instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2016-3454.
CVE ID: CVE-2016-3454 Date Updated: 2024-08-05T23:56:14.042Z Date Published: 2016-04-21T10:00:00 Description: Unspecified vulnerability in the Java VM component in Oracle Database Server 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1035590 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33088.
CVE ID: CVE-2023-33088 Date Updated: 2024-08-02T15:32:46.624Z Date Published: 2023-12-05T03:04:21.594Z Description: Memory corruption when processing cmd parameters while parsing vdev. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49701.
CVE ID: CVE-2023-49701 Date Updated: 2024-08-02T22:01:25.781Z Date Published: 2023-11-30T07:15:14.820Z Description: Memory Corruption in SIM management while USIMPhase2init No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.asrmicro.com/en/goods/psirt?cid=31 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-13676.
CVE ID: CVE-2017-13676 Date Updated: 2024-09-16T21:09:03.016Z Date Published: 2017-09-27T15:00:00Z Description: Norton Remove & Reinstall can be susceptible to a DLL preloading vulnerability. These types of issues occur when an application looks to call a DLL for execution and an attacker provides a malicious DLL to use instead. Depending on how the application is configured, it will generally follow a specific search path to locate the DLL. The vulnerability can be exploited by a simple file write (or potentially an over-write) which results in a foreign DLL running under the context of the application. A Norton Remove & Reinstall update, version 4.4.0.58, has been released which addresses the aforementioned vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170926_00 - http://www.securityfocus.com/bid/100939 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27078.
CVE ID: CVE-2024-27078 Date Updated: 2024-08-02T00:27:58.532Z Date Published: 2024-05-01T13:04:54.979Z Description: In the Linux kernel, the following vulnerability has been resolved: media: v4l2-tpg: fix some memleaks in tpg_alloc In tpg_alloc, resources should be deallocated in each and every error-handling paths, since they are allocated in for statements. Otherwise there would be memleaks because tpg_free is called only when tpg_alloc return 0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/0de691ff547d86dd54c24b40a81f9c925df8dd77 - https://git.kernel.org/stable/c/8269ab16415f2065cd792c49b0475543936cbd79 - https://git.kernel.org/stable/c/94303a06e1852a366e9671fff46d19459f88cb28 - https://git.kernel.org/stable/c/770a57922ce36a8476c43f7400b6501c554ea511 - https://git.kernel.org/stable/c/6bf5c2fade8ed53b2d26fa9875e5b04f36c7145d - https://git.kernel.org/stable/c/4c86c772fef06f5d7a66151bac42366825db0941 - https://git.kernel.org/stable/c/31096da07933598da8522c54bd007376fb152a09 - https://git.kernel.org/stable/c/622b1cf38521569869c8f7b9fbe9e4f1a289add7 - https://git.kernel.org/stable/c/8cf9c5051076e0eb958f4361d50d8b0c3ee6691c - https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-4967.
CVE ID: CVE-2020-4967 Date Updated: 2024-09-16T19:41:41.020Z Date Published: 2021-01-27T13:05:28.011241Z Description: IBM Cloud Pak for Security (CP4S) 1.3.0.1 could disclose sensitive information through HTTP headers which could be used in further attacks against the system. IBM X-Force ID: 192425. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6408662 - https://exchange.xforce.ibmcloud.com/vulnerabilities/192425 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6337.
CVE ID: CVE-2008-6337 Date Updated: 2024-08-07T11:27:35.564Z Date Published: 2009-02-27T17:00:00 Description: SQL injection vulnerability in the Volunteer Management System (com_volunteer) module 2.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the job_id parameter in a jobshow action to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/7546 - http://secunia.com/advisories/33271 - http://www.securityfocus.com/bid/32973 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5011.
CVE ID: CVE-2019-5011 Date Updated: 2024-08-04T19:40:49.194Z Date Published: 2019-03-21T14:50:38 Description: An exploitable privilege escalation vulnerability exists in the helper service CleanMyMac X, version 4.20, due to improper updating. The application failed to remove the vulnerable components upon upgrading to the latest version, leaving the user open to attack. A user with local access can use this vulnerability to modify the file system as root. An attacker would need local access to the machine for a successful exploit. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0759 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18653.
CVE ID: CVE-2018-18653 Date Updated: 2024-08-05T11:16:00.182Z Date Published: 2018-10-26T00:00:00 Description: The Linux kernel, as used in Ubuntu 18.10 and when booted with UEFI Secure Boot enabled, allows privileged local users to bypass intended Secure Boot restrictions and execute untrusted code by loading arbitrary kernel modules. This occurs because a modified kernel/module.c, in conjunction with certain configuration options, leads to mishandling of the result of signature verification. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.net/bugs/1798863 - https://usn.ubuntu.com/3835-1/ - https://usn.ubuntu.com/3832-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18356.
CVE ID: CVE-2019-18356 Date Updated: 2024-08-05T01:54:14.072Z Date Published: 2019-10-23T18:38:24 Description: An XSS issue was discovered in Thycotic Secret Server before 10.7 (issue 1 of 2). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://thycotic.force.com/support/s/article/SS-RN-EXT-Secret-Server-10-7-000000-Legacy-Release-Notes No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0232.
CVE ID: CVE-2008-0232 Date Updated: 2024-08-07T07:39:35.055Z Date Published: 2008-01-11T00:00:00 Description: Multiple SQL injection vulnerabilities in Zero CMS 1.0 Alpha allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to index.php, or the (2) f or t parameters to forums/index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/27186 - http://packetstormsecurity.org/0801-exploits/zerocms-sql.txt - https://www.exploit-db.com/exploits/4864 - https://exchange.xforce.ibmcloud.com/vulnerabilities/39530 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14712.
CVE ID: CVE-2018-14712 Date Updated: 2024-08-05T09:38:13.221Z Date Published: 2019-05-13T12:21:11 Description: Buffer overflow in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to inject system commands via the "hook" URL parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.securityevaluators.com/asus-routers-overflow-with-vulnerabilities-b111bc1c8eb8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27198.
CVE ID: CVE-2021-27198 Date Updated: 2024-08-03T20:40:47.480Z Date Published: 2021-02-26T22:53:27 Description: An issue was discovered in Visualware MyConnection Server before v11.1a. Unauthenticated Remote Code Execution can occur via Arbitrary File Upload in the web service when using a myspeed/sf?filename= URI. This application is written in Java and is thus cross-platform. The Windows installation runs as SYSTEM, which means that exploitation gives one Administrator privileges on the target system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://myconnectionserver.visualware.com/download.html - https://myconnectionserver.visualware.com/support/newrelease.html - http://seclists.org/fulldisclosure/2021/Feb/81 - http://packetstormsecurity.com/files/161571/VisualWare-MyConnection-Server-11.x-Remote-Code-Execution.html - https://www.securifera.com/advisories/cve-2021-27198/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27631.
CVE ID: CVE-2020-27631 Date Updated: 2024-09-19T15:28:15.213Z Date Published: 2023-10-10T00:00:00 Description: In Oryx CycloneTCP 1.9.6, TCP ISNs are improperly random. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.forescout.com - https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01 - https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2046.
CVE ID: CVE-2018-2046 Date Updated: 2019-01-22T17:57:02 Date Published: 2019-01-22T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4661.
CVE ID: CVE-2022-4661 Date Updated: 2024-08-03T01:48:38.951Z Date Published: 2023-03-13T16:03:34.749Z Description: The Widgets for WooCommerce Products on Elementor WordPress plugin before 1.0.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/b95956c9-40e5-47aa-86f6-e2da61b3c19f No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-8588.
CVE ID: CVE-2017-8588 Date Updated: 2024-09-16T20:01:25.406Z Date Published: 2017-07-11T21:00:00Z Description: Microsoft WordPad in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability due to the way it parses specially crafted files, aka "WordPad Remote Code Execution Vulnerability". No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1038857 - http://www.securityfocus.com/bid/99400 - https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8588 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17569.
CVE ID: CVE-2017-17569 Date Updated: 2024-08-05T20:51:32.328Z Date Published: 2017-12-13T09:00:00 Description: Scubez Posty Readymade Classifieds has XSS via the admin/user_activate_submit.php ID parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Readymade%20Classifieds%20Script.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16461.
CVE ID: CVE-2017-16461 Date Updated: 2019-03-05T19:57:01 Date Published: 2019-03-05T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-42326.
CVE ID: CVE-2022-42326 Date Updated: 2024-08-03T13:03:45.899Z Date Published: 2022-11-01T00:00:00 Description: Xenstore: Guests can create arbitrary number of nodes via transactions T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] In case a node has been created in a transaction and it is later deleted in the same transaction, the transaction will be terminated with an error. As this error is encountered only when handling the deleted node at transaction finalization, the transaction will have been performed partially and without updating the accounting information. This will enable a malicious guest to create arbitrary number of nodes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://xenbits.xenproject.org/xsa/advisory-421.txt - http://xenbits.xen.org/xsa/advisory-421.html - http://www.openwall.com/lists/oss-security/2022/11/01/11 - https://www.debian.org/security/2022/dsa-5272 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/ - https://security.gentoo.org/glsa/202402-07 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6509.
CVE ID: CVE-2023-6509 Date Updated: 2024-08-02T08:35:13.199Z Date Published: 2023-12-06T01:19:19.993Z Description: Use after free in Side Panel Search in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: High) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html - https://crbug.com/1494565 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/ - https://www.debian.org/security/2023/dsa-5573 - https://security.gentoo.org/glsa/202401-34 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31092.
CVE ID: CVE-2021-31092 Date Updated: 2021-08-24T18:53:06 Date Published: 2021-08-24T18:53:06 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8372.
CVE ID: CVE-2019-8372 Date Updated: 2024-08-04T21:17:31.274Z Date Published: 2019-02-18T15:00:00 Description: The LHA.sys driver before 1.1.1811.2101 in LG Device Manager exposes functionality that allows low-privileged users to read and write arbitrary physical memory via specially crafted IOCTL requests and elevate system privileges. This occurs because the device object has an associated symbolic link and an open DACL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://twitter.com/Jackson_T/status/1097353402034475009 - http://www.jackson-t.ca/lg-driver-lpe.html - https://lgsecurity.lge.com/security_updates.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0387.
CVE ID: CVE-2014-0387 Date Updated: 2024-08-06T09:13:10.650Z Date Published: 2014-01-15T01:33:00 Description: Unspecified vulnerability in Oracle Java SE 6u65 and Java SE 7u45, when running on Firefox, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2014:0414 - http://marc.info/?l=bugtraq&m=139402749111889&w=2 - http://www.securityfocus.com/bid/64882 - http://rhn.redhat.com/errata/RHSA-2014-0135.html - http://osvdb.org/102002 - http://secunia.com/advisories/56535 - http://rhn.redhat.com/errata/RHSA-2014-0030.html - http://secunia.com/advisories/56485 - http://marc.info/?l=bugtraq&m=139402697611681&w=2 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 - http://marc.info/?l=bugtraq&m=139402697611681&w=2 - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html - http://marc.info/?l=bugtraq&m=139402749111889&w=2 - http://www.securitytracker.com/id/1029608 - http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html - http://www.securityfocus.com/bid/64758 - http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html - http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html - http://rhn.redhat.com/errata/RHSA-2014-0134.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6996.
CVE ID: CVE-2018-6996 Date Updated: 2019-01-17T16:57:01 Date Published: 2019-01-17T17:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-9953.
CVE ID: CVE-2018-9953 Date Updated: 2024-08-05T07:24:56.350Z Date Published: 2018-05-17T15:00:00 Description: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA resolveNodes method of Button elements. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5528. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://zerodayinitiative.com/advisories/ZDI-18-337 - https://www.foxitsoftware.com/support/security-bulletins.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5788.
CVE ID: CVE-2015-5788 Date Updated: 2024-08-06T06:59:04.361Z Date Published: 2015-09-18T10:00:00 Description: The WebKit Canvas implementation in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain sensitive image information via vectors involving a CANVAS element. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1033609 - https://support.apple.com/HT205212 - http://www.securityfocus.com/bid/76766 - https://support.apple.com/HT205265 - http://lists.apple.com/archives/security-announce/2015/Sep/msg00007.html - http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html - http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html - http://www.ubuntu.com/usn/USN-2937-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10270.
CVE ID: CVE-2017-10270 Date Updated: 2024-08-05T17:33:17.004Z Date Published: 2017-10-19T17:00:00 Description: Vulnerability in the Oracle Identity Manager Connector component of Oracle Fusion Middleware (subcomponent: Microsoft Active Directory). The supported version that is affected is 9.1.1.5.0. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Identity Manager Connector executes to compromise Oracle Identity Manager Connector. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Identity Manager Connector, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Identity Manager Connector accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Identity Manager Connector. CVSS 3.0 Base Score 8.2 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/101313 - http://www.securitytracker.com/id/1039602 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0913.
CVE ID: CVE-2008-0913 Date Updated: 2024-09-16T19:36:25.822Z Date Published: 2008-02-22T23:00:00Z Description: Cross-site scripting (XSS) vulnerability in Invision Power Board (IPB or IP.Board) 2.3.4 allows remote attackers to inject arbitrary web script or HTML via crafted BBCodes in an unspecified context. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/29055 - http://forums.invisionpower.com/index.php?showtopic=269961 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5001.
CVE ID: CVE-2012-5001 Date Updated: 2024-08-06T20:50:18.299Z Date Published: 2012-09-19T19:00:00 Description: Multiple unspecified vulnerabilities in Hitachi JP1/Cm2/Network Node Manager i before 09-50-03 allow remote attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/52205 - http://osvdb.org/79686 - https://exchange.xforce.ibmcloud.com/vulnerabilities/73545 - http://secunia.com/advisories/48201 - http://osvdb.org/79685 - http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-009/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1075.
CVE ID: CVE-2009-1075 Date Updated: 2024-09-17T03:28:35.745Z Date Published: 2009-03-25T15:00:00Z Description: Sun Java System Identity Manager (IdM) 7.0 through 8.0 responds differently to failed use of the Forgot Password feature depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://sunsolve.sun.com/search/document.do?assetkey=1-21-140936-01-1 - http://sunsolve.sun.com/search/document.do?assetkey=1-66-253267-1 - http://securitytracker.com/id?1021881 - http://www.securityfocus.com/bid/34191 - http://blogs.sun.com/security/entry/sun_alert_253267_sun_java - http://www.vupen.com/english/advisories/2009/0797 - http://secunia.com/advisories/34380 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14946.
CVE ID: CVE-2017-14946 Date Updated: 2024-09-16T18:38:44.702Z Date Published: 2017-09-29T20:00:00Z Description: Artifex GSView 6.0 Beta on Windows allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at mupdfnet64!mIncrementalSaveFile+0x000000000000344e." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.ghostscript.com/show_bug.cgi?id=698538 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-48118.
CVE ID: CVE-2022-48118 Date Updated: 2024-08-03T15:02:36.665Z Date Published: 2023-01-27T00:00:00 Description: Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Acronym parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/bbalet/jorani/issues/379 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33498.
CVE ID: CVE-2023-33498 Date Updated: 2024-08-02T15:47:05.205Z Date Published: 2023-06-07T00:00:00 Description: alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/YUyuanAN-com/loophole No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18868.
CVE ID: CVE-2019-18868 Date Updated: 2024-08-05T02:02:39.876Z Date Published: 2020-05-07T12:57:47 Description: Blaauw Remote Kiln Control through v3.00r4 allows an unauthenticated attacker to access MySQL credentials in cleartext in /engine/db.inc, /lang/nl.bak, or /lang/en.bak. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lodestonesecurity.com - https://github.com/lodestone-security/CVEs/blob/master/remote_kiln_control/an_unfortunate_kilnundrum.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-25630.
CVE ID: CVE-2020-25630 Date Updated: 2024-08-04T15:40:35.471Z Date Published: 2020-12-08T00:13:36 Description: A vulnerability was found in Moodle where the decompressed size of zip files was not checked against available user quota before unzipping them, which could lead to a denial of service risk. This affects versions 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://moodle.org/mod/forum/discuss.php?d=410842 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4205.
CVE ID: CVE-2018-4205 Date Updated: 2024-08-05T05:04:29.974Z Date Published: 2018-06-08T18:00:00 Description: An issue was discovered in certain Apple products. Safari before 11.1.1 is affected. The issue involves the "Safari" component. It allows remote attackers to spoof the address bar via a crafted web site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT208854 - http://www.securitytracker.com/id/1041029 - http://www.securityfocus.com/bid/104358 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10257.
CVE ID: CVE-2016-10257 Date Updated: 2024-09-16T18:39:51.797Z Date Published: 2018-01-10T02:00:00Z Description: The Symantec Advanced Secure Gateway (ASG) 6.6, ASG 6.7 (prior to 6.7.2.1), ProxySG 6.5 (prior to 6.5.10.6), ProxySG 6.6, and ProxySG 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10256. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1040138 - https://www.symantec.com/security-center/network-protection-security-advisories/SA155 - http://www.securityfocus.com/bid/102447 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-51842.
CVE ID: CVE-2023-51842 Date Updated: 2024-08-02T22:48:12.069Z Date Published: 2024-01-29T00:00:00 Description: An algorithm-downgrade issue was discovered in Ylianst MeshCentral 1.1.16. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tianjk99/Cryptographic-Misuses/blob/main/Bug_MeshCentral.md - https://github.com/Ylianst/MeshCentral/tree/master - https://github.com/tianjk99/Cryptographic-Misuses/blob/main/CVE-2023-51842.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1866.
CVE ID: CVE-2022-1866 Date Updated: 2024-08-03T00:17:00.937Z Date Published: 2022-07-27T21:18:36 Description: Use after free in Tablet Mode in Google Chrome on Chrome OS prior to 102.0.5005.61 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific user interactions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2022/05/stable-channel-update-for-desktop_24.html - https://crbug.com/1292264 - https://security.gentoo.org/glsa/202208-25 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39347.
CVE ID: CVE-2021-39347 Date Updated: 2024-09-17T03:55:07.950Z Date Published: 2021-10-04T17:21:49.430265Z Description: The Stripe for WooCommerce WordPress plugin is missing a capability check on the save() function found in the ~/includes/admin/class-wc-stripe-admin-user-edit.php file that makes it possible for attackers to configure their account to use other site users unique STRIPE identifier and make purchases with their payment accounts. This affects versions 3.0.0 - 3.3.9. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347 - https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0061.
CVE ID: CVE-2008-0061 Date Updated: 2024-08-07T07:32:23.897Z Date Published: 2008-01-03T22:00:00 Description: MaraDNS 1.0 before 1.0.41, 1.2 before 1.2.12.08, and 1.3 before 1.3.07.04 allows remote attackers to cause a denial of service via a crafted DNS packet that prevents an authoritative name (CNAME) record from resolving, aka "improper rotation of resource records." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2008/0026 - http://secunia.com/advisories/28334 - http://secunia.com/advisories/28329 - http://secunia.com/advisories/28650 - http://security.gentoo.org/glsa/glsa-200801-16.xml - http://bugs.gentoo.org/show_bug.cgi?id=204351 - http://www.debian.org/security/2008/dsa-1445 - http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html - http://www.maradns.org/changelog.html - http://www.securityfocus.com/bid/27124 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26832.
CVE ID: CVE-2022-26832 Date Updated: 2024-08-03T05:11:45.110Z Date Published: 2022-04-15T19:05:27 Description: .NET Framework Denial of Service Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26832 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3075.
CVE ID: CVE-2023-3075 Date Updated: 2024-08-02T06:41:04.137Z Date Published: 2023-06-02T00:00:00 Description: Cross-Site Request Forgery (CSRF) in GitHub repository tsolucio/corebos prior to 8. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/0f5448a6-d551-424f-887d-80f9bcfaa6e4 - https://github.com/tsolucio/corebos/commit/2e415fb4613bc4122578dad5f40c6f819c228a48 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-34834.
CVE ID: CVE-2021-34834 Date Updated: 2024-08-04T00:26:54.111Z Date Published: 2021-08-04T15:16:17 Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14014. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.foxit.com/support/security-bulletins.html - https://www.zerodayinitiative.com/advisories/ZDI-21-916/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0763.
CVE ID: CVE-2019-0763 Date Updated: 2024-08-04T17:58:59.539Z Date Published: 2019-04-09T01:46:34 Description: A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0763 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2970.
CVE ID: CVE-2023-2970 Date Updated: 2024-08-02T06:41:04.195Z Date Published: 2023-05-30T05:31:03.695Z Description: A vulnerability classified as problematic was found in MindSpore 2.0.0-alpha/2.0.0-rc1. This vulnerability affects the function JsonHelper::UpdateArray of the file mindspore/ccsrc/minddata/dataset/util/json_helper.cc. The manipulation leads to memory corruption. The name of the patch is 30f4729ea2c01e1ed437ba92a81e2fc098d608a9. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-230176. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.230176 - https://vuldb.com/?ctiid.230176 - https://gitee.com/mindspore/mindspore/issues/I73DOS - https://gitee.com/mindspore/mindspore/commit/30f4729ea2c01e1ed437ba92a81e2fc098d608a9 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-3014.
CVE ID: CVE-2021-3014 Date Updated: 2024-08-03T16:45:50.651Z Date Published: 2021-01-04T18:38:07 Description: In MikroTik RouterOS through 2021-01-04, the hotspot login page is vulnerable to reflected XSS via the target parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://m4dm0e.github.io/2021/01/04/mikrotik-xss-reflected.html - https://github.com/M4DM0e/m4dm0e.github.io/blob/gh-pages/_posts/2021-01-04-mikrotik-xss-reflected.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38107.
CVE ID: CVE-2024-38107 Date Updated: 2024-09-19T21:52:45.201Z Date Published: 2024-08-13T17:30:00.367Z Description: Windows Power Dependency Coordinator Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-33803.
CVE ID: CVE-2024-33803 Date Updated: 2024-08-19T14:52:21.975Z Date Published: N/A Description: A SQL injection vulnerability in /model/get_exam.php in campcodes Complete Web-Based School Management System 1.0 allows an attacker to execute arbitrary SQL commands via the id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2011.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32209.
CVE ID: CVE-2023-32209 Date Updated: 2024-08-02T15:10:24.225Z Date Published: 2023-06-19T09:36:11.768Z Description: A maliciously crafted favicon could have led to an out of memory crash. This vulnerability affects Firefox < 113. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1767194 - https://www.mozilla.org/security/advisories/mfsa2023-16/ - https://security.gentoo.org/glsa/202401-10 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0819.
CVE ID: CVE-2011-0819 Date Updated: 2024-08-06T22:05:54.549Z Date Published: 2011-04-20T10:00:00 Description: Unspecified vulnerability in Oracle JD Edwards EnterpriseOne Tools 8.9 GA through 8.98.4.1 and OneWorld Tools through 24.1.3 allows remote attackers to affect integrity, related to Enterprise Infrastructure SEC, a different vulnerability than CVE-2011-0823. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28586.
CVE ID: CVE-2023-28586 Date Updated: 2024-08-02T13:43:23.639Z Date Published: 2023-12-05T03:03:55.223Z Description: Information disclosure when the trusted application metadata symbol addresses are accessed while loading an ELF in TEE. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-28210.
CVE ID: CVE-2021-28210 Date Updated: 2024-08-03T21:40:12.971Z Date Published: 2021-06-11T15:11:23 Description: An unlimited recursion in DxeCore in EDK II. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.tianocore.org/show_bug.cgi?id=1743 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4111.
CVE ID: CVE-2013-4111 Date Updated: 2024-08-06T16:30:49.915Z Date Published: 2013-08-28T17:00:00 Description: The Python client library for Glance (python-glanceclient) before 0.10.0 does not properly check the preverify_ok value, which prevents the server hostname from being verified with a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate and allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/54525 - http://secunia.com/advisories/54313 - http://www.ubuntu.com/usn/USN-2004-1 - http://rhn.redhat.com/errata/RHSA-2013-1200.html - https://bugs.launchpad.net/ossa/+bug/1192229 - http://lists.opensuse.org/opensuse-updates/2013-08/msg00019.html - https://github.com/openstack/python-glanceclient/blob/master/doc/source/index.rst No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-14926.
CVE ID: CVE-2020-14926 Date Updated: 2024-08-04T13:00:52.108Z Date Published: 2020-06-19T17:03:03 Description: CMS Made Simple 2.2.14 allows XSS via a Search Term to the admin/moduleinterface.php?mact=ModuleManager page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://dev.cmsmadesimple.org/bug/view/12324 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20702.
CVE ID: CVE-2021-20702 Date Updated: 2024-08-03T17:45:45.531Z Date Published: 2021-11-02T23:30:03 Description: Buffer overflow vulnerability in the Transaction Server CLUSTERPRO X 4.3 for Windows and earlier, EXPRESSCLUSTER X 4.3 for Windows and earlier, CLUSTERPRO X 4.3 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 4.3 SingleServerSafe for Windows and earlier allows attacker to remote code execution via a network. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jpn.nec.com/security-info/secinfo/nv21-015_en.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8715.
CVE ID: CVE-2016-8715 Date Updated: 2024-08-06T02:27:41.248Z Date Published: 2017-02-28T15:00:00 Description: An exploitable heap corruption vulnerability exists in the loadTrailer functionality of Iceni Argus version 6.6.05. A specially crafted PDF file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide a malicious PDF file to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/96470 - http://www.talosintelligence.com/reports/TALOS-2016-0228/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5755.
CVE ID: CVE-2016-5755 Date Updated: 2024-08-06T01:15:09.052Z Date Published: 2017-03-23T06:36:00 Description: NetIQ Access Manager 4.1 before 4.1.2 Hot Fix 1 and 4.2 before 4.2.2 was vulnerable to clickjacking attacks due to a missing SAMEORIGIN filter in the "high encryption" setting. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.novell.com/support/kb/doc.php?id=7017812 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-9610.
CVE ID: CVE-2017-9610 Date Updated: 2024-08-05T17:11:02.326Z Date Published: 2017-07-26T19:00:00 Description: The xps_load_sfnt_name function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.ghostscript.com/show_bug.cgi?id=698025 - https://security.gentoo.org/glsa/201811-12 - http://www.securityfocus.com/bid/99976 - http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=d2ab84732936b6e7e5a461dc94344902965e9a06 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1024.
CVE ID: CVE-2024-1024 Date Updated: 2024-08-01T18:26:30.454Z Date Published: 2024-01-30T00:31:05.431Z Description: A vulnerability has been found in SourceCodester Facebook News Feed Like 1.0 and classified as problematic. This vulnerability affects unknown code of the component New Account Handler. The manipulation of the argument First Name/Last Name with the input <script>alert(1)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252292. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.252292 - https://vuldb.com/?ctiid.252292 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6165.
CVE ID: CVE-2018-6165 Date Updated: 2024-08-05T05:54:53.144Z Date Published: 2019-01-09T19:00:00 Description: Incorrect handling of reloads in Navigation in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html - https://crbug.com/847718 - https://access.redhat.com/errata/RHSA-2018:2282 - https://security.gentoo.org/glsa/201808-01 - https://www.debian.org/security/2018/dsa-4256 - http://www.securityfocus.com/bid/104887 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35426.
CVE ID: CVE-2022-35426 Date Updated: 2024-08-03T09:36:44.288Z Date Published: 2022-08-09T16:19:31 Description: UCMS 1.6 is vulnerable to arbitrary file upload via ucms/sadmin/file PHP file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/cc-225/ucms_v1.6/issues/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6470.
CVE ID: CVE-2015-6470 Date Updated: 2024-08-06T07:22:21.679Z Date Published: 2015-09-25T01:00:00 Description: Resource Data Management Data Manager before 2.2 allows remote authenticated users to modify arbitrary passwords via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-15-265-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-45996.
CVE ID: CVE-2023-45996 Date Updated: 2024-09-05T19:11:48.226Z Date Published: 2023-10-31T00:00:00 Description: SQL injection vulnerability in Senayan Library Management Systems Slims v.9 and Bulian v.9.6.1 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted script to the reborrowLimit parameter in the member_type.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-member_type.md - https://github.com/slims/slims9_bulian/issues/216 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28551.
CVE ID: CVE-2024-28551 Date Updated: 2024-08-05T20:04:30.158Z Date Published: 2024-03-26T00:00:00 Description: Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the ssid parameter of form_fast_setting_wifi_set function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2736.
CVE ID: CVE-2013-2736 Date Updated: 2024-08-06T15:44:33.529Z Date Published: 2013-05-16T10:00:00 Description: Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.adobe.com/support/security/bulletins/apsb13-15.html - http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html - http://rhn.redhat.com/errata/RHSA-2013-0826.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15880 - http://security.gentoo.org/glsa/glsa-201308-03.xml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15128.
CVE ID: CVE-2017-15128 Date Updated: 2024-08-05T19:50:16.308Z Date Published: 2018-01-14T06:00:00 Description: A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13.12. A lack of size check could cause a denial of service (BUG). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.12 - https://access.redhat.com/security/cve/CVE-2017-15128 - https://bugzilla.redhat.com/show_bug.cgi?id=1525222 - https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e3921471354244f70fe268586ff94a97a6dd4df No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30512.
CVE ID: CVE-2021-30512 Date Updated: 2024-08-03T22:32:41.119Z Date Published: 2021-06-04T17:15:36 Description: Use after free in Notifications in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop.html - https://crbug.com/1200019 - https://security.gentoo.org/glsa/202107-06 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28750.
CVE ID: CVE-2024-28750 Date Updated: 2024-08-02T00:56:58.039Z Date Published: 2024-07-09T07:10:57.362Z Description: A remote attacker with high privileges may use a deleting file function to inject OS commands. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert.vde.com/en/advisories/VDE-2024-012 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-17233.
CVE ID: CVE-2019-17233 Date Updated: 2024-08-05T01:33:17.260Z Date Published: 2019-10-07T22:11:20 Description: Functions/EWD_UFAQ_Import.php in the ultimate-faqs plugin through 1.8.24 for WordPress allows HTML content injection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/ultimate-faqs/#developers - https://wpvulndb.com/vulnerabilities/9883 - https://blog.nintechnet.com/unauthenticated-options-import-vulnerability-in-wordpress-ultimate-faq-plugin/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2375.
CVE ID: CVE-2015-2375 Date Updated: 2024-08-06T05:10:16.452Z Date Published: 2015-07-14T21:00:00 Description: Microsoft Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel Viewer 2007 SP3, Excel Services on SharePoint Server 2010 SP2, and Excel Services on SharePoint Server 2013 SP1 allow remote attackers to bypass the ASLR protection mechanism via a crafted spreadsheet, aka "Microsoft Excel ASLR Bypass Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1032899 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-070 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27267.
CVE ID: CVE-2023-27267 Date Updated: 2024-08-02T12:09:42.300Z Date Published: 2023-04-11T02:36:15.882Z Description: Due to missing authentication and insufficient input validation, the OSCommand Bridge of SAP Diagnostics Agent - version 720, allows an attacker with deep knowledge of the system to execute scripts on all connected Diagnostics Agents. On successful exploitation, the attacker can completely compromise confidentiality, integrity and availability of the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.support.sap.com/#/notes/3305369 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36317.
CVE ID: CVE-2022-36317 Date Updated: 2024-08-03T10:00:04.341Z Date Published: 2022-12-22T00:00:00 Description: When visiting a website with an overly long URL, the user interface would start to hang. Due to session restore, this could lead to a permanent Denial of Service.<br>*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 103. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2022-28/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1759951 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40623.
CVE ID: CVE-2022-40623 Date Updated: 2024-09-17T04:25:38.938Z Date Published: 2022-09-13T20:35:13.734432Z Description: The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 does not utilize anti-CSRF tokens, which, when combined with other issues (such as CVE-2022-35518), can lead to remote, unauthenticated command execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://youtu.be/cSileV8YbsQ?t=1028 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6154.
CVE ID: CVE-2008-6154 Date Updated: 2024-08-07T11:20:25.319Z Date Published: 2009-02-16T18:00:00 Description: SQL injection vulnerability in index.php in Hispah Text Links Ads 1.1 allows remote attackers to execute arbitrary SQL commands via the idcat parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/45767 - https://www.exploit-db.com/exploits/6701 - http://secunia.com/advisories/32162 - http://www.securityfocus.com/bid/31649 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1546.015 : Component Object Model Hijacking
Name: Component Object Model Hijacking ID: T1546.015 URL: https://attack.mitre.org/techniques/T1546/015 Platforms: Windows Kill Chain Phases: Privilege Escalation, Persistence Description: Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects. COM is a system within Windows to enable interaction between software components through the operating system.(Citation: Microsoft Component Object Model) References to various COM objects are stored in the Registry. Adversaries can use the COM system to insert malicious code that can be executed in place of legitimate software through hijacking the COM references and relationships as a means for persistence. Hijacking a COM object requires a change in the Registry to replace a reference to a legitimate system component which may cause that component to not work when executed. When that system component is executed through normal system operation the adversary's code will be executed instead.(Citation: GDATA COM Hijacking) An adversary is likely to hijack objects that are used frequently enough to maintain a consistent level of persistence, but are unlikely to break noticeable functionality within the system as to avoid system instability that could lead to detection. Data Sources: Process: Process Creation, Module: Module Load, Windows Registry: Windows Registry Key Modification, Command: Command Execution Detection: There are opportunities to detect COM hijacking by searching for Registry references that have been replaced and through Registry operations (ex: [Reg](S0075)) replacing known binary paths with unknown paths or otherwise malicious content. Even though some third-party applications define user COM objects, the presence of objects within HKEY_CURRENT_USER\Software\Classes\CLSID\ may be anomalous and should be investigated since user objects will be loaded prior to machine objects in HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\.(Citation: Elastic COM Hijacking) Registry entries for existing COM objects may change infrequently. When an entry with a known good path and binary is replaced or changed to an unusual value to point to an unknown binary in a new location, then it may indicate suspicious behavior and should be investigated. Likewise, if software DLL loads are collected and analyzed, any unusual DLL load that can be correlated with a COM object Registry modification may indicate COM hijacking has been performed.
Provide detailed information about CVE-2024-45190.
CVE ID: CVE-2024-45190 Date Updated: 2024-08-23T19:39:16.206Z Date Published: 2024-08-23T19:16:17.818Z Description: Mage AI allows remote users with the "Viewer" role to leak arbitrary files from the Mage server due to a path traversal in the "Pipeline Interaction" request No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://research.jfrog.com/vulnerabilities/mage-ai-pipeline-interaction-request-remote-arbitrary-file-leak-jfsa-2024-001039605/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8831.
CVE ID: CVE-2018-8831 Date Updated: 2024-08-05T07:02:26.128Z Date Published: 2018-04-18T17:00:00 Description: A Persistent XSS vulnerability exists in Kodi (formerly XBMC) through 17.6 that allows the execution of arbitrary HTML/script code in the context of the victim user's browser via a playlist. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2018/Apr/36 - https://www.exploit-db.com/exploits/44487/ - https://trac.kodi.tv/ticket/17814 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1795.
CVE ID: CVE-2008-1795 Date Updated: 2024-08-07T08:32:01.287Z Date Published: 2008-04-15T17:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Blackboard Academic Suite 7.x and earlier, and possibly some 8.0 versions, allow remote attackers to inject arbitrary web script or HTML via (1) the searchText parameter in a Course action to webapps/blackboard/execute/viewCatalog or (2) the data__announcements___pk1_pk2__subject parameter in an ADD action to bin/common/announcement.pl. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.scribd.com/doc/2363025/Hacking-Blackboard-Academic-Suite - http://www.securitytracker.com/id?1019710 - http://securityreason.com/securityalert/3810 - http://secskill.wordpress.com/2008/03/27/hacking-blackboard-academic-suite-2/ - http://secunia.com/advisories/29543 - http://www.securityfocus.com/archive/1/490096/100/0/threaded - http://www.securityfocus.com/bid/28455 - https://exchange.xforce.ibmcloud.com/vulnerabilities/41478 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1408.
CVE ID: CVE-2023-1408 Date Updated: 2024-08-02T05:49:11.696Z Date Published: 2023-05-08T13:58:21.683Z Description: The Video List Manager WordPress plugin through 1.7 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/baf7ef4d-b2ba-48e0-9c17-74fa27e0c15b No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21487.
CVE ID: CVE-2023-21487 Date Updated: 2024-08-02T09:36:34.467Z Date Published: 2023-05-04T00:00:00 Description: Improper access control vulnerability in Telephony framework prior to SMR May-2023 Release 1 allows local attackers to change a call setting. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=05 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4968.
CVE ID: CVE-2012-4968 Date Updated: 2024-09-16T19:11:05.166Z Date Published: 2012-09-17T17:00:00Z Description: Multiple cross-site scripting (XSS) vulnerabilities in SilverStripe 2.3.x before 2.3.13 and 2.4.x before 2.4.7 allow remote attackers to inject arbitrary web script or HTML via (1) a crafted string to the AbsoluteLinks, (2) BigSummary, (3) ContextSummary, (4) EscapeXML, (5) FirstParagraph, (6) FirstSentence, (7) Initial, (8) LimitCharacters, (9) LimitSentences, (10) LimitWordCount, (11) LimitWordCountXML, (12) Lower, (13) LowerCase, (14) NoHTML, (15) Summary, (16) Upper, (17) UpperCase, or (18) URL method in a template, different vectors than CVE-2012-0976. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://doc.silverstripe.org/framework/en/trunk/changelogs/2.4.7 - http://www.openwall.com/lists/oss-security/2012/04/30/1 - http://www.openwall.com/lists/oss-security/2012/04/30/3 - http://doc.silverstripe.org/framework/en/trunk/changelogs/2.3.13 - https://github.com/silverstripe/sapphire/commit/0085876 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-25908.
CVE ID: CVE-2021-25908 Date Updated: 2024-08-03T20:11:28.526Z Date Published: 2021-01-22T09:02:02 Description: An issue was discovered in the fil-ocl crate through 2021-01-04 for Rust. From<EventList> can lead to a double free. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://rustsec.org/advisories/RUSTSEC-2021-0011.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0327.
CVE ID: CVE-2015-0327 Date Updated: 2024-08-06T04:03:11.041Z Date Published: 2015-02-06T00:00:00 Description: Heap-based buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0323. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://security.gentoo.org/glsa/glsa-201502-02.xml - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html - http://secunia.com/advisories/62895 - http://www.securitytracker.com/id/1031706 - http://secunia.com/advisories/62886 - https://technet.microsoft.com/library/security/2755801 - http://secunia.com/advisories/62777 - https://exchange.xforce.ibmcloud.com/vulnerabilities/100709 - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html - http://www.securityfocus.com/bid/72514 - https://helpx.adobe.com/security/products/flash-player/apsb15-04.html - http://rhn.redhat.com/errata/RHSA-2015-0140.html - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34404.
CVE ID: CVE-2024-34404 Date Updated: 2024-08-02T02:51:11.440Z Date Published: 2024-05-03T00:00:00 Description: A vulnerability was discovered in the Alta Recovery Vault feature of Veritas NetBackup before 10.4 and NetBackup Appliance before 5.4. By design, only the cloud administrator should be able to disable the retention lock of Governance mode images. This vulnerability allowed a NetBackup administrator to modify the expiration of backups under Governance mode (which could cause premature deletion). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.veritas.com/support/en_US/security/VTS24-004 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3474.
CVE ID: CVE-2014-3474 Date Updated: 2024-08-06T10:43:06.349Z Date Published: 2014-10-31T15:00:00 Description: Cross-site scripting (XSS) vulnerability in horizon/static/horizon/js/horizon.instances.js in the Launch Instance menu in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to inject arbitrary web script or HTML via a network name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2014/07/08/6 - http://www.securityfocus.com/bid/68460 - https://review.openstack.org/#/c/105477 - https://bugs.launchpad.net/horizon/+bug/1322197 - http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40808.
CVE ID: CVE-2022-40808 Date Updated: 2024-08-03T12:28:42.932Z Date Published: 2022-09-19T15:00:22 Description: The d8s-dates for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pypi.org/project/democritus-hypothesis/ - https://github.com/democritus-project/d8s-dates/issues/26 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1889.
CVE ID: CVE-2020-1889 Date Updated: 2024-08-04T06:53:59.559Z Date Published: 2020-09-03T21:10:18 Description: A security feature bypass issue in WhatsApp Desktop versions prior to v0.3.4932 could have allowed for sandbox escape in Electron and escalation of privilege if combined with a remote code execution vulnerability inside the sandboxed renderer process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.whatsapp.com/security/advisories/2020/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3410.
CVE ID: CVE-2010-3410 Date Updated: 2010-09-28T09:00:00 Date Published: 2010-09-16T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5661.
CVE ID: CVE-2016-5661 Date Updated: 2024-08-06T01:07:59.955Z Date Published: 2016-07-15T18:00:00 Description: Accela Civic Platform Citizen Access portal relies on the client to restrict file types for uploads, which allows remote authenticated users to execute arbitrary code via modified _EventArgument and filename parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/665280 - http://www.securityfocus.com/bid/91765 - http://www.kb.cert.org/vuls/id/JLAD-ABMPVA No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4295.
CVE ID: CVE-2022-4295 Date Updated: 2024-08-03T01:34:50.095Z Date Published: 2023-01-16T15:38:09.605Z Description: The Show All Comments WordPress plugin before 7.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a logged in high privilege users such as admin. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/4ced1a4d-0c1f-42ad-8473-241c68b92b56 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24219.
CVE ID: CVE-2022-24219 Date Updated: 2024-08-03T04:07:01.560Z Date Published: 2022-02-01T18:36:53 Description: eliteCMS v1.0 was discovered to contain a SQL injection vulnerability via /admin/edit_page.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jsjbcyber/bug_report/blob/main/bug_c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2583.
CVE ID: CVE-2023-2583 Date Updated: 2024-08-02T06:26:09.846Z Date Published: 2023-05-08T00:00:00 Description: Code Injection in GitHub repository jsreport/jsreport prior to 3.11.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/397ea68d-1e28-44ff-b830-c8883d067d96 - https://github.com/jsreport/jsreport/commit/afaff3804b34b38e959f5ae65f9e672088de13d7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-35059.
CVE ID: CVE-2021-35059 Date Updated: 2024-08-04T00:33:50.606Z Date Published: 2021-10-11T08:19:54 Description: OpenWay WAY4 ACS before 1.2.278-2693 allows XSS via the /way4acs/enroll action parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.openwaygroup.com/way4-platform - https://gist.github.com/exviry/560fededd1e44b7cced483d8ca8c362e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14464.
CVE ID: CVE-2019-14464 Date Updated: 2024-08-05T00:19:41.212Z Date Published: 2019-07-31T22:40:32 Description: XMFile::read in XMFile.cpp in milkyplay in MilkyTracker 1.02.00 has a heap-based buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/milkytracker/MilkyTracker/issues/184 - https://lists.debian.org/debian-lts-announce/2019/10/msg00029.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HBIIPS2CDMUXJ3CIEPKMEY3D73UZDR3T/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CXYRVXOPO223DAUJHFQCTKQHIZ6XN35P/ - https://lists.debian.org/debian-lts-announce/2020/07/msg00023.html - https://usn.ubuntu.com/4499-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3484.
CVE ID: CVE-2011-3484 Date Updated: 2024-08-06T23:37:47.885Z Date Published: 2011-09-20T10:00:00 Description: The unxorFrame function in epan/dissectors/packet-opensafety.c in the OpenSafety dissector in Wireshark 1.6.x before 1.6.2 does not properly validate a certain frame size, which allows remote attackers to cause a denial of service (loop and application crash) via a malformed packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2011/09/14/10 - http://www.openwall.com/lists/oss-security/2011/09/14/9 - http://www.openwall.com/lists/oss-security/2011/09/14/5 - http://anonsvn.wireshark.org/viewvc?view=revision&revision=38213 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6138 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:138 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15062 - http://www.wireshark.org/security/wnpa-sec-2011-12.html - http://www.openwall.com/lists/oss-security/2011/09/13/1 - https://bugzilla.redhat.com/show_bug.cgi?id=737787 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6802.
CVE ID: CVE-2019-6802 Date Updated: 2024-08-04T20:31:04.297Z Date Published: 2019-01-25T04:00:00 Description: CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP headers and possibly conduct XSS attacks via a %0d%0a in a URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/pypiserver/pypiserver/issues/237 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5924.
CVE ID: CVE-2014-5924 Date Updated: 2024-08-06T12:03:01.119Z Date Published: 2014-09-18T10:00:00 Description: The Monster Makeup (aka com.bearhugmedia.android_monster) application 1.0.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing - http://www.kb.cert.org/vuls/id/775569 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3708.
CVE ID: CVE-2023-3708 Date Updated: 2024-08-02T07:01:57.516Z Date Published: 2023-07-18T02:01:06.298Z Description: Several themes for WordPress by DeoThemes are vulnerable to Reflected Cross-Site Scripting via breadcrumbs in various versions due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/1b8b0f14-f31a-45cd-bb98-0b717059aa80?source=cve - https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=196757%40amela&new=196757%40amela&sfp_email=&sfph_mail= - https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=196756%40arendelle&new=196756%40arendelle&sfp_email=&sfph_mail= - https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=196755%40nokke&new=196755%40nokke&sfp_email=&sfph_mail= - https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=196758%40everse&new=196758%40everse&sfp_email=&sfph_mail= - https://deothemes.com/changelog/medikaid-changelog/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.