instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2022-20413.
CVE ID: CVE-2022-20413 Date Updated: 2024-08-03T02:10:44.559Z Date Published: 2022-10-11T00:00:00 Description: In start of Threads.cpp, there is a possible way to record audio during a phone call due to a logic error in the code. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-235850634 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2022-10-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20309.
CVE ID: CVE-2022-20309 Date Updated: 2024-08-03T02:10:44.393Z Date Published: 2022-08-11T15:23:39 Description: In PackageInstaller, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-194694094 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/android-13 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26038.
CVE ID: CVE-2024-26038 Date Updated: 2024-08-01T23:59:32.540Z Date Published: 2024-03-18T17:54:24.870Z Description: Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0041.
CVE ID: CVE-2016-0041 Date Updated: 2024-08-05T22:08:13.366Z Date Published: 2016-02-10T11:00:00 Description: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold and 1511, and Internet Explorer 10 and 11 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1034985 - http://seclists.org/fulldisclosure/2016/Feb/49 - https://www.securify.nl/advisory/SFY20150905/nps_datastore_server_dll_side_loading_vulnerability.html - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-014 - http://www.securitytracker.com/id/1034971 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-009 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1147.
CVE ID: CVE-2017-1147 Date Updated: 2024-09-16T23:21:42.808Z Date Published: 2017-11-01T21:00:00Z Description: IBM OpenPages GRC Platform 7.1, 7.2, and 7.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 122200. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/101663 - https://exchange.xforce.ibmcloud.com/vulnerabilities/122200 - http://www.ibm.com/support/docview.wss?uid=swg21997685 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18071.
CVE ID: CVE-2017-18071 Date Updated: 2024-09-16T23:35:31.421Z Date Published: 2018-04-11T15:00:00Z Description: In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, debug policy can potentially be bypassed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2018-04-01 - http://www.securityfocus.com/bid/103671 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8233.
CVE ID: CVE-2019-8233 Date Updated: 2024-08-04T21:10:33.563Z Date Published: 2019-11-05T23:54:25 Description: In Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1, an unauthenticated user can inject arbitrary JavaScript code as a result of the sanitization engine ignoring HTML comments. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13991.
CVE ID: CVE-2018-13991 Date Updated: 2024-08-05T09:21:40.924Z Date Published: 2019-05-07T17:24:24 Description: The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 leaks private information in firmware images. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-19-024-02 - http://www.securityfocus.com/bid/106737 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9351.
CVE ID: CVE-2020-9351 Date Updated: 2024-08-04T10:26:16.056Z Date Published: 2020-02-23T00:00:00 Description: An issue was discovered in SmartClient 12.0. If an unauthenticated attacker makes a POST request to /tools/developerConsoleOperations.jsp or /isomorphic/IDACall with malformed XML data in the _transaction parameter, the server replies with a verbose error showing where the application resides (the absolute path). NOTE: the documentation states "These tools are, by default, available to anyone ... so they should only be deployed into a trusted environment. Alternately, the tools can easily be restricted to administrators or end users by protecting the tools path with normal authentication and authorization mechanisms on the web server." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://seclists.org/fulldisclosure/2020/Feb/18 - https://www-demos.smartclient.com/smartclient-12.0/isomorphic/system/reference/?id=group..toolsDeployment No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4577.
CVE ID: CVE-2016-4577 Date Updated: 2024-08-06T00:32:25.907Z Date Published: 2016-05-23T19:00:00 Description: Buffer overflow in the Smart DNS functionality in the Huawei NGFW Module and Secospace USG6300, USG6500, USG6600, and USG9500 firewalls with software before V500R001C20SPC100 allows remote attackers to cause a denial of service or execute arbitrary code via a crafted packet, related to "illegitimate parameters." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160511-01-dns-en - http://www.securityfocus.com/bid/90532 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1574
The MITRE ATT&CK technique T1574: Hijack Execution Flow is related to the vulnerability CVE-CVE-2020-4100. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2017-9641.
CVE ID: CVE-2017-9641 Date Updated: 2024-09-16T19:20:52.829Z Date Published: 2018-05-25T15:00:00Z Description: PI Coresight 2016 R2 contains a cross-site request forgery vulnerability that may allow access to the PI system. OSIsoft recommends that users upgrade to PI Vision 2017 or greater to mitigate this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-17-192-04 - https://techsupport.osisoft.com/Troubleshooting/Alerts/AL00320 - http://www.securityfocus.com/bid/99540 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1000889.
CVE ID: CVE-2018-1000889 Date Updated: 2024-09-16T23:31:57.808Z Date Published: 2018-12-27T18:00:00Z Description: Logisim Evolution version 2.14.3 and earlier contains an XML External Entity (XXE) vulnerability in Circuit file loading functionality (loadXmlFrom in src/com/cburch/logisim/file/XmlReader.java) that can result in information leak, possible RCE depending on system configuration. This attack appears to be exploitable via the victim opening a specially crafted circuit file. This vulnerability appears to have been fixed in 2.14.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/reds-heig/logisim-evolution/pull/139 - https://www.kvakil.me/posts/logisim/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46354.
CVE ID: CVE-2023-46354 Date Updated: 2024-08-02T20:45:41.267Z Date Published: 2023-12-06T00:00:00 Description: In the module "Orders (CSV, Excel) Export PRO" (ordersexport) < 5.2.0 from MyPrestaModules for PrestaShop, a guest can download personal information without restriction. Due to a lack of permissions control, a guest can access exports from the module which can lead to a leak of personal information from ps_customer/ps_address tables such as name / surname / email / phone number / full postal address. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.friendsofpresta.org/modules/2023/11/28/ordersexport.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6888.
CVE ID: CVE-2013-6888 Date Updated: 2024-08-06T17:53:45.458Z Date Published: 2014-01-07T17:00:00 Description: Uscan in devscripts before 2.13.9 allows remote attackers to execute arbitrary code via a crafted tarball. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/64656 - http://marc.info/?l=oss-security&m=138900586911271&w=2 - http://www.ubuntu.com/usn/USN-2084-1 - http://secunia.com/advisories/56579 - http://www.debian.org/security/2014/dsa-2836 - http://secunia.com/advisories/56192 - https://exchange.xforce.ibmcloud.com/vulnerabilities/90107 - http://anonscm.debian.org/gitweb/?p=collab-maint/devscripts.git%3Ba=commitdiff%3Bh=02c6850d973e3e1246fde72edab27f03d63acc52 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7317.
CVE ID: CVE-2015-7317 Date Updated: 2024-08-06T07:43:46.225Z Date Published: 2017-09-25T17:00:00 Description: Kupu 3.3.0 through 3.3.6, 4.0.0 through 4.0.10, 4.1.0 through 4.1.6, and 4.2.0 through 4.2.7 allows remote authenticated users to edit Kupu settings. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://plone.org/security/hotfix/20150910/privilege-escalation-in-kupu - https://plone.org/security/hotfix/20150910 - https://bugzilla.redhat.com/show_bug.cgi?id=1264799 - http://www.openwall.com/lists/oss-security/2015/09/22/15 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0528.
CVE ID: CVE-2018-0528 Date Updated: 2024-08-05T03:28:11.059Z Date Published: 2018-06-26T14:00:00 Description: Cybozu Office 10.0.0 to 10.7.0 allows authenticated attackers to bypass authentication to view the schedules that are not permitted to access via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.cybozu.com/ja-jp/article/9812 - http://jvn.jp/en/jp/JVN51737843/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46570.
CVE ID: CVE-2023-46570 Date Updated: 2024-09-09T19:52:40.313Z Date Published: 2023-10-28T00:00:00 Description: An out-of-bounds read in radare2 v.5.8.9 and before exists in the print_insn32 function of libr/arch/p/nds32/nds32-dis.h. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/radareorg/radare2/issues/22333 - https://gist.github.com/gandalf4a/d7fa58f1b3418ef08ad244acccc10ba6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0835.
CVE ID: CVE-2011-0835 Date Updated: 2024-08-06T22:05:54.407Z Date Published: 2011-07-20T22:36:00 Description: Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.1, and 11.2.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2011-0832 and CVE-2011-0880. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.us-cert.gov/cas/techalerts/TA11-201A.html - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-36456.
CVE ID: CVE-2020-36456 Date Updated: 2024-08-04T17:30:07.344Z Date Published: 2021-08-08T05:14:31 Description: An issue was discovered in the toolshed crate through 2020-11-15 for Rust. In CopyCell<T>, the Send trait lacks bounds on the contained type. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://rustsec.org/advisories/RUSTSEC-2020-0136.html - https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/toolshed/RUSTSEC-2020-0136.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0507.
CVE ID: CVE-2015-0507 Date Updated: 2024-08-06T04:10:11.020Z Date Published: 2015-04-16T16:00:00 Description: Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201507-19 - http://www.securitytracker.com/id/1032121 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html - http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39068.
CVE ID: CVE-2021-39068 Date Updated: 2024-09-17T01:26:59.167Z Date Published: 2022-04-11T18:17:12.131519Z Description: IBM Curam Social Program Management 8.0.1 and 7.0.11 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 215306. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6570589 - https://exchange.xforce.ibmcloud.com/vulnerabilities/215306 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-31424.
CVE ID: CVE-2024-31424 Date Updated: 2024-08-02T01:52:56.905Z Date Published: 2024-04-15T10:07:10.451Z Description: Cross-Site Request Forgery (CSRF) vulnerability in Hamid Alinia - idehweb Login with phone number.This issue affects Login with phone number: from n/a through 1.6.93. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/login-with-phone-number/wordpress-login-with-phone-number-plugin-1-6-93-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2509.
CVE ID: CVE-2009-2509 Date Updated: 2024-08-07T05:52:14.951Z Date Published: 2009-12-09T18:00:00 Description: Active Directory Federation Services (ADFS) in Microsoft Windows Server 2003 SP2 and Server 2008 Gold and SP2 does not properly validate headers in HTTP requests, which allows remote authenticated users to execute arbitrary code via a crafted request to an IIS web server, aka "Remote Code Execution in ADFS Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6441 - http://www.us-cert.gov/cas/techalerts/TA09-342A.html - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-070 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4671.
CVE ID: CVE-2010-4671 Date Updated: 2024-08-07T03:51:18.052Z Date Published: 2011-01-07T11:00:00 Description: The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Cisco IOS before 15.0(1)XA5 allows remote attackers to cause a denial of service (CPU consumption and device hang) by sending many Router Advertisement (RA) messages with different source addresses, as demonstrated by the flood_router6 program in the thc-ipv6 package, aka Bug ID CSCti33534. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/45760 - https://exchange.xforce.ibmcloud.com/vulnerabilities/64589 - http://mirror.fem-net.de/CCC/27C3/mp4-h264-HQ/27c3-3957-en-ipv6_insecurities.mp4 - http://www.ciscosystems.com/en/US/docs/ios/15_0/15_0x/15_01_XA/rn800xa.pdf - http://mirror.fem-net.de/CCC/27C3/mp3-audio-only/27c3-3957-en-ipv6_insecurities.mp3 - http://events.ccc.de/congress/2010/Fahrplan/events/3957.en.html - http://www.youtube.com/watch?v=00yjWB6gGy8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0519.
CVE ID: CVE-2008-0519 Date Updated: 2024-08-07T07:46:55.065Z Date Published: 2008-01-31T19:30:00 Description: SQL injection vulnerability in index.php in the Atapin Jokes (com_jokes) 1.0 component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in a CatView action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/5015 - http://www.securityfocus.com/bid/27522 - https://exchange.xforce.ibmcloud.com/vulnerabilities/40067 - http://www.vupen.com/english/advisories/2008/0361 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38965.
CVE ID: CVE-2023-38965 Date Updated: 2024-09-05T14:55:48.890Z Date Published: 2023-11-03T00:00:00 Description: Lost and Found Information System 1.0 allows account takeover via username and password to a /classes/Users.php?f=save URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Or4ngm4n/vulnreability-code-review-php/blob/main/Lost%20and%20Found%20Information%20System%20v1.0.txt - http://packetstormsecurity.com/files/175077/Lost-And-Found-Information-System-1.0-Insecure-Direct-Object-Reference.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15621.
CVE ID: CVE-2018-15621 Date Updated: 2019-03-05T19:57:01 Date Published: 2019-03-05T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-10466.
CVE ID: CVE-2020-10466 Date Updated: 2024-08-04T10:58:40.722Z Date Published: 2020-03-12T13:05:24 Description: Reflected XSS in admin/edit-glossary.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to inject arbitrary web script or HTML via the GET parameter p. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://antoniocannito.it/?p=342#xss5 - https://antoniocannito.it/phpkb2#reflected-cross-site-scripting-when-editing-a-glossary-term-cve-2020-10466 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31260.
CVE ID: CVE-2021-31260 Date Updated: 2024-08-03T22:55:53.441Z Date Published: 2021-04-19T18:29:10 Description: The MergeTrack function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/gpac/gpac/issues/1736 - https://github.com/gpac/gpac/commit/df8fffd839fe5ae9acd82d26fd48280a397411d9 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-1990.
CVE ID: CVE-2016-1990 Date Updated: 2024-08-05T23:17:49.372Z Date Published: 2016-03-16T10:00:00 Description: HPE ArcSight ESM 5.x before 5.6, 6.0, 6.5.x before 6.5C SP1 Patch 2, and 6.8c before P1, and ArcSight ESM Express before 6.9.1, allows local users to gain privileges for command execution via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05048452 - http://www.securitytracker.com/id/1035282 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50454.
CVE ID: CVE-2023-50454 Date Updated: 2024-08-02T22:16:46.864Z Date Published: 2023-12-10T00:00:00 Description: An issue was discovered in Zammad before 6.2.0. In several subsystems, SSL/TLS was used to establish connections to external services without proper validation of hostname and certificate authority. This is exploitable by man-in-the-middle attackers. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://zammad.com/en/advisories/zaa-2023-04 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5142.
CVE ID: CVE-2013-5142 Date Updated: 2024-08-06T17:06:51.541Z Date Published: 2013-09-19T10:00:00 Description: The kernel in Apple iOS before 7 does not initialize unspecified kernel data structures, which allows local users to obtain sensitive information from kernel stack memory via the (1) msgctl API or (2) segctl API. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1029054 - http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html - http://support.apple.com/kb/HT5934 - http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1389.
CVE ID: CVE-2008-1389 Date Updated: 2024-08-07T08:17:34.723Z Date Published: 2008-09-04T16:00:00 Description: libclamav/chmunpack.c in the chm-parser in ClamAV before 0.94 allows remote attackers to cause a denial of service (application crash) via a malformed CHM file, related to an "invalid memory access." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32030 - http://www.securityfocus.com/bid/30994 - http://www.vupen.com/english/advisories/2008/2484 - http://secunia.com/advisories/31982 - http://www.securityfocus.com/bid/31681 - http://int21.de/cve/CVE-2008-1389-clamav-chd.html - http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html - http://sourceforge.net/project/shownotes.php?group_id=86638&release_id=623661 - http://secunia.com/advisories/31725 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:189 - https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00348.html - http://secunia.com/advisories/32222 - http://security.gentoo.org/glsa/glsa-200809-18.xml - http://kolab.org/security/kolab-vendor-notice-22.txt - http://www.securitytracker.com/id?1020805 - http://www.vupen.com/english/advisories/2008/2780 - http://www.vupen.com/english/advisories/2008/2564 - http://secunia.com/advisories/32699 - http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html - http://support.apple.com/kb/HT3216 - http://secunia.com/advisories/31906 - https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00332.html - http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog - https://wwws.clamav.net/bugzilla/show_bug.cgi?id=1089 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30584.
CVE ID: CVE-2021-30584 Date Updated: 2024-08-03T22:32:41.311Z Date Published: 2021-08-03T19:41:13 Description: Incorrect security UI in Downloads in Google Chrome on Android prior to 92.0.4515.107 allowed a remote attacker to perform domain spoofing via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html - https://crbug.com/1213350 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LVY4WIWTVVYKQMROJJS365TZBKEARCF/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QW4R2K5HVJ4R6XDZYOJCCFPIN2XHNS3L/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPJPUSAWIJMQFBQQQYXAICLI4EKFQOH6/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-8680.
CVE ID: CVE-2017-8680 Date Updated: 2024-09-16T22:41:28.169Z Date Published: 2017-09-13T01:00:00Z Description: The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT 8.1 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8678, CVE-2017-8677, CVE-2017-8681, and CVE-2017-8687. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/100722 - http://www.securitytracker.com/id/1039338 - https://www.exploit-db.com/exploits/42741/ - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8680 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33716.
CVE ID: CVE-2021-33716 Date Updated: 2024-08-03T23:58:22.881Z Date Published: 2021-09-14T10:47:34 Description: A vulnerability has been identified in SIMATIC CP 1543-1 (incl. SIPLUS variants) (All versions < V3.0), SIMATIC CP 1545-1 (All versions < V1.1). An attacker with access to the subnet of the affected device could retrieve sensitive information stored in cleartext. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-535997.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0309.
CVE ID: CVE-2023-0309 Date Updated: 2024-08-02T05:10:54.892Z Date Published: 2023-01-15T00:00:00 Description: Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/c03c5925-43ff-450d-9827-2b65a3307ed6 - https://github.com/thorsten/phpmyfaq/commit/376d1d3e5a42edf07260e98461d2fddbee74419b No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5789.
CVE ID: CVE-2012-5789 Date Updated: 2024-08-06T21:14:16.381Z Date Published: 2012-11-04T22:00:00 Description: PayPal Payments Standard PHP Library before 20120427 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to intentional disabling of certificate-validation checks through a "FALSE" value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/79912 - http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5167.
CVE ID: CVE-2018-5167 Date Updated: 2024-08-05T05:26:46.993Z Date Published: 2018-06-11T21:00:00 Description: The web console and JavaScript debugger do not sanitize all output that can be hyperlinked. Both will display "chrome:" links as active, clickable hyperlinks in their output. Web sites should not be able to directly link to internal chrome pages. Additionally, the JavaScript debugger will display "javascript:" links, which users could be tricked into clicking by malicious sites. This vulnerability affects Firefox < 60. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2018-11/ - http://www.securitytracker.com/id/1040896 - https://usn.ubuntu.com/3645-1/ - http://www.securityfocus.com/bid/104139 - https://bugzilla.mozilla.org/show_bug.cgi?id=1447969 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14810.
CVE ID: CVE-2017-14810 Date Updated: 2021-01-06T16:15:38 Date Published: 2019-01-02T19:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8442.
CVE ID: CVE-2018-8442 Date Updated: 2024-08-05T06:54:36.435Z Date Published: 2018-09-13T00:00:00 Description: An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8336, CVE-2018-8419, CVE-2018-8443, CVE-2018-8445, CVE-2018-8446. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8442 - http://www.securitytracker.com/id/1041635 - http://www.securityfocus.com/bid/105234 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2285.
CVE ID: CVE-2009-2285 Date Updated: 2024-08-07T05:44:55.816Z Date Published: 2009-07-01T12:26:00 Description: Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html - https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00161.html - http://secunia.com/advisories/35866 - https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00655.html - http://www.vupen.com/english/advisories/2009/1637 - http://www.openwall.com/lists/oss-security/2009/06/23/1 - http://bugzilla.maptools.org/show_bug.cgi?id=2065 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7049 - http://secunia.com/advisories/39135 - http://support.apple.com/kb/HT4004 - http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html - https://usn.ubuntu.com/797-1/ - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10145 - http://support.apple.com/kb/HT4105 - http://secunia.com/advisories/35716 - https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00714.html - http://www.openwall.com/lists/oss-security/2009/06/22/1 - http://secunia.com/advisories/35912 - http://support.apple.com/kb/HT4070 - http://lists.apple.com/archives/security-announce/2010/Feb/msg00000.html - http://secunia.com/advisories/35883 - http://www.vupen.com/english/advisories/2009/2727 - http://secunia.com/advisories/35695 - http://www.lan.st/showthread.php?t=1856&page=3 - http://secunia.com/advisories/36194 - http://secunia.com/advisories/36831 - http://security.gentoo.org/glsa/glsa-200908-03.xml - http://www.vupen.com/english/advisories/2009/3184 - http://support.apple.com/kb/HT4013 - https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00142.html - http://lists.apple.com/archives/security-announce/2010//Mar/msg00003.html - http://sunsolve.sun.com/search/document.do?assetkey=1-66-267808-1 - http://www.redhat.com/support/errata/RHSA-2009-1159.html - http://secunia.com/advisories/38241 - https://bugs.launchpad.net/ubuntu/+source/tiff/+bug/380149 - http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html - https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00230.html - http://www.debian.org/security/2009/dsa-1835 - http://www.openwall.com/lists/oss-security/2009/06/29/5 - http://www.vupen.com/english/advisories/2010/0173 - http://support.apple.com/kb/HT3937 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10190.
CVE ID: CVE-2016-10190 Date Updated: 2024-08-06T03:14:42.866Z Date Published: 2017-02-09T15:00:00 Description: Heap-based buffer overflow in libavformat/http.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote web servers to execute arbitrary code via a negative chunk size in an HTTP response. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.debian.org/debian-lts-announce/2018/12/msg00009.html - http://www.openwall.com/lists/oss-security/2017/01/31/12 - http://www.openwall.com/lists/oss-security/2017/02/02/1 - https://github.com/FFmpeg/FFmpeg/commit/2a05c8f813de6f2278827734bf8102291e7484aa - https://trac.ffmpeg.org/ticket/5992 - http://www.securityfocus.com/bid/95986 - https://ffmpeg.org/security.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4996.
CVE ID: CVE-2008-4996 Date Updated: 2024-09-16T22:09:49.164Z Date Published: 2008-11-07T19:00:00Z Description: init in initramfs-tools 0.92f allows local users to overwrite arbitrary files via a symlink attack on the /tmp/initramfs.debug temporary file. NOTE: the vendor disputes this vulnerability, stating that "init is [used in] a single-user context; there's no possibility that this is exploitable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://dev.gentoo.org/~rbu/security/debiantemp/initramfs-tools - http://www.openwall.com/lists/oss-security/2008/10/30/2 - https://bugs.gentoo.org/show_bug.cgi?id=235770 - http://bugs.debian.org/496386 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8902.
CVE ID: CVE-2018-8902 Date Updated: 2024-08-05T07:10:46.652Z Date Published: 2018-06-29T15:00:00 Description: An issue was discovered in Ivanti Avalanche for all versions between 5.3 and 6.2. The impacted products used a single shared key encryption model to encrypt data. A user with access to system databases can use the discovered key to access potentially confidential stored data, which may include Wi-Fi passwords. This discovered key can be used for all instances of the product. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://community.ivanti.com/docs/DOC-68406 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-33566.
CVE ID: CVE-2024-33566 Date Updated: 2024-08-02T02:36:04.454Z Date Published: 2024-04-29T07:58:31.256Z Description: Missing Authorization vulnerability in N-Media OrderConvo allows OS Command Injection.This issue affects OrderConvo: from n/a through 12.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/admin-and-client-message-after-order-for-woocommerce/wordpress-orderconvo-plugin-12-4-unauthenticated-api-access-to-arbitrary-file-upload-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6348.
CVE ID: CVE-2012-6348 Date Updated: 2024-09-16T16:37:56.078Z Date Published: 2013-01-04T21:00:00Z Description: Centrify Deployment Manager 2.1.0.283, as distributed in Centrify Suite before 2012.5, allows local users to (1) overwrite arbitrary files via a symlink attack on the adcheckDMoutput temporary file, or (2) overwrite arbitrary files and consequently gain privileges via a symlink attack on the centrify.cmd.0 temporary file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://archives.neohapsis.com/archives/bugtraq/2012-12/0113.html - http://archives.neohapsis.com/archives/bugtraq/2012-12/0097.html - http://archives.neohapsis.com/archives/bugtraq/2012-12/0036.html - http://archives.neohapsis.com/archives/bugtraq/2012-12/0071.html - http://vapid.dhs.org/exploits/centrify_local_r00t.c - http://archives.neohapsis.com/archives/bugtraq/2012-12/0037.html - http://vapid.dhs.org/advisories/centrify_deployment_manager_insecure_tmp2.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25291.
CVE ID: CVE-2024-25291 Date Updated: 2024-08-01T23:44:08.415Z Date Published: 2024-02-29T00:00:00 Description: Deskfiler v1.2.3 allows attackers to execute arbitrary code via uploading a crafted plugin. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ji-zzang/EQST-PoC/tree/main/2024/RCE/CVE-2024-25291 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1976.
CVE ID: CVE-2022-1976 Date Updated: 2024-08-03T00:24:43.557Z Date Published: 2022-08-31T00:00:00 Description: A flaw was found in the Linux kernel’s implementation of IO-URING. This flaw allows an attacker with local executable permission to create a string of requests that can cause a use-after-free flaw within the kernel. This issue leads to memory corruption and possible privilege escalation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=2092549 - https://security.netapp.com/advisory/ntap-20230214-0005/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0615.
CVE ID: CVE-2008-0615 Date Updated: 2024-08-07T07:54:22.882Z Date Published: 2008-02-06T11:00:00 Description: Directory traversal vulnerability in wp-admin/admin.php in the DMSGuestbook 1.8.0 and 1.7.0 plugin for WordPress allows remote authenticated users to read arbitrary files via a .. (dot dot) in the (1) folder and (2) file parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/28759 - http://www.securityfocus.com/bid/27575 - http://securityreason.com/securityalert/3615 - http://www.securityfocus.com/archive/1/487437/100/0/threaded - https://www.exploit-db.com/exploits/5035 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5549.
CVE ID: CVE-2014-5549 Date Updated: 2024-08-06T11:48:49.935Z Date Published: 2014-09-09T01:00:00 Description: The Puppy Slots (aka air.com.starluxstudios.PuppySlotsFree) application 3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/397257 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3718.
CVE ID: CVE-2016-3718 Date Updated: 2024-08-06T00:03:34.460Z Date Published: 2016-05-05T18:00:00 Description: The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html - http://www.ubuntu.com/usn/USN-2990-1 - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html - http://www.securityfocus.com/archive/1/538378/100/0/threaded - https://www.exploit-db.com/exploits/39767/ - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html - https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - http://www.openwall.com/lists/oss-security/2016/05/03/18 - https://security.gentoo.org/glsa/201611-21 - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html - http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 - https://www.imagemagick.org/script/changelog.php - http://www.debian.org/security/2016/dsa-3580 - http://rhn.redhat.com/errata/RHSA-2016-0726.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4817.
CVE ID: CVE-2023-4817 Date Updated: 2024-09-19T19:46:01.454Z Date Published: 2023-10-03T15:03:03.694Z Description: This vulnerability allows an authenticated attacker to upload malicious files by bypassing the restrictions of the upload functionality, compromising the entire device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.incibe.es/en/incibe-cert/notices/aviso/unrestricted-file-upload-vulnerability-icp-das-et-7060 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4670.
CVE ID: CVE-2019-4670 Date Updated: 2024-09-16T19:15:44.023Z Date Published: 2020-02-05T15:20:24.877759Z Description: IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to obtain sensitive information caused by improper data representation. IBM X-Force ID: 171319. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/1289152 - https://exchange.xforce.ibmcloud.com/vulnerabilities/171319 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9692.
CVE ID: CVE-2020-9692 Date Updated: 2024-08-04T10:34:39.935Z Date Published: 2020-07-29T12:20:48 Description: Magento versions 2.3.5-p1 and earlier, and 2.3.5-p1 and earlier have a security mitigation bypass vulnerability. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/magento/apsb20-47.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7923.
CVE ID: CVE-2018-7923 Date Updated: 2024-08-05T06:37:59.640Z Date Published: 2018-09-12T15:00:00 Description: Huawei ALP-L09 smart phones with versions earlier than ALP-L09 8.0.0.150(C432) have an insufficient input validation vulnerability due to lack of parameter check. An attacker tricks the user who has root privilege to install a crafted application, the application may modify the specific data to exploit the vulnerability. Successful exploit could allow the attacker to execute arbitrary code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180911-01-smartphone-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7998.
CVE ID: CVE-2017-7998 Date Updated: 2024-08-05T16:19:29.494Z Date Published: 2018-01-08T19:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Gespage before 7.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) printer name when adding a printer in the admin panel or (2) username parameter to webapp/users/user_reg.jsp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2018/Jan/13 - https://sysdream.com/news/lab/2018-01-02-cve-2017-7998-gespage-stored-cross-site-scripting-xss-vulnerability/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21983.
CVE ID: CVE-2023-21983 Date Updated: 2024-09-13T18:25:53.609Z Date Published: 2023-07-18T20:18:03.790Z Description: Vulnerability in the Application Express Administration product of Oracle Application Express (component: None). Supported versions that are affected are Application Express Administration: 18.2-22.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Application Express Administration. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Application Express Administration accessible data as well as unauthorized read access to a subset of Application Express Administration accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Application Express Administration. CVSS 3.1 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujul2023.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30565.
CVE ID: CVE-2021-30565 Date Updated: 2024-08-03T22:32:41.301Z Date Published: 2021-08-03T19:40:43 Description: Out of bounds write in Tab Groups in Google Chrome on Linux and ChromeOS prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://crbug.com/1210985 - https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LVY4WIWTVVYKQMROJJS365TZBKEARCF/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QW4R2K5HVJ4R6XDZYOJCCFPIN2XHNS3L/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPJPUSAWIJMQFBQQQYXAICLI4EKFQOH6/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7437.
CVE ID: CVE-2014-7437 Date Updated: 2024-08-06T12:47:33.235Z Date Published: 2014-10-19T10:00:00 Description: The Love Horoscope Guide (aka com.charl.charlylovehoroscopes) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/582497 - http://www.kb.cert.org/vuls/id/937753 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11183.
CVE ID: CVE-2018-11183 Date Updated: 2024-08-05T08:01:51.860Z Date Published: 2018-06-01T21:00:00 Description: Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 41 of 46). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2018/May/71 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5020.
CVE ID: CVE-2019-5020 Date Updated: 2024-08-04T19:40:49.327Z Date Published: 2019-07-31T16:38:21 Description: An exploitable denial of service vulnerability exists in the object lookup functionality of Yara 3.8.1. A specially crafted binary file can cause a negative value to be read to satisfy an assert, resulting in Denial of Service. An attacker can create a malicious binary to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0781 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-41119.
CVE ID: CVE-2024-41119 Date Updated: 2024-08-02T04:46:52.389Z Date Published: 2024-07-26T20:54:49.052Z Description: streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `vis_params` variable on line 80 in `8_🏜️_Raster_Data_Visualization.py` takes user input, which is later used in the `eval()` function on line 86, leading to remote code execution. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ - https://github.com/opengeos/streamlit-geospatial/commit/c4f81d9616d40c60584e36abb15300853a66e489 - https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/8_%F0%9F%8F%9C%EF%B8%8F_Raster_Data_Visualization.py#L80 - https://github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/8_%F0%9F%8F%9C%EF%B8%8F_Raster_Data_Visualization.py#L86 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4880.
CVE ID: CVE-2010-4880 Date Updated: 2024-08-07T04:02:29.883Z Date Published: 2011-10-07T10:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in calendar.class.php in ApPHP Calendar (ApPHP CAL) allow remote attackers to inject arbitrary web script or HTML via the (1) category_name, (2) category_description, (3) event_name, or (4) event_description parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/513445/100/0/threaded - http://packetstormsecurity.org/1008-advisories/apphp-xssxsrf.txt - http://securityreason.com/securityalert/8433 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-27635.
CVE ID: CVE-2022-27635 Date Updated: 2024-08-03T05:32:59.881Z Date Published: 2023-08-11T02:36:52.838Z Description: Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/ - https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-31405.
CVE ID: CVE-2022-31405 Date Updated: 2024-08-03T07:19:05.625Z Date Published: 2023-02-27T00:00:00 Description: MV iDigital Clinic Enterprise (iDCE) 1.0 stores passwords in cleartext. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ifmacedo/mconnect/blob/main/IDCE-ClearTextStorage - https://www.linkedin.com/pulse/armazenamento-inseguro-idce-mv-iran-macedo - https://mv.com.br/pt/blog/microdata-integra-novo-modulo-cockpit-ao-ris-idce No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4469.
CVE ID: CVE-2018-4469 Date Updated: 2023-09-14T18:41:32.465Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24410.
CVE ID: CVE-2022-24410 Date Updated: 2024-08-03T04:13:55.264Z Date Published: 2023-02-10T10:34:58.416Z Description: Dell BIOS contains an information exposure vulnerability. An unauthenticated local attacker with physical access to the system and knowledge of the system configuration could potentially exploit this vulnerability to read system information via debug interfaces. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000205719/dsa-2022-325 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-36774.
CVE ID: CVE-2021-36774 Date Updated: 2024-08-04T01:01:59.491Z Date Published: 2022-01-06T12:35:20 Description: Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/lchpcvoolc6w8zc6vo1wstk8zbfqv2ow - http://www.openwall.com/lists/oss-security/2022/01/06/5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-7216.
CVE ID: CVE-2024-7216 Date Updated: 2024-08-01T21:52:31.490Z Date Published: 2024-07-30T04:00:05.592Z Description: A vulnerability was found in TOTOLINK LR1200 9.3.1cu.2832. It has been classified as problematic. This affects an unknown part of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272787. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.272787 - https://vuldb.com/?ctiid.272787 - https://vuldb.com/?submit.378331 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/LR1200/shadow.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3730.
CVE ID: CVE-2012-3730 Date Updated: 2024-08-06T20:13:51.613Z Date Published: 2012-09-20T21:00:00 Description: Mail in Apple iOS before 6 does not properly handle reuse of Content-ID header values, which allows remote attackers to spoof attachments via a header value that was also used in a previous e-mail message, as demonstrated by a message from a different sender. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/78717 - http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html - http://support.apple.com/kb/HT5503 - http://osvdb.org/85626 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34714.
CVE ID: CVE-2024-34714 Date Updated: 2024-08-02T02:59:22.606Z Date Published: 2024-05-14T14:48:36.879Z Description: The Hoppscotch Browser Extension is a browser extension for Hoppscotch, a community-driven end-to-end open-source API development ecosystem. Due to an oversight during a change made to the extension in the commit d4e8e4830326f46ba17acd1307977ecd32a85b58, a critical check for the origin list was missed and allowed for messages to be sent to the extension which the extension gladly processed and responded back with the results of, while this wasn't supposed to happen and be blocked by the origin not being present in the origin list. This vulnerability exposes Hoppscotch Extension users to sites which call into Hoppscotch Extension APIs internally. This fundamentally allows any site running on the browser with the extension installed to bypass CORS restrictions if the user is running extensions with the given version. This security hole was patched in the commit 7e364b928ab722dc682d0fcad713a96cc38477d6 which was released along with the extension version `0.35`. As a workaround, Chrome users can use the Extensions Settings to disable the extension access to only the origins that you want. Firefox doesn't have an alternative to upgrading to a fixed version. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/hoppscotch/hoppscotch-extension/security/advisories/GHSA-jjh5-pvqx-gg5v - https://github.com/hoppscotch/hoppscotch-extension/commit/7e364b928ab722dc682d0fcad713a96cc38477d6 - https://github.com/hoppscotch/hoppscotch-extension/commit/d4e8e4830326f46ba17acd1307977ecd32a85b58 - https://server.yadhu.in/poc/hoppscotch-poc.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16290.
CVE ID: CVE-2017-16290 Date Updated: 2024-08-05T20:20:05.568Z Date Published: 2023-01-11T21:39:47.121Z Description: Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_sun, at 0x9d01980c, the value for the `sunrise` key is copied using `strcpy` to the buffer at `$sp+0x2d0`.This buffer is 100 bytes large, sending anything longer will cause a buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3294.
CVE ID: CVE-2009-3294 Date Updated: 2024-08-07T06:22:24.462Z Date Published: 2009-09-22T10:00:00 Description: The popen API function in TSRM/tsrm_win32.c in PHP before 5.2.11 and 5.3.x before 5.3.1, when running on certain Windows operating systems, allows context-dependent attackers to cause a denial of service (crash) via a crafted (1) "e" or (2) "er" string in the second argument (aka mode), possibly related to the _fdopen function in the Microsoft C runtime library. NOTE: this might not cross privilege boundaries except in rare cases in which the mode argument is accessible to an attacker outside of an application that uses the popen function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.php.net/ChangeLog-5.php#5.2.11 - http://www.openwall.com/lists/oss-security/2009/11/20/3 - http://news.php.net/php.announce/79 - http://www.php.net/releases/5_2_11.php - http://www.php.net/ChangeLog-5.php - http://www.openwall.com/lists/oss-security/2009/11/20/2 - http://bugs.php.net/bug.php?id=44683 - http://www.php.net/releases/5_3_1.php - http://www.openwall.com/lists/oss-security/2009/09/20/1 - http://www.osvdb.org/58188 - http://svn.php.net/viewvc?view=revision&revision=287779 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1498.
CVE ID: CVE-2014-1498 Date Updated: 2024-08-06T09:42:36.168Z Date Published: 2014-03-19T10:00:00 Description: The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mozilla.org/security/announce/2014/mfsa2014-18.html - https://security.gentoo.org/glsa/201504-01 - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - https://bugzilla.mozilla.org/show_bug.cgi?id=935618 - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html - http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11582.
CVE ID: CVE-2017-11582 Date Updated: 2024-08-05T18:12:40.600Z Date Published: 2017-07-24T00:00:00 Description: dayrui FineCms 5.0.9 has SQL Injection via the num parameter in an action=related or action=tags request to libraries/Template.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lorexxar.cn/2017/07/20/FineCMS%20multi%20vulnerablity%20before%20v5.0.9/#SQL-injection-after-limit-via-system-num-parameter No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5933.
CVE ID: CVE-2013-5933 Date Updated: 2024-09-17T01:11:26.867Z Date Published: 2013-09-25T10:00:00Z Description: Stack-based buffer overflow in the sub_E110 function in init in a certain configuration of Android 2.3.7 on the Motorola Defy XT phone for Republic Wireless allows local users to gain privileges or cause a denial of service (memory corruption) by writing a long string to the /dev/socket/init_runit socket that is inconsistent with a certain length value that was previously written to this socket. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://plus.google.com/110348415484169880343/posts/5ofgPNrSu3J - http://twitter.com/djrbliss/statuses/382632926946402304 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-17960.
CVE ID: CVE-2018-17960 Date Updated: 2024-08-05T11:01:14.714Z Date Published: 2018-11-14T20:00:00 Description: CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ckeditor.com/blog/CKEditor-4.11-with-emoji-dropdown-and-auto-link-on-typing-released/ - https://ckeditor.com/cke4/release/CKEditor-4.11.0 - https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - http://www.securityfocus.com/bid/109205 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-51672.
CVE ID: CVE-2023-51672 Date Updated: 2024-08-08T18:23:51.519Z Date Published: 2024-03-21T17:25:36.387Z Description: Missing Authorization vulnerability in FunnelKit FunnelKit Checkout.This issue affects FunnelKit Checkout: from n/a through 3.10.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/woofunnels-aero-checkout/wordpress-funnelkit-checkout-plugin-3-10-3-unauthenticated-arbitrary-post-page-deletion-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41472.
CVE ID: CVE-2021-41472 Date Updated: 2024-08-04T03:15:28.662Z Date Published: 2022-01-24T15:54:44 Description: SQL injection vulnerability in Sourcecodester Simple Membership System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username and password parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/razormist No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5469.
CVE ID: CVE-2008-5469 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5249.
CVE ID: CVE-2017-5249 Date Updated: 2024-08-05T14:55:35.817Z Date Published: 2018-02-22T16:00:00 Description: In version 6.1.0.19 and prior of Wink Labs's Wink - Smart Home Android app, the OAuth token used by the app to authorize user access is not stored in an encrypted and secure manner. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.rapid7.com/2017/09/22/multiple-vulnerabilities-in-wink-and-insteon-smart-home-systems/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4011.
CVE ID: CVE-2013-4011 Date Updated: 2024-08-06T16:30:49.435Z Date Published: 2013-07-18T16:00:00 Description: Multiple unspecified vulnerabilities in the InfiniBand subsystem in IBM AIX 6.1 and 7.1, and VIOS 2.2.2.2-FP-26 SP-02, allow local users to gain privileges via vectors involving (1) arp.ib or (2) ibstat. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/54215 - http://www.ibm.com/support/docview.wss?uid=isg1IV43562 - http://www.securitytracker.com/id/1028792 - https://exchange.xforce.ibmcloud.com/vulnerabilities/85617 - http://aix.software.ibm.com/aix/efixes/security/infiniband_advisory.asc - http://www.ibm.com/support/docview.wss?uid=isg1IV43580 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19167 - http://www.ibm.com/support/docview.wss?uid=isg1IV43827 - http://osvdb.org/95419 - http://www.ibm.com/support/docview.wss?uid=isg1IV43561 - http://osvdb.org/95420 - http://www.ibm.com/support/docview.wss?uid=isg1IV43582 - http://www.ibm.com/support/docview.wss?uid=isg1IV43756 - http://www.securityfocus.com/bid/61287 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1400.
CVE ID: CVE-2015-1400 Date Updated: 2024-08-06T04:40:18.590Z Date Published: 2015-02-03T16:00:00 Description: SQL injection vulnerability in search.php in NPDS Revolution 13 allows remote attackers to execute arbitrary SQL commands via the query parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.npds.org/viewtopic.php?topic=26189&forum=12 - http://www.npds.org/viewtopic.php?topic=26233&forum=12 - http://packetstormsecurity.com/files/130179/NPDS-CMS-Revolution-13-SQL-Injection.html - http://websecgeeks.com/npds-cms-sql-injection/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22002.
CVE ID: CVE-2021-22002 Date Updated: 2024-08-03T18:30:23.707Z Date Published: 2021-08-31T21:02:21 Description: VMware Workspace ONE Access and Identity Manager, allow the /cfg web app and diagnostic endpoints, on port 8443, to be accessed via port 443 using a custom host header. A malicious actor with network access to port 443 could tamper with host headers to facilitate access to the /cfg web app, in addition a malicious actor could access /cfg diagnostic endpoints without authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vmware.com/security/advisories/VMSA-2021-0016.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8421.
CVE ID: CVE-2015-8421 Date Updated: 2024-08-06T08:20:41.612Z Date Published: 2015-12-10T02:00:00 Description: Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 - https://helpx.adobe.com/security/products/flash-player/apsb15-32.html - http://www.securityfocus.com/bid/78715 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html - http://www.securitytracker.com/id/1034318 - https://www.exploit-db.com/exploits/39045/ - https://security.gentoo.org/glsa/201601-03 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5885.
CVE ID: CVE-2019-5885 Date Updated: 2024-08-04T20:09:23.762Z Date Published: 2019-03-19T17:59:29 Description: Matrix Synapse before 0.34.0.1, when the macaroon_secret_key authentication parameter is not set, uses a predictable value to derive a secret key and other secrets which could allow remote attackers to impersonate users. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/32Y6KD3OAHCG5P33HC2QEX3NUZOSXCGZ/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VMCLO5PUPBA756UKY72PKUWL4RRM4W6K/ - https://matrix.org/blog/2019/01/10/critical-security-update-synapse-0-34-0-1-synapse-0-34-1-1/ - https://matrix.org/blog/2019/01/15/further-details-on-critical-security-update-in-synapse-affecting-all-versions-prior-to-0-34-1-cve-2019-5885/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40571.
CVE ID: CVE-2023-40571 Date Updated: 2024-10-02T17:37:31.702Z Date Published: 2023-08-25T20:27:25.306Z Description: weblogic-framework is a tool for detecting weblogic vulnerabilities. Versions 0.2.3 and prior do not verify the returned data packets, and there is a deserialization vulnerability which may lead to remote code execution. When weblogic-framework gets the command echo, it directly deserializes the data returned by the server without verifying it. At the same time, the classloader loads a lot of deserialization calls. In this case, the malicious serialized data returned by the server will cause remote code execution. Version 0.2.4 contains a patch for this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/dream0x01/weblogic-framework/security/advisories/GHSA-hjwj-4f3q-44h3 - https://github.com/dream0x01/weblogic-framework/releases/tag/v0.2.4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6377.
CVE ID: CVE-2016-6377 Date Updated: 2024-08-06T01:29:19.663Z Date Published: 2016-09-03T20:00:00 Description: Media Origination System Suite Software 2.6 and earlier in Cisco Virtual Media Packager (VMP) allows remote attackers to bypass authentication and make arbitrary Platform and Applications Manager (PAM) API calls via unspecified vectors, aka Bug ID CSCuz52110. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-vmp - http://www.securityfocus.com/bid/92715 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14785.
CVE ID: CVE-2019-14785 Date Updated: 2024-08-05T00:26:38.564Z Date Published: 2019-08-09T12:37:50 Description: The "CP Contact Form with PayPal" plugin before 1.2.99 for WordPress has XSS in the publishing wizard via the wp-admin/admin.php?page=cp_contact_form_paypal.php&pwizard=1 cp_contactformpp_id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/cp-contact-form-with-paypal/#developers - https://www.pluginvulnerabilities.com/2019/06/24/reflected-cross-site-scripting-xss-vulnerability-in-cp-contact-form-with-paypal/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15557.
CVE ID: CVE-2019-15557 Date Updated: 2024-08-05T00:49:13.677Z Date Published: 2019-08-26T16:48:16 Description: XM^online 2 User Account and Authentication server 1.0.0 allows SQL injection via a tenant key. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xm-online/xm-uaa/pull/61 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-41380.
CVE ID: CVE-2024-41380 Date Updated: 2024-08-07T18:46:42.935Z Date Published: 2024-08-05T00:00:00 Description: microweber 2.0.16 was discovered to contain a Cross Site Scripting (XSS) vulnerability via userfiles\modules\tags\add_tagging_tagged.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/microweber/microweber/issues/1111 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2029.
CVE ID: CVE-2016-2029 Date Updated: 2024-08-05T23:17:50.122Z Date Published: 2016-06-08T14:00:00 Description: HPE Matrix Operating Environment before 7.5.1 allows remote attackers to obtain sensitive information or modify data via unspecified vectors, a different vulnerability than CVE-2016-4358. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30523.
CVE ID: CVE-2022-30523 Date Updated: 2024-08-03T06:48:36.384Z Date Published: 2022-05-16T14:45:13 Description: Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow a low privileged local attacker to delete the contents of an arbitrary folder as SYSTEM which can then be used for privilege escalation on the affected machine. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpcenter.trendmicro.com/en-us/article/tmka-09071 - https://www.zerodayinitiative.com/advisories/ZDI-22-759/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22714.
CVE ID: CVE-2021-22714 Date Updated: 2024-08-03T18:51:06.841Z Date Published: 2021-03-11T20:13:56 Description: A CWE-119:Improper restriction of operations within the bounds of a memory buffer vulnerability exists in PowerLogic ION7400, PM8000 and ION9000 (All versions prior to V3.0.0), which could cause the meter to reboot or allow for remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.se.com/ww/en/download/document/SEVD-2021-068-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4707.
CVE ID: CVE-2022-4707 Date Updated: 2024-08-03T01:48:39.655Z Date Published: 2023-01-10T16:55:51.653Z Description: The Royal Elementor Addons plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.59. This is due to missing nonce validation in the 'wpr_create_mega_menu_template' AJAX function. This allows unauthenticated attackers to create Mega Menu templates, granted they can trick an administrator into performing an action, such as clicking a link. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/55db7d81-7ffb-49da-b64e-23e892bddc57 - https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/admin/mega-menu.php?rev=2809656 - https://www.wordfence.com/blog/2023/01/eleven-vulnerabilities-patched-in-royal-elementor-addons/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16220.
CVE ID: CVE-2017-16220 Date Updated: 2024-09-16T22:25:37.389Z Date Published: 2018-06-07T02:00:00Z Description: wind-mvc is an mvc framework. wind-mvc is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wind-mvc - https://nodesecurity.io/advisories/417 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4266.
CVE ID: CVE-2021-4266 Date Updated: 2024-08-03T17:23:09.844Z Date Published: 2022-12-21T00:00:00 Description: A vulnerability classified as problematic has been found in Webdetails cpf up to 9.5.0.0-80. Affected is an unknown function of the file core/src/main/java/pt/webdetails/cpf/packager/DependenciesPackage.java. The manipulation of the argument baseUrl leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 9.5.0.0-81 is able to address this issue. The name of the patch is 3bff900d228e8cae3af256b447c5d15bdb03c174. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216468. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/siwapp/siwapp-ror/pull/365 - https://github.com/webdetails/cpf/releases/tag/9.5.0.0-81 - https://github.com/webdetails/cpf/commit/3bff900d228e8cae3af256b447c5d15bdb03c174 - https://vuldb.com/?id.216468 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-36642.
CVE ID: CVE-2020-36642 Date Updated: 2024-08-04T17:30:08.447Z Date Published: 2023-01-06T10:28:44.659Z Description: A vulnerability was found in trampgeek jobe up to 1.6.x and classified as critical. This issue affects the function run_in_sandbox of the file application/libraries/LanguageTask.php. The manipulation leads to command injection. Upgrading to version 1.7.0 is able to address this issue. The identifier of the patch is 8f43daf50c943b98eaf0c542da901a4a16e85b02. It is recommended to upgrade the affected component. The identifier VDB-217553 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.217553 - https://vuldb.com/?ctiid.217553 - https://github.com/trampgeek/jobe/issues/39 - https://github.com/trampgeek/jobe/commit/8f43daf50c943b98eaf0c542da901a4a16e85b02 - https://github.com/trampgeek/jobe/releases/tag/v1.7.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.