/93588 - https://access.redhat.com/errata/RHSA-2017:1208 - http://www.openwall.com/lists/oss-security/2016/08/23/6 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/THLEZURI4D24PRM7SMASC5I25IAWXXTM/ - https://blogs.gentoo.org/ago/2016/10/16/jasper-two-divide-by-zero-in-jpc_dec_process_siz-jpc_dec-c/ - https://github.com/mdadams/jasper/commit/d8c2604cd438c41ec72aff52c16ebd8183068020 - http://www.openwall.com/lists/oss-security/2016/10/16/14 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26733.
CVE ID: CVE-2024-26733 Date Updated: 2024-09-11T17:33:20.304Z Date Published: 2024-04-03T17:00:20.437Z Description: In the Linux kernel, the following vulnerability has been resolved: arp: Prevent overflow in arp_req_get(). syzkaller reported an overflown write in arp_req_get(). [0] When ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour entry and copies neigh->ha to struct arpreq.arp_ha.sa_data. The arp_ha here is struct sockaddr, not struct sockaddr_storage, so the sa_data buffer is just 14 bytes. In the splat below, 2 bytes are overflown to the next int field, arp_flags. We initialise the field just after the memcpy(), so it's not a problem. However, when dev->addr_len is greater than 22 (e.g. MAX_ADDR_LEN), arp_netmask is overwritten, which could be set as htonl(0xFFFFFFFFUL) in arp_ioctl() before calling arp_req_get(). To avoid the overflow, let's limit the max length of memcpy(). Note that commit b5f0de6df6dc ("net: dev: Convert sa_data to flexible array in struct sockaddr") just silenced syzkaller. [0]: memcpy: detected field-spanning write (size 16) of single field "r->arp_ha.sa_data" at net/ipv4/arp.c:1128 (size 14) WARNING: CPU: 0 PID: 144638 at net/ipv4/arp.c:1128 arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128 Modules linked in: CPU: 0 PID: 144638 Comm: syz-executor.4 Not tainted 6.1.74 #31 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014 RIP: 0010:arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128 Code: fd ff ff e8 41 42 de fb b9 0e 00 00 00 4c 89 fe 48 c7 c2 20 6d ab 87 48 c7 c7 80 6d ab 87 c6 05 25 af 72 04 01 e8 5f 8d ad fb <0f> 0b e9 6c fd ff ff e8 13 42 de fb be 03 00 00 00 4c 89 e7 e8 a6 RSP: 0018:ffffc900050b7998 EFLAGS: 00010286 RAX: 0000000000000000 RBX: ffff88803a815000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff8641a44a RDI: 0000000000000001 RBP: ffffc900050b7a98 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 203a7970636d656d R12: ffff888039c54000 R13: 1ffff92000a16f37 R14: ffff88803a815084 R15: 0000000000000010 FS: 00007f172bf306c0(0000) GS:ffff88805aa00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f172b3569f0 CR3: 0000000057f12005 CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: <TASK> arp_ioctl+0x33f/0x4b0 net/ipv4/arp.c:1261 inet_ioctl+0x314/0x3a0 net/ipv4/af_inet.c:981 sock_do_ioctl+0xdf/0x260 net/socket.c:1204 sock_ioctl+0x3ef/0x650 net/socket.c:1321 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __x64_sys_ioctl+0x18e/0x220 fs/ioctl.c:856 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x37/0x90 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x64/0xce RIP: 0033:0x7f172b262b8d Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f172bf300b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f172b3abf80 RCX: 00007f172b262b8d RDX: 0000000020000000 RSI: 0000000000008954 RDI: 0000000000000003 RBP: 00007f172b2d3493 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f172b3abf80 R15: 00007f172bf10000 </TASK> No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/dbc9b22d0ed319b4e29034ce0a3fe32a3ee2c587 - https://git.kernel.org/stable/c/97eaa2955db4120ce6ec2ef123e860bc32232c50 - https://git.kernel.org/stable/c/f119f2325ba70cbfdec701000dcad4d88805d5b0 - https://git.kernel.org/stable/c/a3f2c083cb575d80a7627baf3339e78fedccbb91 - https://git.kernel.org/stable/c/3ab0d6f8289ba8402ca95a9fc61a34909d5e1f3a - https://git.kernel.org/stable/c/a7d6027790acea24446ddd6632d394096c0f4667 - https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21048.
CVE ID: CVE-2024-21048 Date Updated: 2024-09-03T18:35:26.437Z Date Published: 2024-04-16T21:26:14.451Z Description: Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: XML input). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Web Applications Desktop Integrator accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2024.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9277.
CVE ID: CVE-2016-9277 Date Updated: 2024-08-06T02:42:11.318Z Date Published: 2016-11-11T19:00:00 Description: Integer overflow in SystemUI in KK(4.4) and L(5.0/5.1) on Samsung Note devices allows attackers to cause a denial of service (UI restart) via vectors involving APIs and an activity that computes an out-of-bounds array index, aka SVE-2016-6906. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/94292 - http://security.samsungmobile.com/smrupdate.html#SMR-NOV-2016 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-36603.
CVE ID: CVE-2021-36603 Date Updated: 2024-08-04T01:01:57.890Z Date Published: 2023-01-09T00:00:00 Description: Cross Site Scripting (XSS) in Tasmota firmware 6.5.0 allows remote attackers to inject JavaScript code via a crafted string in the field "Friendly Name 1". No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/arendst/Tasmota/issues/12221 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1844.
CVE ID: CVE-2008-1844 Date Updated: 2024-08-07T08:40:58.647Z Date Published: 2008-04-16T17:00:00 Description: SQL injection vulnerability in cat.php in W2B phpHotResources allows remote attackers to execute arbitrary SQL commands via the kind parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.osvdb.org/44378 - http://forum.aria-security.com/showthread.php?p=70 - http://secunia.com/advisories/29825 - http://marc.info/?l=bugtraq&m=120792465631586&w=2 - http://www.securityfocus.com/bid/28736 - https://exchange.xforce.ibmcloud.com/vulnerabilities/41793 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-42890.
CVE ID: CVE-2022-42890 Date Updated: 2024-08-03T13:19:05.216Z Date Published: 2022-10-25T00:00:00 Description: A vulnerability in Batik of Apache XML Graphics allows an attacker to run Java code from untrusted SVG via JavaScript. This issue affects Apache XML Graphics prior to 1.16. Users are recommended to upgrade to version 1.16. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/pkvhy0nsj1h1mlon008wtzhosbtxjwly - http://www.openwall.com/lists/oss-security/2022/10/25/3 - https://lists.debian.org/debian-lts-announce/2022/10/msg00038.html - https://www.debian.org/security/2022/dsa-5264 - https://security.gentoo.org/glsa/202401-11 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3919.
CVE ID: CVE-2018-3919 Date Updated: 2024-09-16T23:55:26.216Z Date Published: 2018-08-23T15:00:00Z Description: An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process insecurely extracts the fields from the "clips" table of its SQLite database, leading to a buffer overflow on the stack. An attacker can send a series of HTTP requests to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0583 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35048.
CVE ID: CVE-2022-35048 Date Updated: 2024-08-03T09:29:17.423Z Date Published: 2022-10-14T00:00:00 Description: OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b0b2c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://drive.google.com/file/d/18cCD_Z6TDbx9IDQQKq3ZTALMGWSl_qWH/view?usp=sharing - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35048.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-41802.
CVE ID: CVE-2024-41802 Date Updated: 2024-08-02T04:46:52.692Z Date Published: 2024-07-30T15:49:52.120Z Description: Xibo is a content management system (CMS). An SQL injection vulnerability was discovered in the API routes inside the CMS responsible for Filtering DataSets. This allows an authenticated user to to obtain and modify arbitrary data from the Xibo database by injecting specially crafted values in to the APIs for importing JSON and importing a Layout containing DataSet data. Users should upgrade to version 3.3.12 or 4.0.14 which fix this issue No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-x4qm-vvhp-g7c2 - https://github.com/xibosignage/xibo-cms/commit/b7a5899338cd841a39702e3fcaff76aa0ffe4075 - https://xibosignage.com/blog/security-advisory-2024-07 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16869.
CVE ID: CVE-2019-16869 Date Updated: 2024-08-05T01:24:48.659Z Date Published: 2019-09-26T15:28:25 Description: Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/netty/netty/issues/9571 - https://github.com/netty/netty/compare/netty-4.1.41.Final...netty-4.1.42.Final - https://lists.apache.org/thread.html/e39931d7cdd17241e69a0a09a89d99d7435bcc59afee8a9628d67769%40%3Cdev.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/6e1e34c0d5635a987d595df9e532edac212307243bb1b49eead6d55b%40%3Cissues.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/2494a2ac7f66af6e4646a4937b17972a4ec7cd3c7333c66ffd6c639d%40%3Cdev.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/76540c8b0ed761bfa6c81fa28c13057f13a5448aed079d656f6a3c79%40%3Cissues.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/9128111213b7b734ffc85db08d8f789b00a85a7f241b708e55debbd0%40%3Cissues.zookeeper.apache.org%3E - https://lists.debian.org/debian-lts-announce/2019/09/msg00035.html - https://lists.apache.org/thread.html/d3eb0dbea75ef5c400bd49dfa1901ad50be606cca3cb29e0d01b6a54%40%3Cissues.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/3e6d7aae1cca10257e3caf2d69b22f74c875f12a1314155af422569d%40%3Cdev.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/37ed432b8eb35d8bd757f53783ec3e334bd51f514534432bea7f1c3d%40%3Cissues.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/bdf7a5e597346a75d2d884ca48c767525e35137ad59d8f10b8fc943c%40%3Cdev.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/380f6d2730603a2cd6b0a8bea9bcb21a86c199147e77e448c5f7390b%40%3Ccommits.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/cf5aa087632ead838f8ac3a42e9837684e7afe6e0fcb7704e0c73bc0%40%3Ccommits.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/cbf6e6a04cb37e9320ad20e437df63beeab1755fc0761918ed5c5a6e%40%3Ccommits.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/2e1cf538b502713c2c42ffa46d81f4688edb5676eb55bd9fc4b4fed7%40%3Cissues.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/a0f77c73af32cbe4ff0968bfcbbe80ae6361f3dccdd46f3177547266%40%3Cissues.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/b2cd51795f938632c6f60a4c59d9e587fbacd7f7d0e0a3684850a30f%40%3Cissues.zookeeper.apache.org%3E - https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E - https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E - https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E - https://lists.apache.org/thread.html/e192fe8797c192679759ffa6b15e4d0806546945a41d8ebfbc6ee3ac%40%3Ccommits.tinkerpop.apache.org%3E - https://lists.apache.org/thread.html/d14f721e0099b914daebe29bca199fde85d8354253be9d6d3d46507a%40%3Ccommits.cassandra.apache.org%3E - https://lists.apache.org/thread.html/f6c5ebfb018787c764f000362d59e4b231c0a36b6253aa866de8c64e%40%3Ccommits.cassandra.apache.org%3E - https://access.redhat.com/errata/RHSA-2019:3892 - https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E - https://access.redhat.com/errata/RHSA-2019:3901 - https://lists.apache.org/thread.html/6063699b87b501ecca8dd3b0e82251bfc85f29363a9b46ac5ace80cf%40%3Cdev.olingo.apache.org%3E - https://lists.apache.org/thread.html/d7d530599dc7813056c712213e367b68cdf56fb5c9b73f864870bc4c%40%3Cdev.olingo.apache.org%3E - https://lists.apache.org/thread.html/af6e9c2d716868606523857a4cd7a5ee506e6d1710f5fb0d567ec030%40%3Cdev.olingo.apache.org%3E - https://lists.apache.org/thread.html/19fed892608db1efe5a5ce14372137669ff639df0205323959af7de3%40%3Cdev.olingo.apache.org%3E - https://lists.apache.org/thread.html/b264fa5801e87698e9f43f2b5585fbc5ebdc26c6f4aad861b258fb69%40%3Cdev.olingo.apache.org%3E - https://lists.apache.org/thread.html/b3dda6399a0ea2b647624b899fd330fca81834e41b13e3e11e1002d8%40%3Cdev.olingo.apache.org%3E - https://lists.apache.org/thread.html/ee6faea9e542c0b90afd70297a9daa203e20d41aa2ac7fca6703662f%40%3Cissues.spark.apache.org%3E - https://lists.apache.org/thread.html/860acce024d79837e963a51a42bab2cef8e8d017aad2b455ecd1dcf0%40%3Cissues.spark.apache.org%3E - https://lists.apache.org/thread.html/0acadfb96176768caac79b404110df62d14d30aa9d53b6dbdb1407ac%40%3Cissues.spark.apache.org%3E - https://lists.apache.org/thread.html/51923a9ba513b2e816e02a9d1fd8aa6f12e3e4e99bbd9dc884bccbbe%40%3Cissues.spark.apache.org%3E - https://lists.apache.org/thread.html/681493a2f9b63f5b468f741d88d1aa51b2cfcf7a1c5b74ea8c4343fb%40%3Cissues.spark.apache.org%3E - https://lists.apache.org/thread.html/799eb85d67cbddc1851a3e63a07b55e95b2f44f1685225d38570ce89%40%3Cissues.spark.apache.org%3E - https://lists.apache.org/thread.html/64b10f49c68333aaecf00348c5670fe182e49fd60d45c4a3ab241f8b%40%3Cissues.spark.apache.org%3E - https://lists.apache.org/thread.html/b3ddeebbfaf8a288d7de8ab2611cf2609ab76b9809f0633248546b7c%40%3Cissues.spark.apache.org%3E - https://lists.apache.org/thread.html/35961d1ae00849974353a932b4fef12ebce074541552eceefa04f1fd%40%3Cdev.olingo.apache.org%3E - https://www.debian.org/security/2020/dsa-4597 - https://seclists.org/bugtraq/2020/Jan/6 - https://access.redhat.com/errata/RHSA-2020:0164 - https://access.redhat.com/errata/RHSA-2020:0159 - https://access.redhat.com/errata/RHSA-2020:0160 - https://access.redhat.com/errata/RHSA-2020:0161 - https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948%40%3Ccommits.druid.apache.org%3E - https://access.redhat.com/errata/RHSA-2020:0445 - https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d%40%3Ccommits.cassandra.apache.org%3E - https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91%40%3Ccommon-issues.hadoop.apache.org%3E - https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543%40%3Ccommon-issues.hadoop.apache.org%3E - https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9%40%3Ccommon-issues.hadoop.apache.org%3E - https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html - https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762%40%3Ccommon-issues.hadoop.apache.org%3E - https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5%40%3Ccommon-issues.hadoop.apache.org%3E - https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41%40%3Ccommon-issues.hadoop.apache.org%3E - https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836%40%3Ccommon-issues.hadoop.apache.org%3E - https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4%40%3Ccommon-commits.hadoop.apache.org%3E - https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9%40%3Ccommon-commits.hadoop.apache.org%3E - https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6%40%3Ccommon-commits.hadoop.apache.org%3E - https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532%40%3Ccommon-issues.hadoop.apache.org%3E - https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3%40%3Ccommits.cassandra.apache.org%3E - https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html - https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7%40%3Cissues.flink.apache.org%3E - https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f%40%3Cdev.flink.apache.org%3E - https://usn.ubuntu.com/4532-1/ - https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e%40%3Ccommits.camel.apache.org%3E - https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E - https://lists.apache.org/thread.html/r831e0548fad736a98140d0b3b7dc575af0c50faea0b266434ba813cc%40%3Cdev.rocketmq.apache.org%3E - https://lists.apache.org/thread.html/rcddf723a4b4117f8ed6042e9ac25e8c5110a617bab77694b61b14833%40%3Cdev.rocketmq.apache.org%3E - https://lists.apache.org/thread.html/rb25b42f666d2cac5e6e6b3f771faf60d1f1aa58073dcdd8db14edf8a%40%3Cdev.rocketmq.apache.org%3E - https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec%40%3Ccommits.pulsar.apache.org%3E - https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4%40%3Ccommits.pulsar.apache.org%3E - https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2%40%3Ccommits.pulsar.apache.org%3E - https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05%40%3Ccommits.cassandra.apache.org%3E - https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7%40%3Ccommits.cassandra.apache.org%3E - https://lists.apache.org/thread.html/r3225f7dfe6b8a37e800ecb8e31abd7ac6c4312dbd3223dd8139c37bb%40%3Ccommits.cassandra.apache.org%3E - https://lists.apache.org/thread.html/r73c400ab66d79821dec9e3472f0e2c048d528672bdb0f8bf44d7cb1f%40%3Ccommits.cassandra.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-48869.
CVE ID: CVE-2022-48869 Date Updated: 2024-09-12T17:32:54.495Z Date Published: 2024-08-21T06:09:59.526Z Description: In the Linux kernel, the following vulnerability has been resolved: USB: gadgetfs: Fix race between mounting and unmounting The syzbot fuzzer and Gerald Lee have identified a use-after-free bug in the gadgetfs driver, involving processes concurrently mounting and unmounting the gadgetfs filesystem. In particular, gadgetfs_fill_super() can race with gadgetfs_kill_sb(), causing the latter to deallocate the_device while the former is using it. The output from KASAN says, in part: BUG: KASAN: use-after-free in instrument_atomic_read_write include/linux/instrumented.h:102 [inline] BUG: KASAN: use-after-free in atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline] BUG: KASAN: use-after-free in __refcount_sub_and_test include/linux/refcount.h:272 [inline] BUG: KASAN: use-after-free in __refcount_dec_and_test include/linux/refcount.h:315 [inline] BUG: KASAN: use-after-free in refcount_dec_and_test include/linux/refcount.h:333 [inline] BUG: KASAN: use-after-free in put_dev drivers/usb/gadget/legacy/inode.c:159 [inline] BUG: KASAN: use-after-free in gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086 Write of size 4 at addr ffff8880276d7840 by task syz-executor126/18689 CPU: 0 PID: 18689 Comm: syz-executor126 Not tainted 6.1.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: <TASK> ... atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline] __refcount_sub_and_test include/linux/refcount.h:272 [inline] __refcount_dec_and_test include/linux/refcount.h:315 [inline] refcount_dec_and_test include/linux/refcount.h:333 [inline] put_dev drivers/usb/gadget/legacy/inode.c:159 [inline] gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086 deactivate_locked_super+0xa7/0xf0 fs/super.c:332 vfs_get_super fs/super.c:1190 [inline] get_tree_single+0xd0/0x160 fs/super.c:1207 vfs_get_tree+0x88/0x270 fs/super.c:1531 vfs_fsconfig_locked fs/fsopen.c:232 [inline] The simplest solution is to ensure that gadgetfs_fill_super() and gadgetfs_kill_sb() are serialized by making them both acquire a new mutex. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/9a39f4626b361ee7aa10fd990401c37ec3b466ae - https://git.kernel.org/stable/c/856e4b5e53f21edbd15d275dde62228dd94fb2b4 - https://git.kernel.org/stable/c/a2e075f40122d8daf587db126c562a67abd69cf9 - https://git.kernel.org/stable/c/616fd34d017000ecf9097368b13d8a266f4920b3 - https://git.kernel.org/stable/c/d18dcfe9860e842f394e37ba01ca9440ab2178f4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3827.
CVE ID: CVE-2014-3827 Date Updated: 2024-08-06T10:57:17.354Z Date Published: 2020-02-11T18:23:37 Description: Multiple cross-site scripting (XSS) vulnerabilities in the MyBB (aka MyBulletinBoard) before 1.8.4 allow remote authenticated users to inject arbitrary web script or HTML via the title parameter in the (1) edit or (2) add action in the user-users module or the (3) finduser action or the name parameter in an (4) edit action in the user-user module or the (5) editprofile action to modcp.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://blog.mybb.com/2015/02/15/mybb-1-8-4-released-feature-update-security-maintenance-release/ - https://adamziaja.com/poc/201312-xss-mybb.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1357.
CVE ID: CVE-2011-1357 Date Updated: 2024-08-06T22:21:34.131Z Date Published: 2011-08-11T22:00:00 Description: Cross-site scripting (XSS) vulnerability in agentDetect.jsp in the web UI in IBM WebSphere Service Registry and Repository (WSRR) 6.3 before 6.3.0.5, 7.0 before 7.0.0.5, and 7.5 before 7.5.0.1 allows remote attackers to inject arbitrary web script or HTML via the User-Agent HTTP header. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=swg1IV01657 - https://exchange.xforce.ibmcloud.com/vulnerabilities/69040 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24708.
CVE ID: CVE-2024-24708 Date Updated: 2024-08-01T23:28:11.193Z Date Published: 2024-02-28T13:20:16.604Z Description: Cross-Site Request Forgery (CSRF) vulnerability in W3speedster W3SPEEDSTER.This issue affects W3SPEEDSTER: from n/a through 7.19. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/w3speedster-wp/wordpress-w3speedster-plugin-7-19-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40031.
CVE ID: CVE-2023-40031 Date Updated: 2024-10-02T14:53:13.209Z Date Published: 2023-08-25T19:49:23.433Z Description: Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to heap buffer write overflow in `Utf8_16_Read::convert`. This issue may lead to arbitrary code execution. As of time of publication, no known patches are available in existing versions of Notepad++. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34642.
CVE ID: CVE-2023-34642 Date Updated: 2024-08-02T16:17:04.071Z Date Published: 2023-06-19T00:00:00 Description: KioWare for Windows through v8.33 was discovered to contain an incomplete blacklist filter for blocked dialog boxes on Windows 10. This issue can allow attackers to open a file dialog box via the function showDirectoryPicker() which can then be used to open an unprivileged command prompt. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.kioware.com/versionhistory.aspx?pid=15 - https://github.com/huntergregal/CVE/tree/main/TBD-KIOWARE-002 - https://github.com/huntergregal/CVE/tree/main/CVE-2023-34642 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41859.
CVE ID: CVE-2023-41859 Date Updated: 2024-08-02T19:09:49.074Z Date Published: 2023-10-02T08:49:27.338Z Description: Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ashok Rane Order Delivery Date for WP e-Commerce plugin <= 1.2 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/order-delivery-date/wordpress-order-delivery-date-for-wp-e-commerce-plugin-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3282.
CVE ID: CVE-2024-3282 Date Updated: 2024-08-23T14:14:30.597Z Date Published: 2024-08-23T06:00:02.699Z Description: The WP Table Builder WordPress plugin through 1.5.0 does not sanitise and escape some of its Table data, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/12bf5e8e-24c9-48b9-b94c-c14ed60d7c15/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16896.
CVE ID: CVE-2017-16896 Date Updated: 2024-09-16T22:02:07.928Z Date Published: 2017-11-20T16:00:00Z Description: A SQL injection in classes/handler/public.php in the forgotpass component of Tiny Tiny RSS 17.4 exists via the login parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.tt-rss.org/git/tt-rss/commit/2352c320c2ed34ec7df1ad22f0c55a1b26489815 - https://discourse.tt-rss.org/t/sql-injection-in-forgotpass-fixed/669 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-36665.
CVE ID: CVE-2023-36665 Date Updated: 2024-08-02T16:52:54.371Z Date Published: 2023-07-05T00:00:00 Description: "protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.5 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/protobufjs/protobuf.js/compare/protobufjs-v7.2.3...protobufjs-v7.2.4 - https://github.com/protobufjs/protobuf.js/commit/e66379f451b0393c27d87b37fa7d271619e16b0d - https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665 - https://github.com/protobufjs/protobuf.js/releases/tag/protobufjs-v7.2.4 - https://github.com/protobufjs/protobuf.js/pull/1899 - https://security.netapp.com/advisory/ntap-20240628-0006/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-9165.
CVE ID: CVE-2018-9165 Date Updated: 2024-08-05T07:17:51.774Z Date Published: 2018-04-01T18:00:00 Description: The pushdup function in util/decompile.c in libming through 0.4.8 does not recognize the need for ActionPushDuplicate to perform a deep copy when a String is at the top of the stack, making the library vulnerable to a util/decompile.c getName NULL pointer dereference, which may allow attackers to cause a denial of service via a crafted SWF file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.debian.org/debian-lts-announce/2018/04/msg00008.html - https://github.com/libming/libming/issues/121 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32257.
CVE ID: CVE-2023-32257 Date Updated: 2024-08-02T15:10:23.977Z Date Published: 2023-07-24T15:19:26.923Z Description: A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/security/cve/CVE-2023-32257 - https://bugzilla.redhat.com/show_bug.cgi?id=2219806 - https://security.netapp.com/advisory/ntap-20230915-0011/ - https://www.zerodayinitiative.com/advisories/ZDI-CAN-20596/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1417.
CVE ID: CVE-2015-1417 Date Updated: 2024-08-06T04:40:18.698Z Date Published: 2017-07-25T18:00:00 Description: The inet module in FreeBSD 10.2x before 10.2-PRERELEASE, 10.2-BETA2-p2, 10.2-RC1-p1, 10.1x before 10.1-RELEASE-p16, 9.x before 9.3-STABLE, 9.3-RELEASE-p21, and 8.x before 8.4-STABLE, 8.4-RELEASE-p35 on systems with VNET enabled and at least 16 VNET instances allows remote attackers to cause a denial of service (mbuf consumption) via multiple concurrent TCP connections. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1033111 - http://www.securityfocus.com/bid/76112 - https://www.freebsd.org/security/advisories/FreeBSD-SA-15:15.tcp.asc No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-17902.
CVE ID: CVE-2018-17902 Date Updated: 2024-09-16T18:34:00.672Z Date Published: 2018-10-12T14:00:00Z Description: Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The application utilizes multiple methods of session management which could result in a denial of service to the remote management functions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://web-material3.yokogawa.com/YSAR-18-0007-E.pdf - https://ics-cert.us-cert.gov/advisories/ICSA-18-151-03 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-34303.
CVE ID: CVE-2021-34303 Date Updated: 2024-08-04T00:05:52.529Z Date Published: 2021-07-13T11:03:20 Description: A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Tiff_Loader.dll library in affected applications lacks proper validation of user-supplied data when parsing TIFF files. This could result in an out of bounds read past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-13198) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf - https://www.zerodayinitiative.com/advisories/ZDI-21-848/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2251.
CVE ID: CVE-2018-2251 Date Updated: 2019-01-22T17:57:02 Date Published: 2019-01-22T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5051.
CVE ID: CVE-2023-5051 Date Updated: 2024-08-02T07:44:53.767Z Date Published: 2023-10-27T03:16:17.469Z Description: The CallRail Phone Call Tracking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'callrail_form' shortcode in versions up to, and including, 0.5.2 due to insufficient input sanitization and output escaping on the 'form_id' user supplied attribute. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/35def866-7460-4cad-8d86-7b9e4905cbe4?source=cve - https://plugins.trac.wordpress.org/browser/callrail-phone-call-tracking/tags/0.5.2/callrail.php#L174 - https://plugins.trac.wordpress.org/changeset/2982876/callrail-phone-call-tracking#file0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-32320.
CVE ID: CVE-2024-32320 Date Updated: 2024-08-02T02:06:44.086Z Date Published: 2024-04-17T00:00:00 Description: Tenda AC500 V2.0.1.9(1307) firmware has a stack overflow vulnerability via the timeZone parameter in the formSetTimeZone function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetTimeZone.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0764.
CVE ID: CVE-2020-0764 Date Updated: 2024-08-04T06:11:05.637Z Date Published: 2020-10-16T22:17:33 Description: <p>An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.</p> <p>To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application.</p> <p>The security update addresses the vulnerability by ensuring the Windows Storage Services properly handle file operations.</p> No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0764 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0722.
CVE ID: CVE-2008-0722 Date Updated: 2024-08-07T07:54:22.942Z Date Published: 2008-02-12T01:00:00 Description: Cross-site scripting (XSS) vulnerability in index.php in Pagetool 1.0.7 allows remote attackers to inject arbitrary web script or HTML via the search_term parameter in a pagetool_search action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/27653 - https://www.exploit-db.com/exploits/4983 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-21185.
CVE ID: CVE-2018-21185 Date Updated: 2024-08-05T12:26:38.691Z Date Published: 2020-04-28T12:54:09 Description: Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, D7800 before 1.0.1.34, R7500 before 1.0.0.122, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000055173/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2610 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0320.
CVE ID: CVE-2014-0320 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5841.
CVE ID: CVE-2014-5841 Date Updated: 2024-08-06T11:55:50.202Z Date Published: 2014-09-09T10:00:00 Description: The Girls Calendar Period&Weight (aka jp.co.cybird.apps.lifestyle.cal) application 3.2.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/735705 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-5057.
CVE ID: CVE-2020-5057 Date Updated: 2021-01-05T18:44:16 Date Published: 2021-01-05T18:44:16 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24377.
CVE ID: CVE-2024-24377 Date Updated: 2024-08-29T18:25:36.117Z Date Published: 2024-02-16T00:00:00 Description: An issue in idocv v.14.1.3_20231228 allows a remote attacker to execute arbitrary code and obtain sensitive information via a crafted script. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://zhuabapa.top/2024/01/18/idocv_20231228_rce/#more No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0450.
CVE ID: CVE-2015-0450 Date Updated: 2024-08-06T04:10:10.456Z Date Published: 2015-04-16T16:00:00 Description: Unspecified vulnerability in the Oracle WebCenter Portal component in Oracle Fusion Middleware 11.1.1.8.0 allows remote attackers to affect integrity via unknown vectors related to WebCenter Spaces Application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html - http://www.securitytracker.com/id/1032131 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6381.
CVE ID: CVE-2024-6381 Date Updated: 2024-08-01T21:41:03.172Z Date Published: 2024-07-02T17:14:48.908Z Description: The bson_strfreev function in the MongoDB C driver library may be susceptible to an integer overflow where the function will try to free memory at a negative offset. This may result in memory corruption. This issue affected libbson versions prior to 1.26.2 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jira.mongodb.org/browse/CDRIVER-5622 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4783.
CVE ID: CVE-2015-4783 Date Updated: 2024-08-06T06:25:21.958Z Date Published: 2015-07-16T10:00:00 Description: Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015-2624, CVE-2015-2626, CVE-2015-2640, CVE-2015-2654, CVE-2015-2656, CVE-2015-4754, CVE-2015-4764, CVE-2015-4775, CVE-2015-4776, CVE-2015-4777, CVE-2015-4778, CVE-2015-4780, CVE-2015-4781, CVE-2015-4782, CVE-2015-4784, CVE-2015-4785, CVE-2015-4786, CVE-2015-4787, CVE-2015-4789, and CVE-2015-4790. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3732.
CVE ID: CVE-2009-3732 Date Updated: 2024-08-07T06:38:30.210Z Date Published: 2010-04-12T18:00:00 Description: Format string vulnerability in vmware-vmrc.exe build 158248 in VMware Remote Console (aka VMrc) allows remote attackers to execute arbitrary code via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://security.gentoo.org/glsa/glsa-201209-25.xml - http://lists.vmware.com/pipermail/security-announce/2010/000090.html - http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html - http://secunia.com/advisories/39110 - http://www.vmware.com/security/advisories/VMSA-2010-0007.html - http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8956.
CVE ID: CVE-2019-8956 Date Updated: 2024-08-04T21:31:37.498Z Date Published: 2019-04-01T18:39:32 Description: In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the "sctp_sendmsg()" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8 - https://secuniaresearch.flexerasoftware.com/secunia_research/2019-5/ - https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=ba59fb0273076637f0add4311faa990a5eec27c0 - https://usn.ubuntu.com/3930-1/ - https://usn.ubuntu.com/3930-2/ - https://support.f5.com/csp/article/K12671141 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42532.
CVE ID: CVE-2021-42532 Date Updated: 2024-09-17T02:11:35.473Z Date Published: 2022-05-02T22:24:08.727710Z Description: XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html - https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22592.
CVE ID: CVE-2022-22592 Date Updated: 2024-08-03T03:14:55.777Z Date Published: 2022-03-18T17:59:24 Description: A logic issue was addressed with improved state management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may prevent Content Security Policy from being enforced. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213053 - https://support.apple.com/en-us/HT213054 - https://support.apple.com/en-us/HT213057 - https://support.apple.com/en-us/HT213059 - https://support.apple.com/en-us/HT213058 - https://security.gentoo.org/glsa/202208-39 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-3865.
CVE ID: CVE-2019-3865 Date Updated: 2024-08-04T19:19:18.608Z Date Published: 2020-06-22T17:51:19 Description: A vulnerability was found in quay-2, where a stored XSS vulnerability has been found in the super user function of quay. Attackers are able to use the name field of service key to inject scripts and make it run when admin users try to change the name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3865 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35677.
CVE ID: CVE-2022-35677 Date Updated: 2024-09-16T20:58:25.569Z Date Published: 2022-08-11T14:42:01.112892Z Description: Adobe FrameMaker versions 2019 Update 8 (and earlier) and 2020 Update 4 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/framemaker/apsb22-42.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19911.
CVE ID: CVE-2019-19911 Date Updated: 2024-08-05T02:32:10.085Z Date Published: 2020-01-05T21:57:24 Description: There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python this results in the process being terminated by the OOM killer. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html - https://usn.ubuntu.com/4272-1/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/ - https://www.debian.org/security/2020/dsa-4631 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30142.
CVE ID: CVE-2022-30142 Date Updated: 2024-10-01T15:51:00.018Z Date Published: 2022-06-15T21:51:30 Description: Windows File History Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30142 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-35620.
CVE ID: CVE-2020-35620 Date Updated: 2021-02-15T21:49:59 Date Published: 2021-02-15T21:49:59 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5501.
CVE ID: CVE-2008-5501 Date Updated: 2024-08-07T10:56:46.927Z Date Published: 2008-12-17T23:00:00 Description: The layout engine in Mozilla Firefox 3.x before 3.0.5, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service via vectors that trigger an assertion failure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/32882 - http://secunia.com/advisories/33421 - http://www.redhat.com/support/errata/RHSA-2008-1036.html - http://www.vupen.com/english/advisories/2009/0977 - https://bugzilla.mozilla.org/show_bug.cgi?id=395623 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:245 - https://usn.ubuntu.com/690-1/ - http://secunia.com/advisories/33203 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10257 - http://secunia.com/advisories/33216 - http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 - http://www.redhat.com/support/errata/RHSA-2008-1037.html - http://www.mozilla.org/security/announce/2008/mfsa2008-60.html - http://www.redhat.com/support/errata/RHSA-2009-0002.html - http://secunia.com/advisories/33188 - https://exchange.xforce.ibmcloud.com/vulnerabilities/47407 - http://www.securitytracker.com/id?1021417 - http://secunia.com/advisories/33189 - http://secunia.com/advisories/34501 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3296.
CVE ID: CVE-2018-3296 Date Updated: 2024-10-02T19:19:13.406Z Date Published: 2018-10-17T01:00:00 Description: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - http://www.securitytracker.com/id/1041887 - http://www.securityfocus.com/bid/105619 - http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5250.
CVE ID: CVE-2008-5250 Date Updated: 2024-08-07T10:49:11.913Z Date Published: 2008-12-19T17:00:00 Description: Cross-site scripting (XSS) vulnerability in MediaWiki before 1.6.11, 1.12.x before 1.12.2, and 1.13.x before 1.13.3, when Internet Explorer is used and uploads are enabled, or an SVG scripting browser is used and SVG uploads are enabled, allows remote authenticated users to inject arbitrary web script or HTML by editing a wiki page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html - http://www.debian.org/security/2009/dsa-1901 - http://secunia.com/advisories/33133 - http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html - http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html - http://www.securityfocus.com/bid/32844 - https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html - http://secunia.com/advisories/33349 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2461.
CVE ID: CVE-2018-2461 Date Updated: 2024-08-05T04:21:34.532Z Date Published: 2018-09-11T15:00:00 Description: Missing authorization check in SAP HCM Fiori "People Profile" (GBX01 HR version 6.0) for an authenticated user which may result in an escalation of privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.support.sap.com/#/notes/2673959 - http://www.securityfocus.com/bid/105327 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-31090.
CVE ID: CVE-2024-31090 Date Updated: 2024-08-02T01:46:04.400Z Date Published: 2024-03-31T19:27:37.254Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 荒野无灯 Hacklog Down As PDF allows Reflected XSS.This issue affects Hacklog Down As PDF: from n/a through 2.3.6. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/down-as-pdf/wordpress-hacklog-down-as-pdf-plugin-2-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30863.
CVE ID: CVE-2023-30863 Date Updated: 2024-08-02T14:37:15.497Z Date Published: 2023-06-06T05:13:09.889Z Description: In Connectivity Service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.unisoc.com/en_us/secy/announcementDetail/1664822361414762498 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4003.
CVE ID: CVE-2013-4003 Date Updated: 2024-08-06T16:30:49.464Z Date Published: 2013-08-29T10:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in IBM TRIRIGA Application Platform 2.x and 3.x before 3.3.1.1, and 8, allow remote authenticated users to inject arbitrary web script or HTML via (1) unspecified input to WebProcess.srv, (2) unspecified input to html/en/default/actionHandler/queryHandler.jsp, or (3) unspecified input in a portalSectionId action to html/en/default/reportTemplate/hGridTopQuery.jsp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21646694 - https://exchange.xforce.ibmcloud.com/vulnerabilities/85266 - https://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_tririga_application_platform_has_potential_cross_site_scripting_vulnerabilities_in_various_url_s No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-29805.
CVE ID: CVE-2023-29805 Date Updated: 2024-08-02T14:14:39.915Z Date Published: 2023-04-14T00:00:00 Description: WFS-SR03 v1.0.3 was discovered to contain a command injection vulnerability via the pro_stor_canceltrans_handler_part_19 function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sore-pail-31b.notion.site/Command-Injection-2-WFS-SR03-436d09790c2f4e31b197c39711e17775 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-8369.
CVE ID: CVE-2024-8369 Date Updated: 2024-09-10T13:19:26.394Z Date Published: 2024-09-10T11:30:31.628Z Description: The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized access to Private or Password-protected events due to missing authorization checks in all versions up to, and including, 4.0.4.3. This makes it possible for unauthenticated attackers to view private or password-protected events. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/97174ec0-a2b7-455e-9bf8-b6f51546beee?source=cve - https://wordpress.org/plugins/eventprime-event-calendar-management/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0449.
CVE ID: CVE-2021-0449 Date Updated: 2024-08-03T15:40:01.063Z Date Published: 2021-03-10T16:13:36 Description: In the Titan M chip firmware, there is a possible disclosure of stack memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-175117965 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2021-03-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1005
The MITRE ATT&CK technique T1005: Data from Local System is related to the vulnerability CVE-CVE-2017-16651. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2017-20191.
CVE ID: CVE-2017-20191 Date Updated: 2024-08-05T21:45:25.966Z Date Published: 2024-03-31T08:31:04.275Z Description: A vulnerability was found in Zimbra zm-admin-ajax up to 8.8.1. It has been classified as problematic. This affects the function XFormItem.prototype.setError of the file WebRoot/js/ajax/dwt/xforms/XFormItem.js of the component Form Textbox Field Error Handler. The manipulation of the argument message leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 8.8.2 is able to address this issue. The identifier of the patch is bb240ce0c71c01caabaa43eed30c78ba8d7d3591. It is recommended to upgrade the affected component. The identifier VDB-258621 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.258621 - https://vuldb.com/?ctiid.258621 - https://github.com/Zimbra/zm-admin-ajax/commit/bb240ce0c71c01caabaa43eed30c78ba8d7d3591 - https://github.com/Zimbra/zm-admin-ajax/releases/tag/8.8.2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0188.
CVE ID: CVE-2014-0188 Date Updated: 2024-08-06T09:05:39.256Z Date Published: 2014-04-24T14:00:00 Description: The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to a passthrough trigger. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2014-0422.html - https://bugzilla.redhat.com/show_bug.cgi?id=1090120 - http://rhn.redhat.com/errata/RHSA-2014-0423.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9195.
CVE ID: CVE-2016-9195 Date Updated: 2024-08-06T02:42:11.064Z Date Published: 2017-04-07T17:00:00 Description: A vulnerability in RADIUS Change of Authorization (CoA) request processing in the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition by disconnecting a single connection. This vulnerability affects Cisco Wireless LAN Controller running software release 8.3.102.0. More Information: CSCvb01835. Known Fixed Releases: 8.4(1.49) 8.3(111.0) 8.3(108.0) 8.3(104.24) 8.3(102.3). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/97425 - http://www.securitytracker.com/id/1038188 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-wlc1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1205.
CVE ID: CVE-2009-1205 Date Updated: 2009-04-03T09:00:00 Date Published: 2009-04-01T10:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2188.
CVE ID: CVE-2010-2188 Date Updated: 2024-08-07T02:25:06.714Z Date Published: 2010-06-15T17:48:00 Description: Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by calling the ActionScript native object 2200 connect method multiple times with different arguments, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, and CVE-2010-2187. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/511924/100/0/threaded - http://www.vupen.com/english/advisories/2011/0192 - http://www.vupen.com/english/advisories/2010/1421 - http://support.apple.com/kb/HT4435 - http://secunia.com/advisories/40545 - http://www.zerodayinitiative.com/advisories/ZDI-10-111 - http://www.redhat.com/support/errata/RHSA-2010-0464.html - http://www.vupen.com/english/advisories/2010/1793 - http://secunia.com/advisories/43026 - http://www.vupen.com/english/advisories/2010/1432 - http://security.gentoo.org/glsa/glsa-201101-09.xml - http://www.us-cert.gov/cas/techalerts/TA10-162A.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16271 - http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - http://www.securityfocus.com/bid/40759 - http://securitytracker.com/id?1024085 - http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html - http://securitytracker.com/id?1024086 - http://www.vupen.com/english/advisories/2010/1434 - http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt - http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html - http://www.adobe.com/support/security/bulletins/apsb10-14.html - http://www.securityfocus.com/bid/40798 - http://secunia.com/advisories/40144 - http://www.redhat.com/support/errata/RHSA-2010-0470.html - http://www.vupen.com/english/advisories/2010/1482 - http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751 - https://exchange.xforce.ibmcloud.com/vulnerabilities/59337 - http://www.vupen.com/english/advisories/2010/1522 - http://www.adobe.com/support/security/bulletins/apsb10-16.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6946 - http://www.vupen.com/english/advisories/2010/1453 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3041.
CVE ID: CVE-2013-3041 Date Updated: 2024-08-06T16:00:09.588Z Date Published: 2013-10-01T00:00:00 Description: The Web Client in IBM Rational ClearQuest 7.1 before 7.1.2.12, 8.0 before 8.0.0.8, and 8.0.1 before 8.0.1.1 allows remote attackers to obtain sensitive information from the client-server data stream via unspecified vectors associated with a "JSON hijacking attack." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/84724 - http://www-01.ibm.com/support/docview.wss?uid=swg21648086 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5981.
CVE ID: CVE-2024-5981 Date Updated: 2024-08-01T21:25:03.202Z Date Published: 2024-06-14T01:00:04.079Z Description: A vulnerability was found in itsourcecode Online House Rental System 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268458 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.268458 - https://vuldb.com/?ctiid.268458 - https://vuldb.com/?submit.356163 - https://github.com/LiuYongXiang-git/cve/issues/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2018-15776
CVE-CVE-2018-15776 is a vulnerability in iDRAC. It is related to the MITRE ATT&CK technique T1190: Exploit Public-Facing Application. The vulnerability is classified as a exploitation_technique type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2018 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2019-9727.
CVE ID: CVE-2019-9727 Date Updated: 2024-08-04T22:01:53.931Z Date Published: 2019-05-13T16:41:24 Description: Unauthenticated password hash disclosure in the User.getUserPWD method in eQ-3 AG Homematic CCU3 3.43.15 and earlier allows remote attackers to retrieve the GUI password hashes of GUI users. This vulnerability can be exploited by unauthenticated attackers with access to the web interface. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://atomic111.github.io/article/homematic-ccu3-unauthenticated-password-hash-disclosure No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-26369.
CVE ID: CVE-2020-26369 Date Updated: 2022-12-02T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43278.
CVE ID: CVE-2021-43278 Date Updated: 2024-08-04T03:55:28.304Z Date Published: 2021-11-14T20:52:49 Description: An Out-of-bounds Read vulnerability exists in the OBJ file reading procedure in Open Design Alliance Drawings SDK before 2022.11. The lack of validating the input length can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.opendesign.com/security-advisories No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7902.
CVE ID: CVE-2015-7902 Date Updated: 2024-08-06T08:06:31.293Z Date Published: 2015-10-28T10:00:00 Description: Infinite Automation Mango Automation 2.5.x and 2.6.x before 2.6.0 build 430 provides different error messages for failed login attempts in unspecified circumstances, which allows remote attackers to obtain sensitive information via a series of requests. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-15-300-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30017.
CVE ID: CVE-2022-30017 Date Updated: 2024-08-03T06:40:47.515Z Date Published: 2022-05-23T16:20:02 Description: Rescue Dispatch Management System 1.0 suffers from Stored XSS, leading to admin account takeover via cookie stealing. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sourcecodester.com/php/15296/rescue-dispatch-management-system-phpoop-free-source-code.html - https://github.com/offsecin/bugsdisclose/blob/main/stored-xss No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-44937.
CVE ID: CVE-2024-44937 Date Updated: 2024-09-15T17:55:34.783Z Date Published: 2024-08-26T10:11:30.234Z Description: In the Linux kernel, the following vulnerability has been resolved: platform/x86: intel-vbtn: Protect ACPI notify handler against recursion Since commit e2ffcda16290 ("ACPI: OSL: Allow Notify () handlers to run on all CPUs") ACPI notify handlers like the intel-vbtn notify_handler() may run on multiple CPU cores racing with themselves. This race gets hit on Dell Venue 7140 tablets when undocking from the keyboard, causing the handler to try and register priv->switches_dev twice, as can be seen from the dev_info() message getting logged twice: [ 83.861800] intel-vbtn INT33D6:00: Registering Intel Virtual Switches input-dev after receiving a switch event [ 83.861858] input: Intel Virtual Switches as /devices/pci0000:00/0000:00:1f.0/PNP0C09:00/INT33D6:00/input/input17 [ 83.861865] intel-vbtn INT33D6:00: Registering Intel Virtual Switches input-dev after receiving a switch event After which things go seriously wrong: [ 83.861872] sysfs: cannot create duplicate filename '/devices/pci0000:00/0000:00:1f.0/PNP0C09:00/INT33D6:00/input/input17' ... [ 83.861967] kobject: kobject_add_internal failed for input17 with -EEXIST, don't try to register things with the same name in the same directory. [ 83.877338] BUG: kernel NULL pointer dereference, address: 0000000000000018 ... Protect intel-vbtn notify_handler() from racing with itself with a mutex to fix this. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/5c9618a3b6ea94cf7bdff7702aca8bf2d777d97b - https://git.kernel.org/stable/c/e075c3b13a0a142dcd3151b25d29a24f31b7b640 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34537.
CVE ID: CVE-2023-34537 Date Updated: 2024-08-02T16:10:07.113Z Date Published: 2023-06-13T00:00:00 Description: A Reflected XSS was discovered in HotelDruid version 3.0.5, an attacker can issue malicious code/command on affected webpage's parameter to trick user on browser and/or exfiltrate data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/leekenghwa/CVE-2023-34537---XSS-reflected--found-in-HotelDruid-3.0.5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-42032.
CVE ID: CVE-2024-42032 Date Updated: 2024-08-08T13:10:34.518Z Date Published: 2024-08-08T09:05:15.059Z Description: Access permission verification vulnerability in the Contacts module Impact: Successful exploitation of this vulnerability may affect service confidentiality. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2024/8/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4000.
CVE ID: CVE-2024-4000 Date Updated: 2024-08-01T20:26:57.231Z Date Published: 2024-05-02T16:52:34.856Z Description: The WordPress Header Builder Plugin – Pearl plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'stm_hb' shortcode in all versions up to, and including, 1.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/c23bba83-35d2-4098-8104-8389bb2ff880?source=cve - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078437%40pearl-header-builder&new=3078437%40pearl-header-builder&sfp_email=&sfph_mail= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9746.
CVE ID: CVE-2016-9746 Date Updated: 2024-09-17T02:57:21.831Z Date Published: 2017-07-05T17:00:00Z Description: IBM Team Concert (RTC) 4.0, 5.0 and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 119821. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/119821 - http://www.securityfocus.com/bid/99352 - http://www.ibm.com/support/docview.wss?uid=swg22004611 - http://www.securitytracker.com/id/1038912 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5371.
CVE ID: CVE-2015-5371 Date Updated: 2024-08-06T06:41:09.369Z Date Published: 2015-07-06T14:00:00 Description: The AuthenticationFilter class in SolarWinds Storage Manager allows remote attackers to upload and execute arbitrary scripts via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.zerodayinitiative.com/advisories/ZDI-15-275/ - http://www.securityfocus.com/bid/75515 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42797.
CVE ID: CVE-2021-42797 Date Updated: 2024-08-04T03:38:50.223Z Date Published: 2023-12-16T00:00:00 Description: Path traversal vulnerability in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and prior allows an unauthenticated user to steal the Windows access token of the user account configured for accessing external DB resources. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.aveva.com/en/products/edge/ - https://www.cisa.gov/news-events/ics-advisories/icsa-22-326-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.