instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2019-12498.
CVE ID: CVE-2019-12498 Date Updated: 2024-08-04T23:24:38.118Z Date Published: 2020-03-20T18:37:23 Description: The WP Live Chat Support plugin before 8.0.33 for WordPress accepts certain REST API calls without invoking the wplc_api_permission_check protection mechanism. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/wp-live-chat-support/#developers - https://plugins.trac.wordpress.org/changeset/2098577/wp-live-chat-support/trunk - https://plugins.trac.wordpress.org/log/wp-live-chat-support/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24807.
CVE ID: CVE-2024-24807 Date Updated: 2024-08-01T23:28:12.885Z Date Published: 2024-02-05T20:09:36.891Z Description: Sulu is a highly extensible open-source PHP content management system based on the Symfony framework. There is an issue when inputting HTML into the Tag name. The HTML is executed when the tag name is listed in the auto complete form. Only admin users can create tags so they are the only ones affected. The problem is patched with version(s) 2.4.16 and 2.5.12. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/sulu/sulu/security/advisories/GHSA-gfrh-gwqc-63cv - https://github.com/sulu/sulu/releases/tag/2.4.16 - https://github.com/sulu/sulu/releases/tag/2.5.12 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27785.
CVE ID: CVE-2021-27785 Date Updated: 2024-09-16T19:05:29.360Z Date Published: 2022-07-29T23:55:10.012146Z Description: HCL Commerce's Remote Store server could allow a local attacker to obtain sensitive personal information. The vulnerability requires the victim to first perform a particular operation on the website. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0099765 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7403.
CVE ID: CVE-2014-7403 Date Updated: 2024-08-06T12:47:33.211Z Date Published: 2014-10-19T10:00:00 Description: The NZHondas.com (aka com.tapatalk.nzhondascom) application 3.6.14 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/937929 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33584.
CVE ID: CVE-2023-33584 Date Updated: 2024-09-16T21:38:47.357Z Date Published: 2023-06-21T00:00:00 Description: Sourcecodester Enrollment System Project V1.0 is vulnerable to SQL Injection (SQLI) attacks, which allow an attacker to manipulate the SQL queries executed by the application. The application fails to properly validate user-supplied input in the username and password fields during the login process, enabling an attacker to inject malicious SQL code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sourcecodester.com/php/14444/enrollment-system-project-source-code-using-phpmysql.html - http://packetstormsecurity.com/files/172718/Enrollment-System-Project-1.0-Authentication-Bypass-SQL-Injection.html - https://www.exploit-db.com/exploits/51501 - https://packetstormsecurity.com/files/cve/CVE-2023-33584 - https://github.com/sudovivek/My-CVE/blob/main/CVE-2023-33584_exploit.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2928.
CVE ID: CVE-2024-2928 Date Updated: 2024-08-01T19:32:42.225Z Date Published: 2024-06-06T18:29:54.973Z Description: A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fixed in version 2.11.3. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../'. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system, including sensitive files like '/etc/passwd'. The vulnerability is a bypass to a previous patch that only addressed similar manipulation within the URI's query string, highlighting the need for comprehensive validation of all parts of a URI to prevent LFI attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.com/bounties/19bf02d7-6393-4a95-b9d0-d6d4d2d8c298 - https://github.com/mlflow/mlflow/commit/96f0b573a73d8eedd6735a2ce26e08859527be07 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27408.
CVE ID: CVE-2021-27408 Date Updated: 2024-08-03T20:48:16.852Z Date Published: 2021-06-11T16:31:58 Description: The affected product is vulnerable to an out-of-bounds read, which can cause information leakage leading to arbitrary code execution if chained to the out-of-bounds write vulnerability on the Welch Allyn medical device management tools (Welch Allyn Service Tool: versions prior to v1.10, Welch Allyn Connex Device Integration Suite – Network Connectivity Engine (NCE): versions prior to v5.3, Welch Allyn Software Development Kit (SDK): versions prior to v3.2, Welch Allyn Connex Central Station (CS): versions prior to v1.8.6, Welch Allyn Service Monitor: versions prior to v1.7.0.0, Welch Allyn Connex Vital Signs Monitor (CVSM): versions prior to v2.43.02, Welch Allyn Connex Integrated Wall System (CIWS): versions prior to v2.43.02, Welch Allyn Connex Spot Monitor (CSM): versions prior to v1.52, Welch Allyn Spot Vital Signs 4400 Device (Spot 4400) / Welch Allyn Spot 4400 Vital Signs Extended Care Device: versions prior to v1.11.00). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://us-cert.cisa.gov/ics/advisories/icsma-21-152-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-0362.
CVE ID: CVE-2012-0362 Date Updated: 2024-08-06T18:23:30.834Z Date Published: 2012-05-02T10:00:00 Description: The extended ACL functionality in Cisco IOS 12.2(58)SE2 and 15.0(1)SE discards all lines that end with a log or time keyword, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by sending network traffic, aka Bug ID CSCts01106. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://puck.nether.net/pipermail/cisco-nsp/2012-February/083517.html - http://www.securitytracker.com/id?1027005 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0805.
CVE ID: CVE-2013-0805 Date Updated: 2024-08-06T14:41:47.389Z Date Published: 2014-03-20T16:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in the search feature in iTop (aka IT Operations Portal) 2.0, 1.2.1, 1.2, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter to pages/UI.php or (2) expression parameter to pages/run_query.php. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.csnc.ch/misc/files/advisories/CVE-2013-0805.txt - http://secunia.com/advisories/51702 - http://packetstormsecurity.com/files/119767/iTop-Cross-Site-Scripting.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/81498 - http://seclists.org/bugtraq/2013/Jan/102 - http://archives.neohapsis.com/archives/fulldisclosure/2013-01/0208.html - http://osvdb.org/89574 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2067.
CVE ID: CVE-2010-2067 Date Updated: 2024-08-07T02:17:14.412Z Date Published: 2010-06-23T18:00:00 Description: Stack-based buffer overflow in the TIFFFetchSubjectDistance function in tif_dirread.c in LibTIFF before 3.9.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long EXIF SubjectDistance field in a TIFF file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/40241 - http://bugzilla.maptools.org/show_bug.cgi?id=2212 - http://marc.info/?l=oss-security&m=127731610612908&w=2 - http://www.vupen.com/english/advisories/2010/1638 - http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424 - http://osvdb.org/65676 - http://www.ubuntu.com/usn/USN-954-1 - http://www.remotesensing.org/libtiff/v3.9.4.html - http://security.gentoo.org/glsa/glsa-201209-02.xml - https://bugzilla.redhat.com/show_bug.cgi?id=599576 - http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=874 - http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - http://secunia.com/advisories/40381 - http://secunia.com/advisories/50726 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20396.
CVE ID: CVE-2018-20396 Date Updated: 2024-09-16T23:22:13.708Z Date Published: 2018-12-23T21:00:00Z Description: NET&SYS MNG2120J 5.76.1006c and MNG6300 5.83.6305jrc2 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv - https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8383.
CVE ID: CVE-2020-8383 Date Updated: 2021-04-13T20:41:25 Date Published: 2021-04-13T20:41:25 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-20096.
CVE ID: CVE-2020-20096 Date Updated: 2024-08-04T14:15:29.125Z Date Published: 2022-03-23T21:28:54 Description: Whatsapp iOS 2.19.80 and prior and Android 2.19.222 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/zadewg/RIUS - http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4495.
CVE ID: CVE-2012-4495 Date Updated: 2024-08-06T20:35:09.925Z Date Published: 2012-10-31T16:00:00 Description: The Mime Mail module 6.x-1.x before 6.x-1.1 for Drupal does not properly restrict access to files outside Drupal's publish files directory, which allows remote authenticated users to send arbitrary files as attachments. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://drupal.org/node/1719446 - http://www.openwall.com/lists/oss-security/2012/10/04/6 - http://www.securityfocus.com/bid/54914 - http://drupalcode.org/project/mimemail.git/commitdiff/ae065d1 - http://drupal.org/node/1719482 - http://www.openwall.com/lists/oss-security/2012/10/07/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27257.
CVE ID: CVE-2024-27257 Date Updated: 2024-09-10T15:30:25.752Z Date Published: 2024-09-10T14:24:20.430Z Description: IBM OpenPages 8.3 and 9.0 potentially exposes information about client-side source code through use of JavaScript source maps to unauthorized users. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7167702 - https://exchange.xforce.ibmcloud.com/vulnerabilities/283966 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-26022.
CVE ID: CVE-2023-26022 Date Updated: 2024-08-02T11:39:06.167Z Date Published: 2023-04-28T18:26:55.536Z Description: IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) is vulnerable to a denial of service as the server may crash when an Out of Memory occurs using the DBMS_OUTPUT module. IBM X-Force ID: 247868. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6985669 - https://exchange.xforce.ibmcloud.com/vulnerabilities/247868 - https://security.netapp.com/advisory/ntap-20230511-0010/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2414.
CVE ID: CVE-2012-2414 Date Updated: 2024-08-06T19:34:25.544Z Date Published: 2012-04-30T20:00:00 Description: main/manager.c in the Manager Interface in Asterisk Open Source 1.6.2.x before 1.6.2.24, 1.8.x before 1.8.11.1, and 10.x before 10.3.1 and Asterisk Business Edition C.3.x before C.3.7.4 does not properly enforce System class authorization requirements, which allows remote authenticated users to execute arbitrary commands via (1) the originate action in the MixMonitor application, (2) the SHELL and EVAL functions in the GetVar manager action, or (3) the SHELL and EVAL functions in the Status manager action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2012/dsa-2460 - http://osvdb.org/81454 - http://www.securitytracker.com/id?1026961 - http://downloads.asterisk.org/pub/security/AST-2012-004.html - http://secunia.com/advisories/48941 - http://www.securityfocus.com/bid/53206 - https://exchange.xforce.ibmcloud.com/vulnerabilities/75100 - http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079759.html - http://secunia.com/advisories/48891 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-22336.
CVE ID: CVE-2020-22336 Date Updated: 2024-08-04T14:51:10.270Z Date Published: 2023-07-06T00:00:00 Description: An issue was discovered in pdfcrack 0.17 thru 0.18, allows attackers to execute arbitrary code via a stack overflow in the MD5 function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sourceforge.net/p/pdfcrack/bugs/12/ - https://lists.debian.org/debian-lts-announce/2023/08/msg00004.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2650.
CVE ID: CVE-2010-2650 Date Updated: 2024-08-07T02:39:37.700Z Date Published: 2010-07-06T17:00:00 Description: Unspecified vulnerability in Google Chrome before 5.0.375.99 has unknown impact and attack vectors, related to an "annoyance with print dialogs." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html - http://code.google.com/p/chromium/issues/detail?id=46575 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11438 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5072.
CVE ID: CVE-2012-5072 Date Updated: 2024-08-06T20:58:01.463Z Date Published: 2012-10-16T21:29:00 Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html - http://security.gentoo.org/glsa/glsa-201406-32.xml - http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html - http://rhn.redhat.com/errata/RHSA-2012-1466.html - http://rhn.redhat.com/errata/RHSA-2012-1386.html - http://secunia.com/advisories/51438 - http://secunia.com/advisories/51141 - http://marc.info/?l=bugtraq&m=135758563611658&w=2 - http://www-01.ibm.com/support/docview.wss?uid=swg21621154 - http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html - http://rhn.redhat.com/errata/RHSA-2013-1455.html - http://www.securityfocus.com/bid/56083 - http://rhn.redhat.com/errata/RHSA-2012-1391.html - http://www-01.ibm.com/support/docview.wss?uid=swg21620037 - http://secunia.com/advisories/51029 - http://marc.info/?l=bugtraq&m=135758563611658&w=2 - http://secunia.com/advisories/51166 - http://secunia.com/advisories/51390 - http://rhn.redhat.com/errata/RHSA-2012-1392.html - http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 - http://secunia.com/advisories/51327 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16522 - http://rhn.redhat.com/errata/RHSA-2012-1467.html - http://marc.info/?l=bugtraq&m=135542848327757&w=2 - http://secunia.com/advisories/51028 - http://rhn.redhat.com/errata/RHSA-2013-1456.html - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html - http://secunia.com/advisories/51326 - https://exchange.xforce.ibmcloud.com/vulnerabilities/79434 - http://rhn.redhat.com/errata/RHSA-2012-1385.html - http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf - http://marc.info/?l=bugtraq&m=135542848327757&w=2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5340.
CVE ID: CVE-2018-5340 Date Updated: 2024-08-05T05:33:43.642Z Date Published: 2018-04-18T08:00:00 Description: An issue was discovered in Zoho ManageEngine Desktop Central 10.0.124 and 10.0.184: database access using a superuser account (specifically, an account with permission to write to the filesystem via SQL queries). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.manageengine.com/products/desktop-central/query-restriction-bypass-vulnerability.html - https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-manageengine-desktop-central/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41442.
CVE ID: CVE-2022-41442 Date Updated: 2024-08-03T12:42:46.231Z Date Published: 2022-10-07T00:00:00 Description: PicUploader v2.6.3 was discovered to contain cross-site scripting (XSS) vulnerability via the setStorageParams function in SettingController.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xiebruce/PicUploader/issues/80 - https://github.com/xiebruce/PicUploader/commit/2b0411bddb7942e0ace136a82d4ccde0fe66f263 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-44792.
CVE ID: CVE-2021-44792 Date Updated: 2024-09-17T03:38:14.900Z Date Published: 2022-01-27T12:27:12.288958Z Description: Single Connect does not perform an authorization check when using the "log-monitor" module. A remote attacker could exploit this vulnerability to access the logging interface. The exploitation of this vulnerability might allow a remote attacker to obtain sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.usom.gov.tr/bildirim/tr-22-0093 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-42374.
CVE ID: CVE-2022-42374 Date Updated: 2024-08-03T13:10:40.399Z Date Published: 2023-01-26T00:00:00 Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18403. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tracker-software.com/product/pdf-xchange-editor/history - https://www.zerodayinitiative.com/advisories/ZDI-22-1361/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15024.
CVE ID: CVE-2017-15024 Date Updated: 2024-08-05T19:42:22.382Z Date Published: 2017-10-04T07:00:00 Description: find_abstract_instance_name in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/ - https://sourceware.org/bugzilla/show_bug.cgi?id=22187 - https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=52a93b95ec0771c97e26f0bb28630a271a667bd2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7425.
CVE ID: CVE-2019-7425 Date Updated: 2024-08-04T20:46:46.371Z Date Published: 2019-03-17T20:10:05 Description: XSS exists in Zoho ManageEngine Netflow Analyzer Professional v7.0.0.2 in the Administration zone "/netflow/jspui/linkdownalertConfig.jsp" file in the task parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/151585/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-XSS.html - https://www.manageengine.com/products/netflow/?doc - http://seclists.org/fulldisclosure/2019/Feb/29 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5157.
CVE ID: CVE-2015-5157 Date Updated: 2024-08-06T06:32:32.976Z Date Published: 2015-08-31T10:00:00 Description: arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2016-0212.html - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html - http://rhn.redhat.com/errata/RHSA-2016-0715.html - http://www.ubuntu.com/usn/USN-2689-1 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - http://www.ubuntu.com/usn/USN-2690-1 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b6e6a8334d56354853f9c255d1395c2ba570e0a - http://www.securityfocus.com/bid/76005 - http://www.ubuntu.com/usn/USN-2691-1 - http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html - http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html - http://www.ubuntu.com/usn/USN-2688-1 - http://rhn.redhat.com/errata/RHSA-2016-0185.html - http://www.debian.org/security/2015/dsa-3313 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6 - http://www.openwall.com/lists/oss-security/2015/07/22/7 - http://rhn.redhat.com/errata/RHSA-2016-0224.html - https://github.com/torvalds/linux/commit/9b6e6a8334d56354853f9c255d1395c2ba570e0a - http://www.ubuntu.com/usn/USN-2687-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6622.
CVE ID: CVE-2023-6622 Date Updated: 2024-09-13T23:30:47.212Z Date Published: 2023-12-08T17:33:55.348Z Description: A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2024:2394 - https://access.redhat.com/errata/RHSA-2024:2950 - https://access.redhat.com/errata/RHSA-2024:3138 - https://access.redhat.com/security/cve/CVE-2023-6622 - https://bugzilla.redhat.com/show_bug.cgi?id=2253632 - https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2462.
CVE ID: CVE-2022-2462 Date Updated: 2024-08-03T00:39:07.647Z Date Published: 2022-09-06T17:18:57 Description: The Transposh WordPress Translation plugin for WordPress is vulnerable to sensitive information disclosure to unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_history' AJAX action and insufficient restriction on the data returned in the response. This makes it possible for unauthenticated users to exfiltrate usernames of individuals who have translated text. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/bd1f12ac-86ac-4be9-9575-98381c3b4291?source=cve - https://plugins.trac.wordpress.org/browser/transposh-translation-filter-for-wordpress/trunk/transposh.php?rev=2682425#L1948 - https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2462 - https://www.rcesecurity.com/2022/07/WordPress-Transposh-Exploiting-a-Blind-SQL-Injection-via-XSS/ - https://packetstormsecurity.com/files/167878/wptransposh1081-disclose.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4743.
CVE ID: CVE-2017-4743 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28404.
CVE ID: CVE-2023-28404 Date Updated: 2024-08-02T12:38:25.188Z Date Published: 2023-11-14T19:04:24.382Z Description: Out-of-bounds read in the Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow an authenticated user to potentially enable information disclosure via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3035.
CVE ID: CVE-2018-3035 Date Updated: 2024-10-02T20:03:48.500Z Date Published: 2018-07-18T13:00:00 Description: Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 12.0.4, 12.1.0, 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Investor Servicing accessible data as well as unauthorized access to critical data or complete access to all Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - http://www.securitytracker.com/id/1041307 - http://www.securityfocus.com/bid/104793 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3603.
CVE ID: CVE-2012-3603 Date Updated: 2024-08-06T20:13:51.425Z Date Published: 2012-07-25T20:00:00 Description: WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/kb/HT5485 - http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html - http://support.apple.com/kb/HT5503 - http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html - http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html - http://support.apple.com/kb/HT5400 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0156.
CVE ID: CVE-2020-0156 Date Updated: 2024-08-04T05:47:40.948Z Date Published: 2020-06-11T14:43:49 Description: In NxpNfc::ioctl of NxpNfc.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-139736127 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2020-06-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30273.
CVE ID: CVE-2022-30273 Date Updated: 2024-08-03T06:48:34.760Z Date Published: 2022-07-26T21:21:34 Description: The Motorola MDLC protocol through 2022-05-02 mishandles message integrity. It supports three security modes: Plain, Legacy Encryption, and New Encryption. In Legacy Encryption mode, traffic is encrypted via the Tiny Encryption Algorithm (TEA) block-cipher in ECB mode. This mode of operation does not offer message integrity and offers reduced confidentiality above the block level, as demonstrated by an ECB Penguin attack against any block ciphers. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.forescout.com/blog/ - https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation - https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-05 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-8395.
CVE ID: CVE-2024-8395 Date Updated: 2024-09-05T20:28:18.500Z Date Published: 2024-09-05T19:32:41.101Z Description: FlyCASS CASS and KCM systems did not correctly filter SQL queries, which made them vulnerable to attack by outside attackers with no authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ian.sh/tsa No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20849.
CVE ID: CVE-2023-20849 Date Updated: 2024-10-01T18:58:38.274Z Date Published: 2023-09-04T02:28:03.822Z Description: In imgsys_cmdq, there is a possible use after free due to a missing valid range checking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07340433; Issue ID: ALPS07340350. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/September-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32886.
CVE ID: CVE-2022-32886 Date Updated: 2024-08-03T07:54:03.135Z Date Published: 2022-09-20T00:00:00 Description: A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 16, iOS 16, iOS 15.7 and iPadOS 15.7. Processing maliciously crafted web content may lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213446 - https://support.apple.com/en-us/HT213445 - https://support.apple.com/en-us/HT213442 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ/ - https://www.debian.org/security/2022/dsa-5240 - https://www.debian.org/security/2022/dsa-5241 - https://lists.debian.org/debian-lts-announce/2022/09/msg00034.html - http://seclists.org/fulldisclosure/2022/Oct/41 - http://seclists.org/fulldisclosure/2022/Oct/28 - http://seclists.org/fulldisclosure/2022/Oct/39 - https://security.gentoo.org/glsa/202305-32 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5161.
CVE ID: CVE-2018-5161 Date Updated: 2024-08-05T05:26:46.999Z Date Published: 2018-06-11T21:00:00 Description: Crafted message headers can cause a Thunderbird process to hang on receiving the message. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2018:1726 - https://security.gentoo.org/glsa/201811-13 - https://www.mozilla.org/security/advisories/mfsa2018-13/ - https://usn.ubuntu.com/3660-1/ - http://www.securitytracker.com/id/1040946 - https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html - https://access.redhat.com/errata/RHSA-2018:1725 - https://www.debian.org/security/2018/dsa-4209 - https://bugzilla.mozilla.org/show_bug.cgi?id=1411720 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3753.
CVE ID: CVE-2020-3753 Date Updated: 2024-08-04T07:44:50.371Z Date Published: 2020-02-13T15:45:16 Description: Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have a stack exhaustion vulnerability. Successful exploitation could lead to memory leak . No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb20-05.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32062.
CVE ID: CVE-2021-32062 Date Updated: 2024-08-03T23:17:28.686Z Date Published: 2021-05-05T18:39:41 Description: MapServer before 7.0.8, 7.1.x and 7.2.x before 7.2.3, 7.3.x and 7.4.x before 7.4.5, and 7.5.x and 7.6.x before 7.6.3 does not properly enforce the MS_MAP_NO_PATH and MS_MAP_PATTERN restrictions that are intended to control the locations from which a mapfile may be loaded (with MapServer CGI). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mapserver.org/development/changelog/changelog-7-6.html - https://mapserver.org/development/changelog/changelog-7-4.html - https://mapserver.org/development/changelog/changelog-7-2.html - https://mapserver.org/development/changelog/changelog-7-0.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNORAZCJ7AIPJFUY6WGLYIA3QVPWFXFY/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYVWUC4EOW5WZAZGPLRTZS5QXNUEBPQ5/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-31908.
CVE ID: CVE-2024-31908 Date Updated: 2024-08-02T01:59:50.538Z Date Published: 2024-05-31T13:05:34.385Z Description: IBM Planning Analytics Local 2.0 and 2.1 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 289890. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7151122 - https://exchange.xforce.ibmcloud.com/vulnerabilities/289890 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-48678.
CVE ID: CVE-2023-48678 Date Updated: 2024-08-16T19:22:09.595Z Date Published: 2024-02-27T16:45:00.771Z Description: Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security-advisory.acronis.com/advisories/SEC-2319 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4522.
CVE ID: CVE-2010-4522 Date Updated: 2024-09-16T20:22:36.682Z Date Published: 2010-12-30T20:00:00Z Description: Multiple cross-site scripting (XSS) vulnerabilities in MyBB (aka MyBulletinBoard) 1.4.14, and 1.6.x before 1.6.1, allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) editpost.php, (2) member.php, and (3) newreply.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://blog.mybb.com/2010/12/15/mybb-1-6-1-release-1-4-14-update/ - http://openwall.com/lists/oss-security/2010/12/20/1 - http://openwall.com/lists/oss-security/2010/12/22/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-14578.
CVE ID: CVE-2020-14578 Date Updated: 2024-09-27T18:38:05.115Z Date Published: 2020-07-15T17:34:28 Description: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujul2020.html - https://security.netapp.com/advisory/ntap-20200717-0005/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/ - https://www.debian.org/security/2020/dsa-4734 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/ - https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html - https://usn.ubuntu.com/4453-1/ - https://security.gentoo.org/glsa/202008-24 - https://kc.mcafee.com/corporate/index?page=content&id=SB10332 - http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html - https://security.gentoo.org/glsa/202209-15 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40761.
CVE ID: CVE-2022-40761 Date Updated: 2024-08-03T12:28:41.535Z Date Published: 2022-09-16T21:35:50 Description: The function tee_obj_free in Samsung mTower through 0.3.0 allows a trusted application to trigger a Denial of Service (DoS) by invoking the function TEE_AllocateOperation with a disturbed heap layout, related to utee_cryp_obj_alloc. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_svc_cryp.c#L1248 - https://github.com/Samsung/mTower/blob/efd36709306a9afcca5b4782499d01be0c7a02a5/tee/tee/tee_obj.c#L109 - https://github.com/Samsung/mTower/issues/83 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-28025.
CVE ID: CVE-2020-28025 Date Updated: 2024-08-04T16:25:43.977Z Date Published: 2021-05-06T04:36:18 Description: Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4785.
CVE ID: CVE-2018-4785 Date Updated: 2023-09-14T18:43:30.476Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14711.
CVE ID: CVE-2018-14711 Date Updated: 2024-08-05T09:38:13.215Z Date Published: 2019-05-13T12:20:19 Description: Missing cross-site request forgery protection in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to cause state-changing actions with specially crafted URLs. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30627.
CVE ID: CVE-2023-30627 Date Updated: 2024-08-02T14:28:51.834Z Date Published: 2023-04-24T20:07:27.588Z Description: jellyfin-web is the web client for Jellyfin, a free-software media system. Starting in version 10.1.0 and prior to version 10.8.10, a stored cross-site scripting vulnerability in device.js can be used to make arbitrary calls to the `REST` endpoints with admin privileges. When combined with CVE-2023-30626, this results in remote code execution on the Jellyfin instance in the context of the user who's running it. This issue is patched in version 10.8.10. There are no known workarounds. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jellyfin/jellyfin-web/security/advisories/GHSA-89hp-h43h-r5pq - https://github.com/jellyfin/jellyfin/security/advisories/GHSA-9p5f-5x8v-x65m - https://github.com/jellyfin/jellyfin-web/commit/b88a5951e1a517ff4c820e693d9c0da981cf68ee - https://github.com/jellyfin/jellyfin-web/releases/tag/v10.8.10 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24514.
CVE ID: CVE-2021-24514 Date Updated: 2024-08-03T19:35:19.892Z Date Published: 2021-10-25T13:20:39 Description: The Visual Form Builder WordPress plugin before 3.0.4 does not sanitise or escape its Form Name, allowing high privilege users such as admin to set Cross-Site Scripting payload in them, even when the unfiltered_html capability is disallowed No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/0afa78d3-2403-4e0c-8f16-5b7874b03cd2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-13159.
CVE ID: CVE-2017-13159 Date Updated: 2024-09-16T22:51:28.056Z Date Published: 2017-12-06T14:00:00Z Description: An information disclosure vulnerability in the Android system (activitymanagerservice). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID A-32879772. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/102109 - https://source.android.com/security/bulletin/2017-12-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21456.
CVE ID: CVE-2023-21456 Date Updated: 2024-08-02T09:36:34.583Z Date Published: 2023-03-16T00:00:00 Description: Path traversal vulnerability in Galaxy Themes Service prior to SMR Mar-2023 Release 1 allows attacker to access arbitrary file with system uid. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=03 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3261.
CVE ID: CVE-2018-3261 Date Updated: 2024-10-02T19:29:22.007Z Date Published: 2018-10-17T01:00:00 Description: Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Integration Broker). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1041891 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - http://www.securityfocus.com/bid/105609 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6472.
CVE ID: CVE-2014-6472 Date Updated: 2024-08-06T12:17:24.035Z Date Published: 2014-10-15T15:15:00 Description: Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.2, 12.2.3, and 12.2.4 allows remote attackers to affect integrity via vectors related to LOV, a different vulnerability than CVE-2014-6539. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/70457 - http://secunia.com/advisories/61781 - http://www.securitytracker.com/id/1031042 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html - http://secunia.com/advisories/61725 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4378.
CVE ID: CVE-2013-4378 Date Updated: 2024-09-17T00:51:25.336Z Date Published: 2013-09-30T16:00:00Z Description: Cross-site scripting (XSS) vulnerability in HtmlSessionInformationsReport.java in JavaMelody 1.46 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted X-Forwarded-For header. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/oss-sec/2013/q3/679 - https://code.google.com/p/javamelody/source/detail?r=3515 - https://code.google.com/p/javamelody/wiki/ReleaseNotes - http://www.securityfocus.com/bid/62679 - https://code.google.com/p/javamelody/issues/detail?id=346 - http://osvdb.org/97778 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0924.
CVE ID: CVE-2019-0924 Date Updated: 2024-08-04T17:58:59.634Z Date Published: 2019-05-16T18:17:02 Description: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0924 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2322.
CVE ID: CVE-2017-2322 Date Updated: 2024-08-05T13:48:05.247Z Date Published: 2017-04-24T18:00:00 Description: A denial of service vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1, may allow an authenticated user to cause widespread denials of service to system services by consuming TCP and UDP ports which are normally reserved for other system services. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.juniper.net/JSA10783 - http://www.securityfocus.com/bid/97613 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-42662.
CVE ID: CVE-2024-42662 Date Updated: 2024-08-20T16:27:52.495Z Date Published: 2024-08-20T00:00:00 Description: An issue in apollocongif apollo v.2.2.0 allows a remote attacker to obtain sensitive information via a crafted request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/len0m0/Apolloinfo/blob/main/README.md - https://gist.github.com/len0m0/f0886d579de6c075506ab543e054dc7d No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-42233.
CVE ID: CVE-2024-42233 Date Updated: 2024-09-11T17:34:32.513Z Date Published: 2024-08-07T15:14:23.858Z Description: In the Linux kernel, the following vulnerability has been resolved: filemap: replace pte_offset_map() with pte_offset_map_nolock() The vmf->ptl in filemap_fault_recheck_pte_none() is still set from handle_pte_fault(). But at the same time, we did a pte_unmap(vmf->pte). After a pte_unmap(vmf->pte) unmap and rcu_read_unlock(), the page table may be racily changed and vmf->ptl maybe fails to protect the actual page table. Fix this by replacing pte_offset_map() with pte_offset_map_nolock(). As David said, the PTL pointer might be stale so if we continue to use it infilemap_fault_recheck_pte_none(), it might trigger UAF. Also, if the PTL fails, the issue fixed by commit 58f327f2ce80 ("filemap: avoid unnecessary major faults in filemap_fault()") might reappear. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/6a6c2aec1a89506595801b4cf7e8eef035f33748 - https://git.kernel.org/stable/c/24be02a42181f0707be0498045c4c4b13273b16d No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-9479.
CVE ID: CVE-2015-9479 Date Updated: 2024-08-06T08:51:05.324Z Date Published: 2019-10-10T16:20:53 Description: The ACF-Frontend-Display plugin through 2015-07-03 for WordPress has arbitrary file upload via an action=upload request to js/blueimp-jQuery-File-Upload-d45deb1/server/php/index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://packetstormsecurity.com/files/132590/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-13465.
CVE ID: CVE-2019-13465 Date Updated: 2024-08-04T23:57:37.861Z Date Published: 2019-12-30T17:50:01 Description: An issue was discovered in the ROS communications-related packages (aka ros_comm or ros-melodic-ros-comm) through 1.14.3. ROS_ASSERT_MSG only works when ROS_ASSERT_ENABLED is defined. This leads to a problem in the remove() function in clients/roscpp/src/libros/spinner.cpp. When ROS_ASSERT_ENABLED is not defined, the iterator loop will run out of the scope of the array, and cause denial of service for other components (that depend on the communication-related functions of this package). NOTE: The reporter of this issue now believes it was a false alarm. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ros/ros_comm/issues/1748 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-32109.
CVE ID: CVE-2024-32109 Date Updated: 2024-08-02T02:06:44.134Z Date Published: 2024-04-11T12:54:51.461Z Description: Cross-Site Request Forgery (CSRF) vulnerability in Julien Berthelot / MPEmbed.Com WP Matterport Shortcode allows Cross Site Request Forgery.This issue affects WP Matterport Shortcode: from n/a through 2.1.9. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/shortcode-gallery-for-matterport-showcase/wordpress-wp-matterport-shortcode-plugin-2-1-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3524.
CVE ID: CVE-2012-3524 Date Updated: 2024-08-06T20:05:12.760Z Date Published: 2012-09-18T17:00:00 Description: libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: "we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00009.html - http://www.openwall.com/lists/oss-security/2012/09/12/6 - http://www.openwall.com/lists/oss-security/2012/07/26/1 - http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00000.html - http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html - http://secunia.com/advisories/50544 - https://bugs.freedesktop.org/show_bug.cgi?id=52202 - https://bugzilla.redhat.com/show_bug.cgi?id=847402 - http://www.ubuntu.com/usn/USN-1576-1 - http://secunia.com/advisories/50537 - http://www.openwall.com/lists/oss-security/2012/09/17/2 - http://www.exploit-db.com/exploits/21323 - http://www.securityfocus.com/bid/55517 - http://rhn.redhat.com/errata/RHSA-2012-1261.html - http://www.openwall.com/lists/oss-security/2012/07/10/4 - http://www.openwall.com/lists/oss-security/2012/09/14/2 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:083 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:070 - http://secunia.com/advisories/50710 - http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00015.html - https://bugzilla.novell.com/show_bug.cgi?id=697105 - http://www.ubuntu.com/usn/USN-1576-2 - http://stealth.openwall.net/null/dzug.c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7236.
CVE ID: CVE-2017-7236 Date Updated: 2024-08-05T15:56:36.348Z Date Published: 2017-05-25T19:00:00 Description: SQL injection vulnerability in NetApp OnCommand Unified Manager Core Package 5.x before 5.2.2P1 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netapp.com/support/s/article/NTAP-20170517-0001 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16555.
CVE ID: CVE-2019-16555 Date Updated: 2024-08-05T01:17:41.026Z Date Published: 2019-12-17T14:40:47 Description: A user-supplied regular expression in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier was processed in a way that wasn't interruptible, allowing attackers to have Jenkins evaluate a regular expression without the ability to interrupt this process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651 - http://www.openwall.com/lists/oss-security/2019/12/17/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2301.
CVE ID: CVE-2010-2301 Date Updated: 2024-08-07T02:25:07.747Z Date Published: 2010-06-15T17:48:00 Description: Cross-site scripting (XSS) vulnerability in editing/markup.cpp in WebCore in WebKit in Google Chrome before 5.0.375.70 allows remote attackers to inject arbitrary web script or HTML via vectors related to the node.innerHTML property of a TEXTAREA element. NOTE: this might overlap CVE-2010-1762. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/43068 - http://code.google.com/p/chromium/issues/detail?id=43902 - http://www.vupen.com/english/advisories/2011/0212 - http://secunia.com/advisories/40072 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - https://bugs.webkit.org/show_bug.cgi?id=38922 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11861 - http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2827.
CVE ID: CVE-2013-2827 Date Updated: 2024-08-06T15:52:20.033Z Date Published: 2014-01-15T16:00:00 Description: An unspecified ActiveX control in WellinTech KingSCADA before 3.1.2, KingAlarm&Event before 3.1, and KingGraphic before 3.1.2 allows remote attackers to download arbitrary DLL code onto a client machine and execute this code via the ProjectURL property value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://ics-cert.us-cert.gov/advisories/ICSA-13-344-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-20925.
CVE ID: CVE-2024-20925 Date Updated: 2024-08-23T19:35:38.411Z Date Published: 2024-02-17T01:50:11.500Z Description: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u391; Oracle GraalVM Enterprise Edition: 20.3.12 and 21.3.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujan2024.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6736.
CVE ID: CVE-2014-6736 Date Updated: 2024-08-06T12:24:35.519Z Date Published: 2014-09-27T01:00:00 Description: The EPL Hat Trick (aka com.hat.trick.goal) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/959137 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-44238.
CVE ID: CVE-2023-44238 Date Updated: 2024-09-19T14:04:06.591Z Date Published: 2023-10-09T09:57:11.398Z Description: Cross-Site Request Forgery (CSRF) vulnerability in Joakim Ling Remove slug from custom post type plugin <= 1.0.3 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/remove-slug-from-custom-post-type/wordpress-remove-slug-from-custom-post-type-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4171.
CVE ID: CVE-2019-4171 Date Updated: 2024-09-17T01:41:47.225Z Date Published: 2019-09-17T19:05:23.715553Z Description: IBM Cognos Controller 10.3.0, 10.3.1, 10.4.0, and 10.4.1 does not set the secure attribute on authorization tokens or session cookies. This could allow an attacker to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 158876. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/security-bulletin-security-vulnerabilties-exist-ibm-cognos-controller - https://exchange.xforce.ibmcloud.com/vulnerabilities/158876 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34017.
CVE ID: CVE-2023-34017 Date Updated: 2024-09-26T15:04:33.107Z Date Published: 2023-07-25T13:33:06.245Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FiveStarPlugins Five Star Restaurant Reservations plugin <= 2.6.7 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/restaurant-reservations/wordpress-five-star-restaurant-reservations-plugin-2-6-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-24085.
CVE ID: CVE-2020-24085 Date Updated: 2024-08-04T15:05:11.841Z Date Published: 2021-01-20T20:20:25 Description: A cross-site scripting (XSS) vulnerability exists in MISP v2.4.128 in app/Controller/UserSettingsController.php at SetHomePage() function. Due to a lack of controller validation in "path" parameter, an attacker can execute malicious JavaScript code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/MISP/MISP/commit/b3550b48f30ad9fef86c5b5c664487aaf6f52787 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6835.
CVE ID: CVE-2014-6835 Date Updated: 2024-08-06T12:31:47.129Z Date Published: 2014-09-30T10:00:00 Description: The Herbal Guide (aka com.pocket.herbal.guide) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing - http://www.kb.cert.org/vuls/id/813145 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3378.
CVE ID: CVE-2022-3378 Date Updated: 2024-08-03T01:07:06.590Z Date Published: 2022-10-27T22:13:41.375Z Description: Horner Automation's Cscape version 9.90 SP 7 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer, leading to an out-of-bounds memory write. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-03 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23448.
CVE ID: CVE-2023-23448 Date Updated: 2024-08-02T10:28:40.885Z Date Published: 2023-05-15T10:53:31.506Z Description: Inclusion of Sensitive Information in Source Code in SICK FTMg AIR FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows a remote attacker to gain information about valid usernames via analysis of source code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sick.com/psirt - https://sick.com/.well-known/csaf/white/2023/sca-2023-0004.pdf - https://sick.com/.well-known/csaf/white/2023/sca-2023-0004.json No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0160.
CVE ID: CVE-2024-0160 Date Updated: 2024-08-01T17:41:16.055Z Date Published: 2024-06-12T06:41:33.041Z Description: Dell Client Platform contains an incorrect authorization vulnerability. An attacker with physical access to the system could potentially exploit this vulnerability by bypassing BIOS authorization to modify settings in the BIOS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000224763/dsa-2024-122 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4095.
CVE ID: CVE-2008-4095 Date Updated: 2024-08-07T10:00:42.595Z Date Published: 2008-09-16T10:00:00 Description: Multiple unspecified vulnerabilities in the Importer in Flip4Mac WMV before 2.2.1 have unknown impact and attack vectors, different vulnerabilities than CVE-2007-6713. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/45187 - http://www.flip4mac.com/downloads/wmv_components/flip4mac-wmv-release-notes.pdf - http://www.securityfocus.com/bid/31505 - http://secunia.com/advisories/31925 - http://www.securitytracker.com/id?1020956 - http://www.vupen.com/english/advisories/2008/2710 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4659.
CVE ID: CVE-2017-4659 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1204.
CVE ID: CVE-2024-1204 Date Updated: 2024-08-01T18:33:25.079Z Date Published: 2024-04-15T05:00:02.873Z Description: The Meta Box WordPress plugin before 5.9.4 does not prevent users with at least the contributor role from access arbitrary custom fields assigned to other user's posts. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/03191b00-0b05-42db-9ce2-fc525981b6c9/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-29398.
CVE ID: CVE-2020-29398 Date Updated: 2023-05-12T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2908.
CVE ID: CVE-2016-2908 Date Updated: 2024-08-05T23:40:13.568Z Date Published: 2017-02-01T20:00:00 Description: IBM Single Sign On for Bluemix could allow a remote attacker to obtain sensitive information, caused by a XML external entity (XXE) error when processing XML data by the XML parser. A remote attacker could exploit this vulnerability to read arbitrary files on the system or cause a denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/95295 - http://www.ibm.com/support/docview.wss?uid=swg21995531 - http://www.securitytracker.com/id/1038506 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20351.
CVE ID: CVE-2022-20351 Date Updated: 2024-08-03T02:10:44.472Z Date Published: 2022-10-11T00:00:00 Description: In queryInternal of CallLogProvider.java, there is a possible access to voicemail information due to SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224771921 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2022-10-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-27819.
CVE ID: CVE-2022-27819 Date Updated: 2024-08-03T05:32:59.870Z Date Published: 2022-04-07T01:31:41 Description: SWHKD 1.1.5 allows unsafe parsing via the -c option. An information leak might occur but there is a simple denial of service (memory exhaustion) upon an attempt to parse a large or infinite file (such as a block or character device). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/waycrate/swhkd/releases - https://github.com/waycrate/swhkd/commit/b4e6dc76f4845ab03104187a42ac6d1bbc1e0021 - http://www.openwall.com/lists/oss-security/2022/04/14/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1000386.
CVE ID: CVE-2017-1000386 Date Updated: 2024-08-05T22:00:41.109Z Date Published: 2018-01-26T02:00:00 Description: Jenkins Active Choices plugin version 1.5.3 and earlier allowed users with Job/Configure permission to provide arbitrary HTML to be shown on the 'Build With Parameters' page through the 'Active Choices Reactive Reference Parameter' type. This could include, for example, arbitrary JavaScript. Active Choices now sanitizes the HTML inserted on the 'Build With Parameters' page if and only if the script is executed in a sandbox. As unsandboxed scripts are subject to administrator approval, it is up to the administrator to allow or disallow problematic script output. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jenkins.io/security/advisory/2017-10-23/ - http://www.securityfocus.com/bid/101538 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34600.
CVE ID: CVE-2022-34600 Date Updated: 2024-08-03T09:15:15.669Z Date Published: 2022-07-20T13:41:14 Description: H3C Magic R200 R200V200R004L02 was discovered to contain a stack overflow via the EditSTList interface at /goform/aspForm. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Darry-lang1/vuln/tree/main/H3C/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3466.
CVE ID: CVE-2009-3466 Date Updated: 2024-08-07T06:31:09.924Z Date Published: 2009-11-04T15:00:00 Description: Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption, related to an "invalid string length vulnerability." NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/54121 - http://www.securityfocus.com/bid/36905 - http://www.adobe.com/support/security/bulletins/apsb09-16.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395 - http://www.vupen.com/english/advisories/2009/3134 - http://securitytracker.com/id?1023123 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-5220.
CVE ID: CVE-2011-5220 Date Updated: 2024-08-07T00:30:46.844Z Date Published: 2012-10-25T17:00:00 Description: Cross-site scripting (XSS) vulnerability in templates/default/Admin/Login.html in PHP-SCMS 1.6.8 and earlier allows remote attackers to inject arbitrary web script or HTML via the lang parameter to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/77692 - http://www.rul3z.de/advisories/SSCHADV2011-035.txt - http://www.securityfocus.com/bid/51062 - https://exchange.xforce.ibmcloud.com/vulnerabilities/71829 - http://secunia.com/advisories/46766 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4993.
CVE ID: CVE-2012-4993 Date Updated: 2024-09-16T16:18:37.890Z Date Published: 2012-09-19T19:00:00Z Description: torrent_functions.php in RivetTracker 1.03 and earlier does not properly restrict access, which allows remote attackers to have an unspecified impact. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/18553 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41647.
CVE ID: CVE-2021-41647 Date Updated: 2024-08-04T03:15:29.215Z Date Published: 2021-10-01T14:32:43 Description: An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable "username" parameter in login.php and retrieve sensitive database information, as well as add an administrative user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/kaushikjadhav01/Online-Food-Ordering-Web-App - https://github.com/MobiusBinary/CVE-2021-41647 - http://packetstormsecurity.com/files/164422/Online-Food-Ordering-Web-App-SQL-Injection.html - https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41647 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-35609.
CVE ID: CVE-2021-35609 Date Updated: 2024-09-25T19:26:05.755Z Date Published: 2021-10-20T10:50:48 Description: Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: SQR). Supported versions that are affected are 8.57, 8.58 and 8.59. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuoct2021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50180.
CVE ID: CVE-2023-50180 Date Updated: 2024-08-02T22:09:49.697Z Date Published: 2024-05-14T16:19:13.773Z Description: An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiADC version 7.4.1 and below, version 7.2.3 and below, version 7.1.4 and below, version 7.0.5 and below, version 6.2.6 and below may allow a read-only admin to view data pertaining to other admins. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/psirt/FG-IR-23-433 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3933.
CVE ID: CVE-2018-3933 Date Updated: 2024-09-17T01:26:20.381Z Date Published: 2018-07-11T16:00:00Z Description: An exploitable out-of-bounds write exists in the Microsoft Word document conversion functionality of the Antenna House Office Server Document Converter version V6.1 Pro MR2 for Linux64 (6,1,2018,0312). A crafted Microsoft Word (DOC) document can lead to an out-of-bounds write, resulting in remote code execution. This vulnerability occurs in the `vbputanld` method. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0600 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25458.
CVE ID: CVE-2024-25458 Date Updated: 2024-08-15T15:36:15.149Z Date Published: 2024-05-01T00:00:00 Description: An issue in CYCZCAM, SHIX ZHAO, SHIXCAM A9 Camera (circuit board identifier A9-48B-V1.0) firmware v.CYCAM_48B_BC01_v87_0903 allows a remote attacker to obtain sensitive information via a crafted request to a UDP port. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tanzhuyin.com/posts/cve-2024-25458/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2019-1106
CVE-CVE-2019-1106 is a vulnerability in Microsoft Edge. It is related to the MITRE ATT&CK technique T1574: Hijack Execution Flow. The vulnerability is classified as a primary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2019 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2016-4612.
CVE ID: CVE-2016-4612 Date Updated: 2017-06-07T01:57:01 Date Published: 2016-07-22T01:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12759.
CVE ID: CVE-2019-12759 Date Updated: 2024-08-04T23:32:55.154Z Date Published: 2019-11-15T17:41:24 Description: Symantec Endpoint Protection Manager (SEPM) and Symantec Mail Security for MS Exchange (SMSMSE), prior to versions 14.2 RU2 and 7.5.x respectively, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.symantec.com/us/en/article.SYMSA1488.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23837.
CVE ID: CVE-2023-23837 Date Updated: 2024-08-02T10:42:26.820Z Date Published: 2023-04-25T00:00:00 Description: No exception handling vulnerability which revealed sensitive or excessive information to users. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://documentation.solarwinds.com/en/success_center/dpa/content/release_notes/dpa_2023-2_release_notes.htm - https://www.solarwinds.com/trust-center/security-advisories/cve-2023-23837 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40448.
CVE ID: CVE-2023-40448 Date Updated: 2024-09-24T15:00:05.103Z Date Published: 2023-09-26T20:14:43.581Z Description: The issue was addressed with improved handling of protocols. This issue is fixed in tvOS 17, iOS 16.7 and iPadOS 16.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. A remote attacker may be able to break out of Web Content sandbox. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213938 - https://support.apple.com/en-us/HT213927 - https://support.apple.com/en-us/HT213936 - https://support.apple.com/en-us/HT213940 - https://support.apple.com/en-us/HT213937 - http://seclists.org/fulldisclosure/2023/Oct/10 - http://seclists.org/fulldisclosure/2023/Oct/8 - http://seclists.org/fulldisclosure/2023/Oct/3 - http://seclists.org/fulldisclosure/2023/Oct/4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.