instruction stringlengths 49 63 ⌀ | input stringlengths 0 69 | output stringlengths 221 18.7k |
|---|---|---|
Provide detailed information about CVE-2012-6360. | CVE ID: CVE-2012-6360
Date Updated: 2024-08-06T21:28:39.901Z
Date Published: 2013-01-18T21:00:00
Description:
Cross-site scripting (XSS) vulnerability in IBM Intelligent Operations Center 1.5.0 allows remote attackers to inject arbitrary web script or HTML via event data fields.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg1PO00211
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80942
- http://www-01.ibm.com/support/docview.wss?uid=swg21622222
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-10246. | CVE ID: CVE-2017-10246
Date Updated: 2024-08-05T17:33:16.903Z
Date Published: 2017-08-08T15:00:00
Description:
Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: iHelp). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Application Object Library accessible data as well as unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/99625
- https://www.exploit-db.com/exploits/42340/
- http://www.securitytracker.com/id/1038926
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-35757. | CVE ID: CVE-2020-35757
Date Updated: 2024-08-04T17:09:15.178Z
Date Published: 2021-05-03T20:47:52
Description:
An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is Unauthenticated Root ADB Access Over TCP. The LS9 web interface provides functionality to access ADB over TCP. This is not enabled by default, but can be enabled by sending a crafted request to a web management interface endpoint. Requests made to this endpoint do not require authentication. As such, any unauthenticated user who is able to access the web interface will be able to gain root privileges on the LS9 module.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.iot-inspector.com/blog/advisory-multiple-issues-libre-wireless-ls9/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-47457. | CVE ID: CVE-2022-47457
Date Updated: 2024-08-03T14:55:08.105Z
Date Published: 2023-03-07T01:31:56.674Z
Description:
In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.unisoc.com/en_us/secy/announcementDetail/1632612109718192129
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-32264. | CVE ID: CVE-2023-32264
Date Updated: 2024-08-12T20:05:05.527Z
Date Published: 2024-03-08T20:48:07.941Z
Description:
CWE-1385 vulnerability in OpenText Documentum D2 affecting versions16.5.1 to CE 23.2. The vulnerability could allow upload arbitrary code and execute it on the client's computer.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0799355
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-4239. | CVE ID: CVE-2019-4239
Date Updated: 2024-09-16T17:18:34.429Z
Date Published: 2019-06-14T14:45:18.008806Z
Description:
IBM MQ Advanced Cloud Pak (IBM Cloud Private 1.0.0 through 3.0.1) stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 159465.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/docview.wss?uid=ibm10886591
- https://exchange.xforce.ibmcloud.com/vulnerabilities/159465
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-2119. | CVE ID: CVE-2009-2119
Date Updated: 2024-08-07T05:36:20.963Z
Date Published: 2009-06-18T21:00:00
Description:
Cross-site scripting (XSS) vulnerability in the login interface (my.logon.php3) in F5 FirePass SSL VPN 5.5 through 5.5.2 and 6.0 through 6.0.3 allows remote attackers to inject arbitrary web script or HTML via a base64-encoded xcho parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/35418
- http://secunia.com/advisories/35426
- https://www.fox-it.com/nl/nieuws-en-events/nieuws/laatste-nieuws/nieuwsartikel/f5-firepass-cross-site-scripting-vulnerability/106
- http://osvdb.org/55040
- https://www.fox-it.com/uploads/pdf/advisory_xss_f5_firepass.pdf
- http://www.securityfocus.com/archive/1/504232/100/0/threaded
- http://www.securityfocus.com/bid/35312
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51064
- http://www.vupen.com/english/advisories/2009/1570
- http://www.securitytracker.com/id?1022387
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-31216. | CVE ID: CVE-2023-31216
Date Updated: 2024-09-30T14:39:24.706Z
Date Published: 2023-07-17T13:50:07.650Z
Description:
Cross-Site Request Forgery (CSRF) vulnerability in Ultimate Member plugin <= 2.6.0 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/ultimate-member/wordpress-ultimate-member-plugin-2-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-8466. | CVE ID: CVE-2016-8466
Date Updated: 2024-08-06T02:20:31.308Z
Date Published: 2017-01-12T20:00:00
Description:
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31822524. References: B-RB#105268.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/2017-01-01.html
- http://www.securityfocus.com/bid/95242
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-1562. | CVE ID: CVE-2024-1562
Date Updated: 2024-08-11T13:27:26.292Z
Date Published: 2024-02-21T03:36:00.767Z
Description:
The WooCommerce Google Sheet Connector plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the execute_post_data function in all versions up to, and including, 1.3.11. This makes it possible for unauthenticated attackers to update plugin settings.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e36df7b7-fcbc-4e5d-812c-861bfe8abb55?source=cve
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3038517%40wc-gsheetconnector&new=3038517%40wc-gsheetconnector&sfp_email=&sfph_mail=
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-3520. | CVE ID: CVE-2021-3520
Date Updated: 2024-08-03T17:01:07.870Z
Date Published: 2021-06-02T12:32:32
Description:
There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1954559
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://security.netapp.com/advisory/ntap-20211104-0005/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-11849. | CVE ID: CVE-2017-11849
Date Updated: 2024-09-17T02:36:06.237Z
Date Published: 2017-11-15T03:00:00Z
Description:
Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to log in and run a specially crafted application due to the Windows kernel improperly initializing a memory address, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11842, CVE-2017-11851, and CVE-2017-11853.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/101762
- http://www.securitytracker.com/id/1039782
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11849
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-17194. | CVE ID: CVE-2017-17194
Date Updated: 2019-03-05T19:57:01
Date Published: 2019-03-05T20:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-0991. | CVE ID: CVE-2017-0991
Date Updated: 2023-02-22T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-3672. | CVE ID: CVE-2024-3672
Date Updated: 2024-08-01T20:20:00.941Z
Date Published: 2024-04-16T12:51:47.349Z
Description:
The BA Book Everything plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'all-items' shortcode in all versions up to, and including, 1.6.8 due to insufficient input sanitization and output escaping on user supplied attributes such as 'classes'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b0ce06d3-491e-4565-8b26-f33937aee3e8?source=cve
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3070808%40ba-book-everything&new=3070808%40ba-book-everything&sfp_email=&sfph_mail=
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-0661. | CVE ID: CVE-2018-0661
Date Updated: 2024-08-05T03:35:48.922Z
Date Published: 2018-09-07T14:00:00
Description:
Multiple I-O DATA network camera products (TS-WRLP firmware Ver.1.09.04 and earlier, TS-WRLA firmware Ver.1.09.04 and earlier, TS-WRLP/E firmware Ver.1.09.04 and earlier) allow an attacker on the same network segment to bypass access restriction to add files on a specific directory that may result in executing arbitrary OS commands/code or information including credentials leakage or alteration.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.iodata.jp/support/information/2018/ts-wrlp/
- http://jvn.jp/en/jp/JVN83701666/index.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-47544. | CVE ID: CVE-2022-47544
Date Updated: 2024-08-03T14:55:08.174Z
Date Published: 2023-01-05T00:00:00
Description:
An issue was discovered in Siren Investigate before 12.1.7. Script variable whitelisting is insufficiently sandboxed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.support.siren.io/siren-platform-user-guide/12.1/release-notes.html
- https://docs.support.siren.io/siren-platform-user-guide/13.0/release-notes.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-3014. | CVE ID: CVE-2012-3014
Date Updated: 2024-09-17T00:40:44.703Z
Date Published: 2012-09-04T10:00:00Z
Description:
The Management Software application in GarrettCom Magnum MNS-6K before 4.4.0, and 14.x before 14.4.0, has a hardcoded password for an administrative account, which allows local users to gain privileges via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.garrettcom.com/techsupport/6k_dl/6k440_rn.pdf
- http://www.us-cert.gov/control_systems/pdf/ICSA-12-243-01.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-39677. | CVE ID: CVE-2021-39677
Date Updated: 2024-08-04T02:13:37.759Z
Date Published: 2022-02-11T17:40:59
Description:
In startVideoStream() there is a possibility of an OOB Read in the heap, when the camera buffer is ‘zero’ in size.Product: AndroidVersions: Android-11Android ID: A-205097028
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/aaos/2022-02-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-26338. | CVE ID: CVE-2020-26338
Date Updated: 2022-12-02T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-35773. | CVE ID: CVE-2020-35773
Date Updated: 2024-08-04T17:09:15.265Z
Date Published: 2020-12-29T17:46:23
Description:
The site-offline plugin before 1.4.4 for WordPress lacks certain wp_create_nonce and wp_verify_nonce calls, aka CSRF.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://plugins.trac.wordpress.org/changeset/2445009/
- https://developer.wordpress.org/reference/functions/wp_create_nonce/
- https://developer.wordpress.org/reference/functions/wp_verify_nonce/
- https://wordpress.org/plugins/site-offline/#developers
- https://advisory.checkmarx.net/advisory/CX-2020-4292
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-0129. | CVE ID: CVE-2017-0129
Date Updated: 2024-08-05T12:55:18.652Z
Date Published: 2017-03-17T00:00:00
Description:
Microsoft Lync for Mac 2011 fails to properly validate certificates, allowing remote attackers to alter server-client communications, aka "Microsoft Lync for Mac Certificate Validation Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1038020
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0129
- http://www.securityfocus.com/bid/96752
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-44508. | CVE ID: CVE-2021-44508
Date Updated: 2024-08-04T04:25:16.791Z
Date Published: 2022-04-15T17:56:55
Description:
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of NULL checks in calls to ious_open in sr_unix/ious_open.c allows attackers to crash the application by dereferencing a NULL pointer.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://sourceforge.net/projects/fis-gtm/files/
- https://gitlab.com/YottaDB/DB/YDB/-/issues/828
- http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-5553. | CVE ID: CVE-2019-5553
Date Updated: 2019-12-23T20:41:32
Date Published: 2019-12-23T20:41:32
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-3080. | CVE ID: CVE-2024-3080
Date Updated: 2024-08-01T19:32:42.618Z
Date Published: 2024-06-14T02:57:27.002Z
Description:
Certain ASUS router models have authentication bypass vulnerability, allowing unauthenticated remote attackers to log in the device.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.twcert.org.tw/tw/cp-132-7859-0e104-1.html
- https://www.twcert.org.tw/en/cp-139-7860-760b1-2.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-33669. | CVE ID: CVE-2023-33669
Date Updated: 2024-08-02T15:47:06.525Z
Date Published: 2023-06-02T00:00:00
Description:
Tenda AC8V4.0-V16.03.34.06 was discovered to contain a stack overflow via the timeZone parameter in the sub_44db3c function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N1/README.md
- https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-0941. | CVE ID: CVE-2023-0941
Date Updated: 2024-08-02T05:32:45.040Z
Date Published: 2023-02-22T19:54:01.297Z
Description:
Use after free in Prompts in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html
- https://crbug.com/1415366
- https://security.gentoo.org/glsa/202309-17
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-15979. | CVE ID: CVE-2017-15979
Date Updated: 2024-08-05T20:13:06.266Z
Date Published: 2017-10-31T07:00:00
Description:
Shareet - Photo Sharing Social Network 1.0 allows SQL Injection via the photo parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/43080/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-23170. | CVE ID: CVE-2022-23170
Date Updated: 2024-09-16T19:24:37.500Z
Date Published: 2022-06-24T15:00:10.798009Z
Description:
SysAid - Okta SSO integration - was found vulnerable to XML External Entity Injection vulnerability. Any SysAid environment that uses the Okta SSO integration might be vulnerable. An unauthenticated attacker could exploit the XXE vulnerability by sending a malformed POST request to the identity provider endpoint. An attacker can extract the identity provider endpoint by decoding the SAMLRequest parameter's value and searching for the AssertionConsumerServiceURL parameter's value. It often allows an attacker to view files on the application server filesystem and interact with any back-end or external systems that the application can access. In some situations, an attacker can escalate an XXE attack to compromise the underlying server or other back-end infrastructure by leveraging the XXE vulnerability to perform server-side request forgery (SSRF) attacks.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.gov.il/en/departments/faq/cve_advisories
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-12439. | CVE ID: CVE-2018-12439
Date Updated: 2024-09-16T17:33:27.092Z
Date Published: 2018-06-15T02:00:00Z
Description:
MatrixSSL through 3.9.5 Open allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-9227. | CVE ID: CVE-2016-9227
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-9369. | CVE ID: CVE-2019-9369
Date Updated: 2024-08-04T21:46:30.511Z
Date Published: 2019-09-27T18:05:16
Description:
In Bluetooth, there is a use of uninitialized variable. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-79995407
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/android-10
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-42583. | CVE ID: CVE-2024-42583
Date Updated: 2024-08-20T17:51:06.838Z
Date Published: 2024-08-20T00:00:00
Description:
A Cross-Site Request Forgery (CSRF) in the component delete_user.php of Warehouse Inventory System v2.0 allows attackers to escalate privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gist.github.com/topsky979/dac0206b8de14763bdbe2b6bb7020cdc
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-2868. | CVE ID: CVE-2014-2868
Date Updated: 2024-09-17T00:05:47.544Z
Date Published: 2014-04-15T23:00:00Z
Description:
PaperThin CommonSpot before 7.0.2 and 8.x before 8.0.3 allows remote attackers to modify the flow of execution of ColdFusion code by using an HTTP GET request to set a ColdFusion variable.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/437385
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-24039. | CVE ID: CVE-2023-24039
Date Updated: 2024-08-02T10:49:08.929Z
Date Published: 2023-01-21T00:00:00
Description:
A stack-based buffer overflow in ParseColors in libXm in Common Desktop Environment 1.6 can be exploited by local low-privileged users via the dtprintinfo setuid binary to escalate their privileges to root on Solaris 10 systems. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt
- https://github.com/0xdea/exploits/blob/master/solaris/raptor_dtprintlibXmas.c
- https://security.humanativaspa.it/nothing-new-under-the-sun/
- http://seclists.org/fulldisclosure/2023/Jan/24
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-12615. | CVE ID: CVE-2020-12615
Date Updated: 2024-08-28T16:30:49.711Z
Date Published: 2023-12-12T00:00:00
Description:
An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. When adding the Add Admin token to a process, and specifying that it runs at medium integrity with the user owning the process, this security token can be stolen and applied to arbitrary processes.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1
- https://www.beyondtrust.com/trust-center/security-advisories/bt22-07
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-6944. | CVE ID: CVE-2018-6944
Date Updated: 2024-08-05T06:17:17.356Z
Date Published: 2018-02-16T14:00:00
Description:
core/lib/upload/um-file-upload.php in the UltimateMember plugin 2.0 for WordPress has a cross-site scripting vulnerability because it fails to properly sanitize user input passed to the $temp variable.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://packetstormsecurity.com/files/146403/WordPress-UltimateMember-2.0-Cross-Site-Scripting.html
- https://wpvulndb.com/vulnerabilities/9705
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-1328. | CVE ID: CVE-2008-1328
Date Updated: 2024-08-07T08:17:34.193Z
Date Published: 2008-04-07T18:00:00
Description:
Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code via unspecified "command arguments."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=173105
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41641
- http://securityreason.com/securityalert/3800
- http://www.securityfocus.com/bid/28616
- http://www.securityfocus.com/archive/1/490463/100/0/threaded
- http://www.securitytracker.com/id?1019788
- http://www.vupen.com/english/advisories/2008/1104/references
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-27972. | CVE ID: CVE-2023-27972
Date Updated: 2024-08-02T12:23:30.801Z
Date Published: 2023-04-28T15:59:04.584Z
Description:
Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow and/or Remote Code Execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.hp.com/us-en/document/ish_7920078-7920104-16/hpsbpi03840
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-28034. | CVE ID: CVE-2024-28034
Date Updated: 2024-08-02T00:48:47.636Z
Date Published: 2024-03-26T09:36:04.246Z
Description:
Cross-site scripting vulnerability exists in Mini Thread Version 3.33βi. An arbitrary script may be executed on the web browser of the user accessing the website that uses the product. Note that the developer was unreachable, therefore, users should consider stop using Mini Thread Version 3.33βi.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://jvn.jp/en/jp/JVN40523785/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-0829. | CVE ID: CVE-2014-0829
Date Updated: 2024-08-06T09:27:20.140Z
Date Published: 2014-03-21T10:00:00
Description:
Multiple buffer overflows in IBM Rational ClearCase 7.x before 7.1.2.13, 8.0.0.x before 8.0.0.10, and 8.0.1.x before 8.0.1.3 allow remote authenticated users to obtain privileged access via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?&uid=swg21662086
- http://www.securityfocus.com/bid/66339
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90568
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-22200. | CVE ID: CVE-2024-22200
Date Updated: 2024-08-01T22:35:34.944Z
Date Published: 2024-01-30T15:56:43.527Z
Description:
vantage6-UI is the User Interface for vantage6. The docker image used to run the UI leaks the nginx version. To mitigate the vulnerability, users can run the UI as an angular application. This vulnerability was patched in 4.2.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/vantage6/vantage6-UI/security/advisories/GHSA-8wxq-346h-xmr8
- https://github.com/vantage6/vantage6-UI/commit/92e0fb5102b544d5bcc23980d973573733e2e020
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-30227. | CVE ID: CVE-2021-30227
Date Updated: 2024-08-03T22:24:59.670Z
Date Published: 2021-04-29T15:12:01
Description:
Cross Site Scripting (XSS) vulnerability in the article comments feature in emlog 6.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/emlog/emlog/issues/79
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-21020. | CVE ID: CVE-2021-21020
Date Updated: 2024-09-16T23:37:01.379Z
Date Published: 2021-02-11T19:29:31.778778Z
Description:
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an access control bypass vulnerability in the Login as Customer module. Successful exploitation could lead to unauthorized access to restricted resources.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/magento/apsb21-08.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-14962. | CVE ID: CVE-2017-14962
Date Updated: 2024-08-05T19:42:22.298Z
Date Published: 2017-12-20T18:00:00
Description:
In IKARUS anti.virus before 2.16.18, the ntguard.sys driver contains an Out of Bounds Write vulnerability because of not validating input values from IOCtl 0x83000058, a related issue to CVE-2017-17112.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.greyhathacker.net/?p=995
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-2289. | CVE ID: CVE-2009-2289
Date Updated: 2024-08-07T05:44:55.854Z
Date Published: 2009-07-01T12:26:00
Description:
Cross-site scripting (XSS) vulnerability in index.php in Arcade Trade Script 1.0 beta allows remote attackers to inject arbitrary web script or HTML via the q parameter in a gamelist action.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/archive/1/503801/100/0/threaded
- http://secunia.com/advisories/35197
- http://www.davidsopas.com/2009/05/25/arcade-trade-script-xss
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-2536. | CVE ID: CVE-2014-2536
Date Updated: 2024-08-06T10:14:26.579Z
Date Published: 2014-03-18T14:00:00
Description:
Directory traversal vulnerability in McAfee Cloud Identity Manager 3.0, 3.1, and 3.5.1, McAfee Cloud Single Sign On (MCSSO) before 4.0.1, and Intel Expressway Cloud Access 360-SSO 2.1 and 2.5 allows remote authenticated users to read an unspecified file containing a hash of the administrator password via unknown vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/66181
- http://secunia.com/advisories/57381
- http://secunia.com/advisories/57368
- https://kc.mcafee.com/corporate/index?page=content&id=SB10066
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-50905. | CVE ID: CVE-2023-50905
Date Updated: 2024-08-08T18:49:09.450Z
Date Published: 2024-02-29T05:35:14.761Z
Description:
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Melapress WP Activity Log allows Stored XSS.This issue affects WP Activity Log: from n/a through 4.6.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/wp-security-audit-log/wordpress-wp-activity-log-plugin-plugin-4-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-2158. | CVE ID: CVE-2018-2158
Date Updated: 2019-01-22T17:57:02
Date Published: 2019-01-22T20:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-4607. | CVE ID: CVE-2020-4607
Date Updated: 2024-09-17T01:40:44.853Z
Date Published: 2020-09-29T13:50:13.312232Z
Description:
IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/6338813
- https://exchange.xforce.ibmcloud.com/vulnerabilities/184884
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-24254. | CVE ID: CVE-2022-24254
Date Updated: 2024-08-03T04:07:01.869Z
Date Published: 2022-03-01T23:00:26
Description:
An unrestricted file upload vulnerability in the Backup/Restore Archive component of Extensis Portfolio v4.0 allows remote attackers to execute arbitrary code via a crafted ZIP file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://snyk.io/research/zip-slip-vulnerability
- http://extensis.com
- http://portfolio.com
- https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-13260. | CVE ID: CVE-2018-13260
Date Updated: 2019-01-07T17:57:01
Date Published: 2019-01-07T18:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-35956. | CVE ID: CVE-2024-35956
Date Updated: 2024-08-02T03:21:49.097Z
Date Published: 2024-05-20T09:41:49.261Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations
Create subvolume, create snapshot and delete subvolume all use
btrfs_subvolume_reserve_metadata() to reserve metadata for the changes
done to the parent subvolume's fs tree, which cannot be mediated in the
normal way via start_transaction. When quota groups (squota or qgroups)
are enabled, this reserves qgroup metadata of type PREALLOC. Once the
operation is associated to a transaction, we convert PREALLOC to
PERTRANS, which gets cleared in bulk at the end of the transaction.
However, the error paths of these three operations were not implementing
this lifecycle correctly. They unconditionally converted the PREALLOC to
PERTRANS in a generic cleanup step regardless of errors or whether the
operation was fully associated to a transaction or not. This resulted in
error paths occasionally converting this rsv to PERTRANS without calling
record_root_in_trans successfully, which meant that unless that root got
recorded in the transaction by some other thread, the end of the
transaction would not free that root's PERTRANS, leaking it. Ultimately,
this resulted in hitting a WARN in CONFIG_BTRFS_DEBUG builds at unmount
for the leaked reservation.
The fix is to ensure that every qgroup PREALLOC reservation observes the
following properties:
1. any failure before record_root_in_trans is called successfully
results in freeing the PREALLOC reservation.
2. after record_root_in_trans, we convert to PERTRANS, and now the
transaction owns freeing the reservation.
This patch enforces those properties on the three operations. Without
it, generic/269 with squotas enabled at mkfs time would fail in ~5-10
runs on my system. With this patch, it ran successfully 1000 times in a
row.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/14431815a4ae4bcd7c7a68b6a64c66c7712d27c9
- https://git.kernel.org/stable/c/6c95336f5d8eb9ab79cd7306d71b6d0477363f8c
- https://git.kernel.org/stable/c/74e97958121aa1f5854da6effba70143f051b0cd
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-1261. | CVE ID: CVE-2024-1261
Date Updated: 2024-08-01T18:33:25.511Z
Date Published: 2024-02-06T22:00:05.519Z
Description:
A vulnerability classified as critical was found in Juanpao JPShop up to 1.5.02. This vulnerability affects the function actionIndex of the file /api/controllers/merchant/app/ComboController.php of the component API. The manipulation of the argument pic_url leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-253000.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.253000
- https://vuldb.com/?ctiid.253000
- https://note.zhaoj.in/share/v2JpHJngvw7E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-4223. | CVE ID: CVE-2018-4223
Date Updated: 2024-08-05T05:04:29.779Z
Date Published: 2018-06-08T18:00:00
Description:
An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "Security" component. It allows local users to bypass intended restrictions on the reading of a persistent account identifier.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/HT208850
- https://support.apple.com/HT208851
- http://www.securitytracker.com/id/1041027
- https://support.apple.com/HT208848
- https://support.apple.com/HT208849
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-18109. | CVE ID: CVE-2018-18109
Date Updated: 2023-02-27T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-10854. | CVE ID: CVE-2020-10854
Date Updated: 2024-08-04T11:14:15.771Z
Date Published: 2020-03-24T17:37:02
Description:
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. Kernel stack addresses are leaked to userspace. The Samsung ID is SVE-2019-16161 (January 2020).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.samsungmobile.com/securityUpdate.smsb
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-4237. | CVE ID: CVE-2012-4237
Date Updated: 2024-09-16T20:43:39.102Z
Date Published: 2012-08-20T20:00:00Z
Description:
Multiple SQL injection vulnerabilities in TCExam before 11.3.008 allow remote authenticated users with level 5 or greater permissions to execute arbitrary SQL commands via the subject_module_id parameter to (1) tce_edit_answer.php or (2) tce_edit_question.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/54861
- http://tcexam.git.sourceforge.net/git/gitweb.cgi?p=tcexam/tcexam%3Bh=edf6e08622642f1b2421f4355d98250d9e1b0742
- http://archives.neohapsis.com/archives/bugtraq/2012-08/0079.html
- http://secunia.com/advisories/50141
- http://freecode.com/projects/tcexam/releases/347125
- http://www.reactionpenetrationtesting.co.uk/tcexam-sql-injection.html
- http://www.openwall.com/lists/oss-security/2012/08/13/8
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-25444. | CVE ID: CVE-2023-25444
Date Updated: 2024-08-02T11:18:36.338Z
Date Published: 2024-05-17T06:35:09.334Z
Description:
Unrestricted Upload of File with Dangerous Type vulnerability in JS Help Desk JS Help Desk – Best Help Desk & Support Plugin allows Using Malicious Files.This issue affects JS Help Desk – Best Help Desk & Support Plugin: from n/a through 2.7.7.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/js-support-ticket/wordpress-js-help-desk-best-help-desk-support-plugin-plugin-2-7-7-arbitrary-file-upload-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-34432. | CVE ID: CVE-2023-34432
Date Updated: 2024-10-01T16:24:35.073Z
Date Published: 2023-07-10T20:05:39.681Z
Description:
A heap buffer overflow vulnerability was found in sox, in the lsx_readbuf function at sox/src/formats_i.c:98:16. This flaw can lead to a denial of service, code execution, or information disclosure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://access.redhat.com/security/cve/CVE-2023-34432
- https://bugzilla.redhat.com/show_bug.cgi?id=2212291
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-11629. | CVE ID: CVE-2017-11629
Date Updated: 2024-08-05T18:12:40.469Z
Date Published: 2017-07-26T08:00:00
Description:
dayrui FineCms through 5.0.10 has Cross Site Scripting (XSS) in controllers/api.php via the function parameter in a c=api&m=data2 request.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#api-php-Reflected-XSS
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the MITRE ATT&CK technique T1550.001 | The MITRE ATT&CK technique T1550.001: Application Access Token is related to the vulnerability CVE-CVE-2018-15801. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as secondary_impact. |
Provide detailed information about CVE-2023-6725. | CVE ID: CVE-2023-6725
Date Updated: 2024-09-16T18:30:50.584Z
Date Published: 2024-03-15T12:38:23.158Z
Description:
An access-control flaw was found in the OpenStack Designate component where private configuration information including access keys to BIND were improperly made world readable. A malicious attacker with access to any container could exploit this flaw to access sensitive information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://access.redhat.com/errata/RHSA-2024:2736
- https://access.redhat.com/errata/RHSA-2024:2770
- https://access.redhat.com/security/cve/CVE-2023-6725
- https://bugzilla.redhat.com/show_bug.cgi?id=2249273
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-34654. | CVE ID: CVE-2021-34654
Date Updated: 2024-09-16T19:46:06.643Z
Date Published: 2021-08-16T18:22:29.437018Z
Description:
The Custom Post Type Relations WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the cptr[name] parameter found in the ~/pages/admin-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34654
- https://plugins.trac.wordpress.org/browser/custom-post-type-relations/trunk/pages/admin-page.php#L60
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-3275. | CVE ID: CVE-2016-3275
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-1010. | CVE ID: CVE-2022-1010
Date Updated: 2024-08-02T23:47:42.931Z
Date Published: 2022-06-27T08:55:59
Description:
The Login using WordPress Users ( WP as SAML IDP ) WordPress plugin before 1.13.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/e9e4dfbe-01b2-4003-80ed-db1e45f38b2b
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-22623. | CVE ID: CVE-2022-22623
Date Updated: 2022-04-05T18:42:43
Date Published: 2022-03-18T17:59:44
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the vulnerability CVE-CVE-2020-1109 | CVE-CVE-2020-1109 is a vulnerability in Windows. It is related to the MITRE ATT&CK technique T1005: Data from Local System. The vulnerability is classified as a secondary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021. |
Provide detailed information about CVE-2008-0393. | CVE ID: CVE-2008-0393
Date Updated: 2024-08-07T07:46:53.929Z
Date Published: 2008-01-23T02:00:00
Description:
Directory traversal vulnerability in info.php in GradMan 0.1.3 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the tabla parameter, a different vector than CVE-2008-0361.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39768
- https://www.exploit-db.com/exploits/4936
- http://www.securityfocus.com/bid/27343
- http://secunia.com/advisories/28520
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-28171. | CVE ID: CVE-2021-28171
Date Updated: 2024-09-16T23:41:41.900Z
Date Published: 2021-04-06T11:20:27.171745Z
Description:
The Vangene deltaFlow E-platform does not take properly protective measures. Attackers can obtain privileged permissions remotely by tampering with users’ data in the Cookie.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.twcert.org.tw/tw/cp-132-4618-4dcc2-1.html
- https://www.chtsecurity.com/news/7f0874b5-516b-4637-842d-b6fb6c335c66
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-13051. | CVE ID: CVE-2017-13051
Date Updated: 2024-08-05T18:58:12.493Z
Date Published: 2017-09-14T06:00:00
Description:
The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print().
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.gentoo.org/glsa/201709-23
- https://support.apple.com/HT208221
- http://www.debian.org/security/2017/dsa-3971
- https://github.com/the-tcpdump-group/tcpdump/commit/289c672020280529fd382f3502efab7100d638ec
- http://www.securitytracker.com/id/1039307
- http://www.tcpdump.org/tcpdump-changes.txt
- https://access.redhat.com/errata/RHEA-2018:0705
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-2546. | CVE ID: CVE-2008-2546
Date Updated: 2024-09-16T16:14:00.308Z
Date Published: 2008-06-06T22:00:00Z
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-2025. | CVE ID: CVE-2015-2025
Date Updated: 2024-08-06T05:02:42.998Z
Date Published: 2015-10-04T01:00:00
Description:
IBM WebSphere eXtreme Scale 7.1.0 before 7.1.0.3 and 7.1.1 before 7.1.1.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg21966044
- http://www-01.ibm.com/support/docview.wss?uid=swg1PI44105
- http://www-01.ibm.com/support/docview.wss?uid=swg1PI44098
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-37344. | CVE ID: CVE-2023-37344
Date Updated: 2024-08-02T17:09:34.315Z
Date Published: 2024-05-03T01:58:32.546Z
Description:
Kofax Power PDF BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of BMP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20441.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-23-939/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-41368. | CVE ID: CVE-2021-41368
Date Updated: 2024-08-04T03:08:32.497Z
Date Published: 2021-11-10T00:46:40
Description:
Microsoft Access Remote Code Execution Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41368
- https://www.zerodayinitiative.com/advisories/ZDI-21-1309/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-27482. | CVE ID: CVE-2023-27482
Date Updated: 2024-08-02T12:09:43.515Z
Date Published: 2023-03-08T00:00:00
Description:
homeassistant is an open source home automation tool. A remotely exploitable vulnerability bypassing authentication for accessing the Supervisor API through Home Assistant has been discovered. This impacts all Home Assistant installation types that use the Supervisor 2023.01.1 or older. Installation types, like Home Assistant Container (for example Docker), or Home Assistant Core manually in a Python environment, are not affected. The issue has been mitigated and closed in Supervisor version 2023.03.1, which has been rolled out to all affected installations via the auto-update feature of the Supervisor. This rollout has been completed at the time of publication of this advisory. Home Assistant Core 2023.3.0 included mitigation for this vulnerability. Upgrading to at least that version is thus advised. In case one is not able to upgrade the Home Assistant Supervisor or the Home Assistant Core application at this time, it is advised to not expose your Home Assistant instance to the internet.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/home-assistant/core/security/advisories/GHSA-2j8f-h4mr-qr25
- https://www.home-assistant.io/blog/2023/03/08/supervisor-security-disclosure/
- https://github.com/elttam/publications/blob/master/writeups/home-assistant/supervisor-authentication-bypass-advisory.md
- https://www.elttam.com/blog/pwnassistant/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-1885. | CVE ID: CVE-2009-1885
Date Updated: 2024-08-07T05:27:54.875Z
Date Published: 2009-08-11T18:00:00
Description:
Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/35986
- http://www.networkworld.com/columnists/2009/080509-xml-flaw.html
- http://www.cert.fi/en/reports/2009/vulnerability2009085.html
- http://www.codenomicon.com/labs/xml/
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01136.html
- http://secunia.com/advisories/36201
- http://www.vupen.com/english/advisories/2009/2196
- http://svn.apache.org/viewvc/xerces/c/trunk/src/xercesc/validators/DTD/DTDScanner.cpp?r1=781488&r2=781487&pathrev=781488&view=patch
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01001.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:223
- https://exchange.xforce.ibmcloud.com/vulnerabilities/52321
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01099.html
- http://svn.apache.org/viewvc?view=rev&revision=781488
- https://bugzilla.redhat.com/show_bug.cgi?id=515515
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01150.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-6069. | CVE ID: CVE-2023-6069
Date Updated: 2024-08-02T08:21:17.449Z
Date Published: 2023-11-10T00:00:32.765Z
Description:
Improper Link Resolution Before File Access in GitHub repository froxlor/froxlor prior to 2.1.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.com/bounties/aac0627e-e59d-476e-9385-edb7ff53758c
- https://github.com/froxlor/froxlor/commit/9e8f32f1e86016733b603b50c31b97f472e8dabc
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-7123. | CVE ID: CVE-2023-7123
Date Updated: 2024-08-02T08:50:08.153Z
Date Published: 2023-12-27T23:31:04.138Z
Description:
A vulnerability, which was classified as critical, has been found in SourceCodester Medicine Tracking System 1.0. This issue affects some unknown processing of the file /classes/Master.php? f=save_medicine. The manipulation of the argument id/name/description leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249095.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.249095
- https://vuldb.com/?ctiid.249095
- https://medium.com/@2839549219ljk/medicine-tracking-system-sql-injection-7b0dde3a82a4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-8355. | CVE ID: CVE-2016-8355
Date Updated: 2024-08-06T02:20:31.077Z
Date Published: 2017-02-13T22:00:00
Description:
An issue was discovered in Smiths-Medical CADD-Solis Medication Safety Software, Version 1.0; 2.0; 3.0; and 3.1. CADD-Solis Medication Safety Software grants an authenticated user elevated privileges on the SQL database, which would allow an authenticated user to modify drug libraries, add and delete users, and change user permissions. According to Smiths-Medical, physical access to the pump is required to install drug library updates.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://ics-cert.us-cert.gov/advisories/ICSMA-16-306-01
- http://www.securityfocus.com/bid/94630
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-0666. | CVE ID: CVE-2017-0666
Date Updated: 2024-09-16T18:34:46.568Z
Date Published: 2017-07-06T20:00:00Z
Description:
A elevation of privilege vulnerability in the Android framework. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37285689.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/99470
- https://source.android.com/security/bulletin/2017-07-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-35526. | CVE ID: CVE-2020-35526
Date Updated: 2022-09-01T17:48:53
Date Published: 2022-09-01T17:48:53
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-20060. | CVE ID: CVE-2024-20060
Date Updated: 2024-08-01T21:52:31.597Z
Date Published: 2024-05-06T02:51:57.024Z
Description:
In da, there is a possible escalation of privilege due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541749; Issue ID: ALPS08541754.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://corp.mediatek.com/product-security-bulletin/May-2024
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-41241. | CVE ID: CVE-2023-41241
Date Updated: 2024-08-02T18:54:04.389Z
Date Published: 2023-09-27T12:32:50.175Z
Description:
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in SureCart WordPress Ecommerce For Creating Fast Online Stores plugin <= 2.5.0 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/surecart/wordpress-surecart-plugin-2-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-22699. | CVE ID: CVE-2023-22699
Date Updated: 2024-08-02T10:13:50.107Z
Date Published: 2024-03-25T11:32:48.989Z
Description:
Missing Authorization vulnerability in MainWP MainWP Wordfence Extension.This issue affects MainWP Wordfence Extension: from n/a through 4.0.7.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/mainwp-wordfence-extension/wordpress-mainwp-wordfence-extension-plugin-4-0-7-subscriber-arbitrary-plugin-activation-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-4171. | CVE ID: CVE-2010-4171
Date Updated: 2024-08-07T03:34:37.634Z
Date Published: 2010-12-07T21:00:00
Description:
The staprun runtime tool in SystemTap 1.3 does not verify that a module to unload was previously loaded by SystemTap, which allows local users to cause a denial of service (unloading of arbitrary kernel modules).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://sources.redhat.com/ml/systemtap/2010-q4/msg00230.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051127.html
- http://secunia.com/advisories/42263
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051115.html
- https://bugzilla.redhat.com/show_bug.cgi?id=653606
- https://exchange.xforce.ibmcloud.com/vulnerabilities/63345
- http://sources.redhat.com/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=b7565b41228bea196cefa3a7d43ab67f8f9152e2
- http://www.redhat.com/support/errata/RHSA-2010-0894.html
- http://www.debian.org/security/2011/dsa-2348
- http://www.securitytracker.com/id?1024754
- http://secunia.com/advisories/46920
- http://secunia.com/advisories/42256
- http://secunia.com/advisories/42318
- http://www.securityfocus.com/bid/44917
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051122.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-33800. | CVE ID: CVE-2023-33800
Date Updated: 2024-08-02T15:54:12.499Z
Date Published: 2023-05-24T00:00:00
Description:
A stored cross-site scripting (XSS) vulnerability in the Create Regions (/dcim/regions/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/anhdq201/netbox/issues/11
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-51710. | CVE ID: CVE-2023-51710
Date Updated: 2024-08-02T22:40:34.173Z
Date Published: 2024-04-29T00:00:00
Description:
EMS SQL Manager 3.6.2 (build 55333) for Oracle allows DLL hijacking: a user can trigger the execution of arbitrary code every time the product is executed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://excellium-services.com/cert-xlm-advisory/CVE-2023-51710
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-33193. | CVE ID: CVE-2021-33193
Date Updated: 2024-08-03T23:42:20.253Z
Date Published: 2021-08-16T00:00:00
Description:
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portswigger.net/research/http2
- https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
- https://lists.apache.org/thread.html/re4162adc051c1a0a79e7a24093f3776373e8733abaff57253fef341d%40%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70%40%3Ccvs.httpd.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://security.netapp.com/advisory/ntap-20210917-0004/
- https://www.tenable.com/security/tns-2021-17
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://security.gentoo.org/glsa/202208-20
- https://lists.debian.org/debian-lts-announce/2023/03/msg00002.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-28593. | CVE ID: CVE-2024-28593
Date Updated: 2024-08-02T00:56:57.949Z
Date Published: 2024-03-22T00:00:00
Description:
The Chat activity in Moodle 4.3.3 allows students to insert a potentially unwanted HTML A element or IMG element, or HTML content that leads to a performance degradation. NOTE: the vendor's Using_Chat page says "If you know some HTML code, you can use it in your text to do things like insert images, play sounds or create different coloured and sized text." This page also says "Chat is due to be removed from standard Moodle."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://medium.com/%40lamscun/how-do-i-change-htmli-from-low-to-critical-your-email-box-is-safe-e7171efd88fe
- https://gist.githubusercontent.com/minendie/4f23174687bc4d8eb7f727d9959b5399/raw/9ce573cebcce5521d9d6f826ab68f3780036b874/CVE-2024-28593.txt
- https://docs.moodle.org/403/en/Using_Chat
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-4953. | CVE ID: CVE-2011-4953
Date Updated: 2024-08-07T00:23:38.624Z
Date Published: 2014-10-27T01:00:00
Description:
The set_mgmt_parameters function in item.py in cobbler before 2.2.2 allows context-dependent attackers to execute arbitrary code via vectors related to the use of the yaml.load function instead of the yaml.safe_load function, as demonstrated using Puppet.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00019.html
- https://bugs.launchpad.net/ubuntu/oneiric/+source/cobbler/+bug/858883
- https://bugzilla.novell.com/show_bug.cgi?id=757062
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-9507. | CVE ID: CVE-2014-9507
Date Updated: 2024-08-06T13:47:40.981Z
Date Published: 2015-01-04T21:00:00
Description:
MediaWiki 1.21.x, 1.22.x before 1.22.14, and 1.23.x before 1.23.7, when $wgContentHandlerUseDB is enabled, allows remote attackers to conduct cross-site scripting (XSS) attacks by setting the content model for a revision to JS.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://phabricator.wikimedia.org/T72901
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-16583. | CVE ID: CVE-2018-16583
Date Updated: 2019-04-17T13:34:21
Date Published: 2019-04-17T13:34:21
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-7814. | CVE ID: CVE-2016-7814
Date Updated: 2024-08-06T02:04:56.032Z
Date Published: 2017-06-09T16:00:00
Description:
I-O DATA DEVICE TS-WRLP firmware version 1.00.01 and earlier and TS-WRLA firmware version 1.00.01 and earlier allow remote attackers to obtain authentication credentials via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/94250
- http://www.iodata.jp/support/information/2016/ts-wrlap/
- https://jvn.jp/en/jp/JVN34103586/index.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-25173. | CVE ID: CVE-2022-25173
Date Updated: 2024-08-03T04:36:05.779Z
Date Published: 2022-02-15T16:10:50
Description:
Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier uses the same checkout directories for distinct SCMs when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463
- http://www.openwall.com/lists/oss-security/2022/02/15/2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-6512. | CVE ID: CVE-2015-6512
Date Updated: 2024-09-17T03:23:49.310Z
Date Published: 2015-08-18T15:00:00Z
Description:
SQL injection vulnerability in the get_messages function in server/plugins/chatroom/chatroom.php in FreiChat 9.6 allows remote attackers to execute arbitrary SQL commands via the time parameter to server/freichat.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.com/files/132673/FreiChat-9.6-SQL-Injection.html
- https://www.exploit-db.com/exploits/37592/
- http://security.szurek.pl/freichat-96-sql-injection.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-26067. | CVE ID: CVE-2024-26067
Date Updated: 2024-08-01T23:59:32.142Z
Date Published: 2024-03-18T17:54:23.059Z
Description:
Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-2983. | CVE ID: CVE-2020-2983
Date Updated: 2024-09-26T20:33:04.487Z
Date Published: 2020-07-15T17:34:37
Description:
Vulnerability in the Oracle Data Masking and Subsetting product of Oracle Enterprise Manager (component: Data Masking). Supported versions that are affected are 13.3.0.0 and 13.4.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Data Masking and Subsetting. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Data Masking and Subsetting accessible data as well as unauthorized update, insert or delete access to some of Oracle Data Masking and Subsetting accessible data. CVSS 3.1 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpujul2020.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-16195. | CVE ID: CVE-2018-16195
Date Updated: 2024-08-05T10:17:38.325Z
Date Published: 2019-01-09T22:00:00
Description:
Aterm WF1200CR and Aterm WG1200CR (Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands via SOAP interface of UPnP.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://jvn.jp/en/jp/JVN87535892/index.html
- https://jpn.nec.com/security-info/secinfo/nv18-021.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-1315. | CVE ID: CVE-2012-1315
Date Updated: 2024-08-06T18:53:37.152Z
Date Published: 2012-03-29T10:00:00
Description:
Memory leak in the SIP inspection feature in the Zone-Based Firewall in Cisco IOS 12.4, 15.0, 15.1, and 15.2 allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted transit SIP traffic, aka Bug ID CSCti46171.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/52753
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-zbfw
- http://secunia.com/advisories/48608
- http://www.securitytracker.com/id?1026861
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74437
- http://osvdb.org/80699
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.