instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2019-14906.
CVE ID: CVE-2019-14906 Date Updated: 2024-08-05T00:34:52.554Z Date Published: 2020-01-07T20:05:18 Description: A flaw was found with the RHSA-2019:3950 erratum, where it did not fix the CVE-2019-13616 SDL vulnerability. This issue only affects Red Hat SDL packages, SDL versions through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow flaw while copying an existing surface into a new optimized one, due to a lack of validation while loading a BMP image, is possible. An application that uses SDL to parse untrusted input files may be vulnerable to this flaw, which could allow an attacker to make the application crash or execute code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14906 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1331.
CVE ID: CVE-2019-1331 Date Updated: 2024-08-04T18:13:30.319Z Date Published: 2019-10-10T13:28:41 Description: A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1327. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1331 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18175.
CVE ID: CVE-2017-18175 Date Updated: 2024-09-16T18:38:47.409Z Date Published: 2018-02-12T14:00:00Z Description: Progress Sitefinity 9.1 has XSS via the Content Management Template Configuration (aka Templateconfiguration), as demonstrated by the src attribute of an IMG element. This is fixed in 10.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-progress-sitefinity/index.html - https://packetstormsecurity.com/files/143894/Progress-Sitefinity-9.1-XSS-Session-Management-Open-Redirect.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-17094.
CVE ID: CVE-2018-17094 Date Updated: 2020-02-10T16:41:38 Date Published: 2018-09-16T21:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1284.
CVE ID: CVE-2015-1284 Date Updated: 2024-08-06T04:40:18.677Z Date Published: 2015-07-23T00:00:00 Description: The LocalFrame::isURLAllowed function in core/frame/LocalFrame.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly check for a page's maximum number of frames, which allows remote attackers to cause a denial of service (invalid count value and use-after-free) or possibly have unspecified other impact via crafted JavaScript code that makes many createElement calls for IFRAME elements. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2015-1499.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html - http://www.securitytracker.com/id/1033031 - https://security.gentoo.org/glsa/201603-09 - https://code.google.com/p/chromium/issues/detail?id=493243 - http://www.securityfocus.com/bid/75973 - http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html - http://www.debian.org/security/2015/dsa-3315 - https://src.chromium.org/viewvc/blink?revision=197139&view=revision No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2230.
CVE ID: CVE-2013-2230 Date Updated: 2024-08-06T15:27:41.093Z Date Published: 2013-09-30T21:00:00Z Description: The qemu driver (qemu/qemu_driver.c) in libvirt before 1.1.1 allows remote authenticated users to cause a denial of service (daemon crash) via unspecified vectors involving "multiple events registration." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://libvirt.org/news.html - https://bugzilla.redhat.com/show_bug.cgi?id=981476 - http://www.openwall.com/lists/oss-security/2013/07/10/5 - http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=f38c8185f97720ecae7ef2291fbaa5d6b0209e17 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3969.
CVE ID: CVE-2023-3969 Date Updated: 2024-08-02T07:08:50.715Z Date Published: 2023-07-27T11:31:03.531Z Description: A vulnerability, which was classified as problematic, has been found in GZ Scripts Availability Booking Calendar PHP 1.0. Affected by this issue is some unknown functionality of the file index.php of the component HTTP POST Request Handler. The manipulation of the argument promo_code leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235568. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.235568 - https://vuldb.com/?ctiid.235568 - https://seclists.org/fulldisclosure/2023/Jul/51 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-100004.
CVE ID: CVE-2014-100004 Date Updated: 2024-08-06T14:10:54.900Z Date Published: 2015-01-13T11:00:00 Description: Cross-site scripting (XSS) vulnerability in Sitecore CMS before 7.0 Update-4 (rev. 140120) allows remote attackers to inject arbitrary web script or HTML via the xmlcontrol parameter to the default URI. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/65254 - http://osvdb.org/102660 - http://secunia.com/advisories/56705 - http://sitecorekh.blogspot.dk/2014/01/sitecore-releases-70-update-4-rev-140120.html - http://www.securityfocus.com/archive/1/530901/100/0/threaded - https://exchange.xforce.ibmcloud.com/vulnerabilities/90833 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-29199.
CVE ID: CVE-2023-29199 Date Updated: 2024-08-02T14:00:15.886Z Date Published: 2023-04-14T18:37:03.847Z Description: There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context. A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.16` of `vm2`. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/patriksimek/vm2/security/advisories/GHSA-xj72-wvfv-8985 - https://github.com/patriksimek/vm2/issues/516 - https://github.com/patriksimek/vm2/commit/24c724daa7c09f003e556d7cd1c7a8381cb985d7 - https://gist.github.com/leesh3288/f05730165799bf56d70391f3d9ea187c - https://github.com/patriksimek/vm2/releases/tag/3.9.16 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32923.
CVE ID: CVE-2022-32923 Date Updated: 2024-08-03T07:54:03.325Z Date Published: 2022-11-01T00:00:00 Description: A correctness issue in the JIT was addressed with improved checks. This issue is fixed in tvOS 16.1, iOS 15.7.1 and iPadOS 15.7.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may disclose internal states of the app. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213488 - https://support.apple.com/en-us/HT213489 - https://support.apple.com/en-us/HT213492 - https://support.apple.com/en-us/HT213495 - https://support.apple.com/en-us/HT213491 - https://support.apple.com/en-us/HT213490 - http://www.openwall.com/lists/oss-security/2022/11/04/4 - https://security.gentoo.org/glsa/202305-32 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27708.
CVE ID: CVE-2020-27708 Date Updated: 2024-08-04T16:18:45.679Z Date Published: 2020-10-30T16:23:56 Description: A vulnerability exists in the Origin Client that could allow a non-Administrative user to elevate their access to either Administrator or System. Once the user has obtained elevated access, they may be able to take control of the system and perform actions otherwise reserved for high privileged users or system Administrators. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ea.com/security/news/easec-2020-002-elevation-of-privilege-vulnerability-in-origin-client No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24755.
CVE ID: CVE-2022-24755 Date Updated: 2024-08-03T04:20:50.122Z Date Published: 2022-03-15T14:35:13 Description: Bareos is open source software for backup, archiving, and recovery of data for operating systems. When Bareos Director >= 18.2 >= 18.2 but prior to 21.1.0, 20.0.6, and 19.2.12 is built and configured for PAM authentication, it will skip authorization checks completely. Expired accounts and accounts with expired passwords can still login. This problem will affect users that have PAM enabled. Currently there is no authorization (e.g. check for expired or disabled accounts), but only plain authentication (i.e. check if username and password match). Bareos Director versions 21.1.0, 20.0.6 and 19.2.12 implement the authorization check that was previously missing. The only workaround is to make sure that authentication fails if the user is not authorized. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/bareos/bareos/security/advisories/GHSA-4979-8ffj-4q26 - https://github.com/bareos/bareos/pull/1115 - https://github.com/bareos/bareos/pull/1119 - https://github.com/bareos/bareos/pull/1121 - https://huntr.dev/bounties/480121f2-bc3c-427e-986e-5acffb1606c5/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-2311.
CVE ID: CVE-2021-2311 Date Updated: 2024-09-26T14:09:43.157Z Date Published: 2021-04-22T21:54:02 Description: Vulnerability in the Oracle Hospitality Inventory Management product of Oracle Food and Beverage Applications (component: Export to Reporting and Analytics). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Inventory Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Inventory Management accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4501.
CVE ID: CVE-2011-4501 Date Updated: 2024-09-17T01:26:26.089Z Date Published: 2011-11-22T11:00:00Z Description: The UPnP IGD implementation in Edimax EdiLinux on the Edimax BR-6104K with firmware before 3.25, Edimax 6114Wg, Canyon-Tech CN-WF512 with firmware 1.83, Canyon-Tech CN-WF514 with firmware 2.08, Sitecom WL-153 with firmware before 1.39, and Sweex LB000021 with firmware 3.15 allows remote attackers to establish arbitrary port mappings by sending a UPnP AddPortMapping action in a SOAP request to the WAN interface, related to an "external forwarding" vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.upnp-hacks.org/devices.html - http://www.upnp-hacks.org/suspect.html - http://www.kb.cert.org/vuls/id/357851 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9352.
CVE ID: CVE-2019-9352 Date Updated: 2024-08-04T21:46:30.382Z Date Published: 2019-09-27T18:05:16 Description: In libstagefright, there is a possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-124253062 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/android-10 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4342.
CVE ID: CVE-2021-4342 Date Updated: 2023-07-11T19:23:20.412Z Date Published: 2023-06-07T01:51:13.737Z Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0206.
CVE ID: CVE-2010-0206 Date Updated: 2024-08-07T00:37:54.188Z Date Published: 2019-10-30T20:10:52 Description: xpdf allows remote attackers to cause a denial of service (NULL pointer dereference and crash) in the way it processes JBIG2 PDF stream objects. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security-tracker.debian.org/tracker/CVE-2010-0206 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0206 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14840.
CVE ID: CVE-2019-14840 Date Updated: 2024-08-05T00:26:39.194Z Date Published: 2022-10-17T00:00:00 Description: A flaw was found in the RHDM, where sensitive HTML form fields like Password has auto-complete enabled which may lead to leak of credentials. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1748185 - https://access.redhat.com/security/cve/CVE-2019-14840 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3958.
CVE ID: CVE-2011-3958 Date Updated: 2024-08-06T23:53:32.572Z Date Published: 2012-02-09T02:00:00 Description: Google Chrome before 17.0.963.46 does not properly perform casts of variables during handling of a column span, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/kb/HT5485 - http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html - http://support.apple.com/kb/HT5503 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14948 - http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html - http://code.google.com/p/chromium/issues/detail?id=105459 - http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html - http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html - http://support.apple.com/kb/HT5400 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28405.
CVE ID: CVE-2024-28405 Date Updated: 2024-08-02T00:56:57.672Z Date Published: 2024-03-29T00:00:00 Description: SEMCMS 4.8 is vulnerable to Incorrect Access Control. The code installs SEMCMS_Funtion.php before checking if the admin is a valid user in the admin page because authentication function is called from there, users gain admin privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/turabiaslan/semcms/blob/main/README.md - https://github.com/turabiaslan/semcms No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21974.
CVE ID: CVE-2021-21974 Date Updated: 2024-08-03T18:30:23.578Z Date Published: 2021-02-24T16:57:33 Description: OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vmware.com/security/advisories/VMSA-2021-0002.html - https://www.zerodayinitiative.com/advisories/ZDI-21-250/ - http://packetstormsecurity.com/files/162957/VMware-ESXi-OpenSLP-Heap-Overflow.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5972.
CVE ID: CVE-2017-5972 Date Updated: 2024-08-05T15:18:49.182Z Date Published: 2017-02-14T06:30:00 Description: The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties have been unable to discern any relationship between the GitHub Engineering finding and the Trigemini.c attack code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/oss-sec/2017/q1/573 - https://www.exploit-db.com/exploits/41350/ - https://bugzilla.redhat.com/show_bug.cgi?id=1422081 - https://cxsecurity.com/issue/WLB-2017020112 - https://security-tracker.debian.org/tracker/CVE-2017-5972 - https://githubengineering.com/syn-flood-mitigation-with-synsanity/ - http://www.securityfocus.com/bid/96231 - https://packetstormsecurity.com/files/141083/CentOS7-Kernel-Denial-Of-Service.html - https://access.redhat.com/security/cve/cve-2017-5972 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-18190.
CVE ID: CVE-2020-18190 Date Updated: 2024-08-04T14:00:49.038Z Date Published: 2020-10-02T13:12:51 Description: Bludit v3.8.1 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /admin/ajax/upload-profile-picture. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/bludit/bludit/issues/978 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-25053.
CVE ID: CVE-2020-25053 Date Updated: 2024-08-04T15:26:09.539Z Date Published: 2020-08-31T20:23:52 Description: An issue was discovered on Samsung mobile devices with Q(10.0) (exynos9830 chipsets) software. RKP allows arbitrary code execution. The Samsung ID is SVE-2020-17435 (August 2020). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6278.
CVE ID: CVE-2014-6278 Date Updated: 2024-08-06T12:10:13.322Z Date Published: 2014-09-30T10:00:00 Description: GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897 - http://www-01.ibm.com/support/docview.wss?uid=swg21685749 - http://marc.info/?l=bugtraq&m=141577137423233&w=2 - https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts - http://linux.oracle.com/errata/ELSA-2014-3093 - http://marc.info/?l=bugtraq&m=142721162228379&w=2 - http://marc.info/?l=bugtraq&m=142358026505815&w=2 - http://www-01.ibm.com/support/docview.wss?uid=swg21686479 - http://jvn.jp/en/jp/JVN55667175/index.html - http://secunia.com/advisories/60433 - http://marc.info/?l=bugtraq&m=141383026420882&w=2 - http://marc.info/?l=bugtraq&m=141585637922673&w=2 - http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html - http://marc.info/?l=bugtraq&m=141576728022234&w=2 - http://www-01.ibm.com/support/docview.wss?uid=swg21685541 - http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html - http://secunia.com/advisories/61816 - http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html - http://secunia.com/advisories/61442 - http://marc.info/?l=bugtraq&m=142358078406056&w=2 - http://secunia.com/advisories/61283 - https://kc.mcafee.com/corporate/index?page=content&id=SB10085 - http://secunia.com/advisories/61654 - http://www.ubuntu.com/usn/USN-2380-1 - http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315 - http://secunia.com/advisories/62312 - https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html - http://marc.info/?l=bugtraq&m=141879528318582&w=2 - https://security-tracker.debian.org/tracker/CVE-2014-6278 - http://www-01.ibm.com/support/docview.wss?uid=swg21685604 - http://marc.info/?l=bugtraq&m=142118135300698&w=2 - http://secunia.com/advisories/61703 - http://secunia.com/advisories/61065 - http://marc.info/?l=bugtraq&m=141383196021590&w=2 - http://marc.info/?l=bugtraq&m=141383081521087&w=2 - http://www-01.ibm.com/support/docview.wss?uid=swg21686445 - http://www-01.ibm.com/support/docview.wss?uid=swg21686131 - http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126 - http://marc.info/?l=bugtraq&m=141879528318582&w=2 - http://secunia.com/advisories/61641 - https://www.exploit-db.com/exploits/39887/ - https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648 - http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html - http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898 - http://www-01.ibm.com/support/docview.wss?uid=swg21685914 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:164 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075 - http://marc.info/?l=bugtraq&m=142721162228379&w=2 - http://secunia.com/advisories/60325 - http://secunia.com/advisories/60024 - http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html - http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash - https://bugzilla.redhat.com/show_bug.cgi?id=1147414 - http://secunia.com/advisories/62343 - http://secunia.com/advisories/61565 - https://www.suse.com/support/shellshock/ - http://marc.info/?l=bugtraq&m=141450491804793&w=2 - http://secunia.com/advisories/61313 - http://marc.info/?l=bugtraq&m=142358026505815&w=2 - http://secunia.com/advisories/61485 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 - http://marc.info/?l=bugtraq&m=141577297623641&w=2 - http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272 - http://marc.info/?l=bugtraq&m=141383244821813&w=2 - http://secunia.com/advisories/61312 - http://linux.oracle.com/errata/ELSA-2014-3094 - http://secunia.com/advisories/60193 - http://www.vmware.com/security/advisories/VMSA-2014-0010.html - http://secunia.com/advisories/60063 - http://secunia.com/advisories/60034 - http://secunia.com/advisories/59907 - http://secunia.com/advisories/58200 - http://marc.info/?l=bugtraq&m=141577241923505&w=2 - http://secunia.com/advisories/61643 - http://www.novell.com/support/kb/doc.php?id=7015721 - http://www-01.ibm.com/support/docview.wss?uid=swg21687079 - http://secunia.com/advisories/61503 - http://www-01.ibm.com/support/docview.wss?uid=swg21686246 - http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915 - http://support.novell.com/security/cve/CVE-2014-6278.html - http://marc.info/?l=bugtraq&m=141383465822787&w=2 - http://www.qnap.com/i/en/support/con_show.php?cid=61 - http://secunia.com/advisories/61552 - http://secunia.com/advisories/61780 - http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279 - https://support.citrix.com/article/CTX200223 - https://www.exploit-db.com/exploits/39568/ - http://marc.info/?l=bugtraq&m=141330468527613&w=2 - http://secunia.com/advisories/60044 - http://secunia.com/advisories/61291 - http://marc.info/?l=bugtraq&m=141345648114150&w=2 - http://secunia.com/advisories/61287 - http://marc.info/?l=bugtraq&m=141383353622268&w=2 - http://marc.info/?l=bugtraq&m=142118135300698&w=2 - http://marc.info/?l=bugtraq&m=142118135300698&w=2 - http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361 - http://marc.info/?l=bugtraq&m=141383304022067&w=2 - http://secunia.com/advisories/61128 - https://support.citrix.com/article/CTX200217 - http://secunia.com/advisories/61471 - http://secunia.com/advisories/60055 - http://secunia.com/advisories/59961 - http://secunia.com/advisories/61550 - http://secunia.com/advisories/61633 - http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html - http://www-01.ibm.com/support/docview.wss?uid=swg21686494 - https://kb.bluecoat.com/index?page=content&id=SA82 - http://secunia.com/advisories/61328 - http://www-01.ibm.com/support/docview.wss?uid=swg21685733 - http://secunia.com/advisories/61129 - http://secunia.com/advisories/61603 - http://secunia.com/advisories/61857 - http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879 - https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28917.
CVE ID: CVE-2022-28917 Date Updated: 2024-08-03T06:10:56.798Z Date Published: 2022-05-18T15:28:49 Description: Tenda AX12 v22.03.01.21_cn was discovered to contain a stack overflow via the lanIp parameter in /goform/AdvSetLanIp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/NSSCYCTFER/SRC-CVE No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-34444.
CVE ID: CVE-2021-34444 Date Updated: 2024-08-04T00:12:50.270Z Date Published: 2021-07-16T20:19:35 Description: Windows DNS Server Denial of Service Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34444 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5401.
CVE ID: CVE-2018-5401 Date Updated: 2024-09-17T03:37:46.527Z Date Published: 2018-10-08T15:00:00Z Description: The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App transmit sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. The devices transmit process control information via unencrypted Modbus communications. Impact: An attacker can exploit this vulnerability to observe information about configurations, settings, what sensors are present and in use, and other information to aid in crafting spoofed messages. Requires access to the network. Affected releases are Auto-Maskin DCU-210E, RP-210E, and Marine Pro Observer Android App. Versions prior to 3.7 on ARMv7. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.kb.cert.org/vuls/id/176301 - https://www.us-cert.gov/ics/advisories/icsa-20-051-04 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6267.
CVE ID: CVE-2019-6267 Date Updated: 2024-08-04T20:16:24.766Z Date Published: 2019-01-15T00:00:00 Description: The Premium WP Suite Easy Redirect Manager plugin 28.07-17 for WordPress has XSS via a crafted GET request that is mishandled during log viewing at the templates/admin/redirect-log.php URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/easy-redirect-manager/#developers - https://www.logicallysecure.com/blog/ls-team-discovers-xss-in-wordpress-plugin/ - https://wpvulndb.com/vulnerabilities/9203 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24760.
CVE ID: CVE-2024-24760 Date Updated: 2024-08-01T23:28:12.777Z Date Published: 2024-02-02T15:28:22.086Z Description: mailcow is a dockerized email package, with multiple containers linked in one bridged network. A security vulnerability has been identified in mailcow affecting versions < 2024-01c. This vulnerability potentially allows attackers on the same subnet to connect to exposed ports of a Docker container, even when the port is bound to 127.0.0.1. The vulnerability has been addressed by implementing additional iptables/nftables rules. These rules drop packets for Docker containers on ports 3306, 6379, 8983, and 12345, where the input interface is not `br-mailcow` and the output interface is `br-mailcow`. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-gmpj-5xcm-xxx6 - https://github.com/mailcow/mailcow-dockerized/commit/087481ac12bfa5dd715f3630f0b1697be94f7e88 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0788.
CVE ID: CVE-2008-0788 Date Updated: 2024-08-07T08:01:38.909Z Date Published: 2008-02-15T00:00:00 Description: Multiple cross-site request forgery (CSRF) vulnerabilities in MyBB 1.2.11 and earlier allow remote attackers to (1) hijack the authentication of moderators or administrators for requests that delete threads via a do_multideletethreads action to moderation.php and (2) hijack the authentication of arbitrary users for requests that delete private messages (PM) via a delete action to private.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://community.mybboard.net/showthread.php?tid=27675 - http://secunia.com/advisories/28572/ - http://www.securityfocus.com/archive/1/486663 - http://www.vupen.com/english/advisories/2008/0238 - http://securityreason.com/securityalert/3656 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8688.
CVE ID: CVE-2014-8688 Date Updated: 2024-08-06T13:26:02.421Z Date Published: 2017-03-14T09:02:00 Description: An issue was discovered in Telegram Messenger 2.6 for iOS and 1.8.2 for Android. Secret chat messages are available in cleartext in process memory and a .db file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.zimperium.com/telegram-hack/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32910.
CVE ID: CVE-2022-32910 Date Updated: 2024-08-03T07:54:03.068Z Date Published: 2022-11-01T00:00:00 Description: A logic issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.8, macOS Monterey 12.5, Security Update 2022-005 Catalina. An archive may be able to bypass Gatekeeper. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213345 - https://support.apple.com/en-us/HT213344 - https://support.apple.com/en-us/HT213343 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-22915.
CVE ID: CVE-2023-22915 Date Updated: 2024-08-02T10:20:31.467Z Date Published: 2023-04-24T00:00:00 Description: A buffer overflow vulnerability in the “fbwifi_forward.cgi” CGI program of Zyxel USG FLEX series firmware versions 4.50 through 5.35, USG FLEX 50(W) firmware versions 4.30 through 5.35, USG20(W)-VPN firmware versions 4.30 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow a remote unauthenticated attacker to cause DoS conditions by sending a crafted HTTP request if the Facebook WiFi function were enabled on an affected device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-of-firewalls-and-aps No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4686.
CVE ID: CVE-2022-4686 Date Updated: 2024-08-03T01:48:40.364Z Date Published: 2022-12-23T00:00:00 Description: Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9 - https://huntr.dev/bounties/caa0b22c-501f-44eb-af65-65c315cd1637 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46657.
CVE ID: CVE-2021-46657 Date Updated: 2024-08-04T05:10:35.445Z Date Published: 2022-01-29T22:34:28 Description: get_sort_by_table in MariaDB before 10.6.2 allows an application crash via certain subquery uses of ORDER BY. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jira.mariadb.org/browse/MDEV-25629 - https://security.netapp.com/advisory/ntap-20220221-0002/ - https://mariadb.com/kb/en/security/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5331.
CVE ID: CVE-2018-5331 Date Updated: 2024-08-05T05:33:44.155Z Date Published: 2018-01-10T09:00:00 Description: Discuz! DiscuzX X3.4 has XSS via the view parameter to include/space/space_poll.php, as demonstrated by a mod=space do=poll request to home.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.whsgwl.net/text.php?textid=32 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-46163.
CVE ID: CVE-2022-46163 Date Updated: 2024-08-03T14:24:03.290Z Date Published: 2023-01-10T20:26:02.980Z Description: Travel support program is a rails app to support the travel support program of openSUSE (TSP). Sensitive user data (bank account details, password Hash) can be extracted via Ransack query injection. Every deployment of travel-support-program below the patched version is affected. The travel-support-program uses the Ransack library to implement search functionality. In its default configuration, Ransack will allow for query conditions based on properties of associated database objects [1]. The `*_start`, `*_end` or `*_cont` search matchers [2] can then be abused to exfiltrate sensitive string values of associated database objects via character-by-character brute-force (A match is indicated by the returned JSON not being empty). A single bank account number can be extracted with <200 requests, a password hash can be extracted with ~1200 requests, all within a few minutes. The problem has been patched in commit d22916275c51500b4004933ff1b0a69bc807b2b7. In order to work around this issue, you can also cherry pick that patch, however it will not work without the Rails 5.0 migration that was done in #150, which in turn had quite a few pull requests it depended on. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/openSUSE/travel-support-program/security/advisories/GHSA-2wwv-c6xh-cf68 - https://github.com/openSUSE/travel-support-program/pull/158 - https://github.com/openSUSE/travel-support-program/commit/d22916275c51500b4004933ff1b0a69bc807b2b7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5729.
CVE ID: CVE-2018-5729 Date Updated: 2024-08-05T05:40:51.270Z Date Published: 2018-03-06T20:00:00 Description: MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1042071 - https://bugzilla.redhat.com/show_bug.cgi?id=1551083 - https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1 - https://access.redhat.com/errata/RHSA-2018:3071 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/ - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/ - https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html - https://access.redhat.com/errata/RHBA-2019:0327 - https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34818.
CVE ID: CVE-2024-34818 Date Updated: 2024-08-02T02:59:22.658Z Date Published: 2024-05-10T08:40:10.273Z Description: Cross-Site Request Forgery (CSRF) vulnerability in WebinarPress.This issue affects WebinarPress: from n/a through 1.33.17. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/wp-webinarsystem/wordpress-webinar-plugin-1-33-17-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5984.
CVE ID: CVE-2015-5984 Date Updated: 2021-01-06T16:15:32 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42054.
CVE ID: CVE-2021-42054 Date Updated: 2024-08-04T03:22:26.046Z Date Published: 2021-10-07T05:28:57 Description: ACCEL-PPP 1.12.0 has an out-of-bounds read in triton_context_schedule if the client exits after authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xebd/accel-ppp/issues/156 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2880.
CVE ID: CVE-2009-2880 Date Updated: 2024-08-07T06:07:37.248Z Date Published: 2009-12-18T19:00:00 Description: Buffer overflow in atrpui.dll in the Cisco WebEx WRF Player 26.x before 26.49.32 for Windows, 27.x before 27.10.x for Windows, 26.x before 26.49.35 for Mac OS X and Linux, and 27.x before 27.11.8 for Mac OS X and Linux allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WebEx Recording Format (WRF) file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22660&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - http://www.fortiguard.com/advisory/FGA-2009-48.html - http://secunia.com/advisories/37810 - http://www.fortiguard.com/encyclopedia/vulnerability/cisco.webex.player.atrpui.dos.html - http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=23040&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22799&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - http://tools.cisco.com/security/center/viewAlert.x?alertId=19499 - http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22663&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22661&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - http://securitytracker.com/id?1023360 - http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=22662&signatureSubId=0&softwareVersion=6.0&releaseVersion=S456 - http://www.vupen.com/english/advisories/2009/3574 - http://www.securityfocus.com/bid/37352 - https://exchange.xforce.ibmcloud.com/vulnerabilities/54841 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b0a577.shtml - http://www.osvdb.org/61130 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15618.
CVE ID: CVE-2020-15618 Date Updated: 2024-08-04T13:22:30.152Z Date Published: 2020-07-28T17:01:18 Description: This vulnerability allows remote attackers to disclose sensitive information on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_list_accounts.php. When parsing the username parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-9717. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-20-765/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29979.
CVE ID: CVE-2021-29979 Date Updated: 2024-08-03T22:24:57.625Z Date Published: 2021-08-02T20:45:03 Description: Hubs Cloud allows users to download shared content, specifically HTML and JS, which could allow javascript execution in the Hub Cloud instance’s primary hosting domain.*. This vulnerability affects Hubs Cloud < mozillareality/reticulum/1.0.1/20210618012634. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2021-32/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1712495 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21085.
CVE ID: CVE-2023-21085 Date Updated: 2024-08-02T09:28:25.993Z Date Published: 2023-04-19T00:00:00 Description: In nci_snd_set_routing_cmd of nci_hmsgs.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-264879662 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2023-04-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-3385.
CVE ID: CVE-2017-3385 Date Updated: 2024-08-05T14:23:34.429Z Date Published: 2017-01-27T22:01:00 Description: Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/95531 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-17115.
CVE ID: CVE-2019-17115 Date Updated: 2024-08-05T01:33:16.680Z Date Published: 2019-10-17T17:46:09 Description: Multiple cross-site scripting (XSS) vulnerabilities in WiKID 2FA Enterprise Server through 4.2.0-b2047 allow remote attackers to inject arbitrary web script or HTML that is triggered when Logs.jsp is visited. The rendered_message column is retrieved and displayed, unsanitized, on Logs.jsp. A remote attack can populate the rendered_message column with malicious values via: (1) H parameter to /wikid/servlet/com.wikidsystems.server.GetDomainHash (2) S parameter to: - /wikid/DomainData - /wikid/PreRegisterLookup - /wikid/PreRegister - /wikid/InitDevice - /wikid/servlet/InitDevice2S - /wikid/servlet/InitDevice3S - /servlet/com.wikidsystems.server.InitDevice2S - /servlet/com.wikidsystems.server.InitDevice3S - /servlet/com.wikidsystems.server.InitDevice4S - /wikid/servlet/com.wikidsystems.server.InitDevice4AES - /wikid/servlet/com.wikidsystems.server.InitDevice5AES (3) a parameter to: - /wikid/PreRegisterLookup - /wikid/InitDevice - /wikid/servlet/InitDevice2S - /wikid/servlet/InitDevice3S - /servlet/com.wikidsystems.server.InitDevice2S - /servlet/com.wikidsystems.server.InitDevice3S - /servlet/com.wikidsystems.server.InitDevice4S - /wikid/servlet/com.wikidsystems.server.InitDevice4AES - /wikid/servlet/com.wikidsystems.server.InitDevice5AES. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.securitymetrics.com/blog/wikid-2fa-enterprise-server-cross-site-scripting - http://seclists.org/fulldisclosure/2019/Oct/35 - http://packetstormsecurity.com/files/154912/WiKID-Systems-2FA-Enterprise-Server-4.2.0-b2032-SQL-Injection-XSS-CSRF.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5069.
CVE ID: CVE-2017-5069 Date Updated: 2024-08-05T14:47:44.315Z Date Published: 2017-10-27T05:00:00 Description: Incorrect MIME type of XSS-Protection reports in Blink in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to circumvent Cross-Origin Resource Sharing checks via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2017:1124 - https://crbug.com/691726 - https://security.gentoo.org/glsa/201705-02 - http://www.securitytracker.com/id/1038317 - https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html - http://www.securityfocus.com/bid/97939 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5356.
CVE ID: CVE-2013-5356 Date Updated: 2024-08-06T17:06:52.379Z Date Published: 2014-06-13T14:00:00 Description: Sharetronix 3.1.1.3, 3.1.1, and earlier does not properly restrict access to unspecified AJAX functionality, which allows remote attackers to bypass authentication via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/100607 - https://exchange.xforce.ibmcloud.com/vulnerabilities/89505 - http://www.securityfocus.com/bid/64102 - http://secunia.com/secunia_research/2013-12/ - http://secunia.com/advisories/53936 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24921.
CVE ID: CVE-2022-24921 Date Updated: 2024-08-03T04:29:01.519Z Date Published: 2022-03-05T00:00:00 Description: regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk - https://security.netapp.com/advisory/ntap-20220325-0010/ - https://lists.debian.org/debian-lts-announce/2022/04/msg00017.html - https://lists.debian.org/debian-lts-announce/2022/04/msg00018.html - https://security.gentoo.org/glsa/202208-02 - https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf - https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6781.
CVE ID: CVE-2016-6781 Date Updated: 2024-08-06T01:43:37.890Z Date Published: 2017-01-12T15:00:00 Description: An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31095175. References: MT-ALPS02943455. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2016-12-01.html - http://www.securityfocus.com/bid/94683 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0829.
CVE ID: CVE-2019-0829 Date Updated: 2024-08-04T17:58:59.874Z Date Published: 2019-04-09T20:16:58 Description: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0806, CVE-2019-0810, CVE-2019-0812, CVE-2019-0860, CVE-2019-0861. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0829 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6093.
CVE ID: CVE-2013-6093 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-19718.
CVE ID: CVE-2020-19718 Date Updated: 2024-08-04T14:15:28.267Z Date Published: 2021-07-13T21:33:08 Description: An unhandled memory allocation failure in Core/Ap4Atom.cpp of Bento 1.5.1-628 causes a NULL pointer dereference, leading to a denial of service (DOS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/axiomatic-systems/Bento4/issues/417 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27263.
CVE ID: CVE-2021-27263 Date Updated: 2024-08-03T20:48:16.108Z Date Published: 2021-03-30T14:35:33 Description: This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-12290. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.foxitsoftware.com/support/security-bulletins.php - https://www.zerodayinitiative.com/advisories/ZDI-21-345/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0783.
CVE ID: CVE-2023-0783 Date Updated: 2024-08-02T05:24:34.435Z Date Published: 2023-02-11T17:04:42.144Z Description: A vulnerability was found in EcShop 4.1.5. It has been classified as critical. This affects an unknown part of the file /ecshop/admin/template.php of the component PHP File Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220641 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.220641 - https://vuldb.com/?ctiid.220641 - https://github.com/jingping911/exshopbug/blob/main/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3626.
CVE ID: CVE-2010-3626 Date Updated: 2024-08-07T03:18:52.967Z Date Published: 2010-10-06T16:00:00 Description: Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted font, a different vulnerability than CVE-2010-2889. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html - http://www.vupen.com/english/advisories/2011/0191 - http://secunia.com/advisories/43025 - http://security.gentoo.org/glsa/glsa-201101-08.xml - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7382 - http://www.redhat.com/support/errata/RHSA-2010-0743.html - http://www.adobe.com/support/security/bulletins/apsb10-21.html - http://www.us-cert.gov/cas/techalerts/TA10-279A.html - http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4750.
CVE ID: CVE-2019-4750 Date Updated: 2024-09-17T01:50:38.276Z Date Published: 2020-04-24T15:50:20.961324Z Description: IBM Cloud App Management 2019.3.0 and 2019.4.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 173310. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6190551 - https://exchange.xforce.ibmcloud.com/vulnerabilities/173310 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-2155.
CVE ID: CVE-2021-2155 Date Updated: 2024-09-26T18:08:53.249Z Date Published: 2021-04-22T21:53:45 Description: Vulnerability in the Oracle One-to-One Fulfillment product of Oracle E-Business Suite (component: Documents). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0746.
CVE ID: CVE-2009-0746 Date Updated: 2024-08-07T04:48:52.082Z Date Published: 2009-02-27T17:00:00 Description: The make_indexed_dir function in fs/ext4/namei.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate a certain rec_len field, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8039 - http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19 - http://www.vupen.com/english/advisories/2009/0509 - http://secunia.com/advisories/37471 - http://rhn.redhat.com/errata/RHSA-2009-1243.html - http://www.vmware.com/security/advisories/VMSA-2009-0016.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/48872 - http://www.debian.org/security/2009/dsa-1749 - http://osvdb.org/52202 - http://www.ubuntu.com/usn/usn-751-1 - http://bugzilla.kernel.org/show_bug.cgi?id=12430 - http://www.securityfocus.com/archive/1/507985/100/0/threaded - http://secunia.com/advisories/36562 - http://secunia.com/advisories/34394 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e6b8bc09ba2075cd91fbffefcd2778b1a00bd76f - http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10342 - http://www.vupen.com/english/advisories/2009/3316 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12404.
CVE ID: CVE-2020-12404 Date Updated: 2024-08-04T11:56:51.728Z Date Published: 2020-07-09T14:44:16 Description: For native-to-JS bridging the app requires a unique token to be passed that ensures non-app code can't call the bridging functions. That token could leak when used for downloading files. This vulnerability affects Firefox for iOS < 26. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2020-19/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1631739 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38138.
CVE ID: CVE-2024-38138 Date Updated: 2024-09-19T21:52:56.394Z Date Published: 2024-08-13T17:30:13.947Z Description: Windows Deployment Services Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38138 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-29642.
CVE ID: CVE-2022-29642 Date Updated: 2024-08-03T06:26:06.620Z Date Published: 2022-05-18T11:50:48 Description: TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the url parameter in the function setUrlFilterRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/5.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47484.
CVE ID: CVE-2021-47484 Date Updated: 2024-08-04T05:39:59.787Z Date Published: 2024-05-22T08:19:35.503Z Description: In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Fix possible null pointer dereference. This patch fixes possible null pointer dereference in files "rvu_debugfs.c" and "rvu_nix.c" No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/f1e3cd1cc80204fd02b9e9843450925a2af90dc0 - https://git.kernel.org/stable/c/c2d4c543f74c90f883e8ec62a31973ae8807d354 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-13145.
CVE ID: CVE-2019-13145 Date Updated: 2019-10-05T18:12:27 Date Published: 2019-10-05T18:12:27 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5941.
CVE ID: CVE-2012-5941 Date Updated: 2024-08-06T21:21:27.839Z Date Published: 2013-02-20T11:00:00 Description: Cross-site scripting (XSS) vulnerability in the WebAdmin application 6.0.5, 6.0.8, and 7.0 before P2 in IBM Netezza allows remote authenticated users to inject content, and conduct phishing attacks, via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/80536 - http://www-01.ibm.com/support/docview.wss?uid=swg21624568 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8070.
CVE ID: CVE-2018-8070 Date Updated: 2024-09-16T18:02:50.925Z Date Published: 2018-03-12T05:00:00Z Description: QCMS version 3.0 has XSS via the title parameter to the /guest/index.html URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/imsebao/404team/blob/master/qcms_xss/qcms_xss.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14495.
CVE ID: CVE-2018-14495 Date Updated: 2024-08-05T09:29:51.677Z Date Published: 2019-07-10T13:20:18 Description: Vivotek FD8136 devices allow Remote Command Injection, aka "another command injection vulnerability in our target device," a different issue than CVE-2018-14494. NOTE: The vendor has disputed this as a vulnerability and states that the issue does not cause a web server crash or have any other affect on it's performance No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vdalabs.com/2018/07/23/professional-iot-hacking-series-target-selection-firmware-analysis/ - https://www.vdalabs.com/2018/08/06/professional-iot-hacking-series-hunting-remote-command-injection/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14076.
CVE ID: CVE-2019-14076 Date Updated: 2024-08-05T00:12:42.167Z Date Published: 2020-06-22T07:10:36 Description: Buffer overflow occurs while processing an subsample data length out of range due to lack of user input validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8909, MSM8998, Nicobar, QCS404, QCS405, QCS605, Rennell, SA415M, SC7180, SC8180X, SDA845, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/june-2020-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8838.
CVE ID: CVE-2018-8838 Date Updated: 2024-09-17T00:30:30.233Z Date Published: 2018-04-17T21:00:00Z Description: A weakness in access controls in CENTUM CS 1000 all versions, CENTUM CS 3000 versions R3.09.50 and earlier, CENTUM CS 3000 Small versions R3.09.50 and earlier, CENTUM VP versions R6.03.10 and earlier, CENTUM VP Small versions R6.03.10 and earlier, CENTUM VP Basic versions R6.03.10 and earlier, Exaopc versions R3.75.00 and earlier, B/M9000 CS all versions, and B/M9000 VP versions R8.01.01 and earlier may allow a local attacker to exploit the message management function of the system. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-18-102-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-34620.
CVE ID: CVE-2021-34620 Date Updated: 2024-09-17T00:41:55.083Z Date Published: 2021-07-07T12:21:04.343417Z Description: The WP Fluent Forms plugin < 3.6.67 for WordPress is vulnerable to Cross-Site Request Forgery leading to stored Cross-Site Scripting and limited Privilege Escalation due to a missing nonce check in the access control function for administrative AJAX actions No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://plugins.trac.wordpress.org/browser/fluentform/trunk/app/Modules/Acl/Acl.php?rev=2196688 - https://www.wordfence.com/blog/2021/06/cross-site-request-forgery-patched-in-wp-fluent-forms/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1810.
CVE ID: CVE-2024-1810 Date Updated: 2024-08-01T18:48:21.988Z Date Published: 2024-02-24T04:32:26.045Z Description: The Archivist – Custom Archive Templates plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘shortcode_attributes' parameter in all versions up to, and including, 1.7.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e230f9f-5eda-4362-973b-ada9cf425697?source=cve - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3040242%40archivist-custom-archive-templates&new=3040242%40archivist-custom-archive-templates&sfp_email=&sfph_mail= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2569.
CVE ID: CVE-2015-2569 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32578.
CVE ID: CVE-2021-32578 Date Updated: 2024-08-03T23:25:30.317Z Date Published: 2021-08-05T19:16:41 Description: Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 2 of 2). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.acronis.com/content/68419 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16373.
CVE ID: CVE-2017-16373 Date Updated: 2024-08-05T20:27:02.546Z Date Published: 2017-12-09T06:00:00 Description: An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This issue is due to an untrusted pointer dereference. In this scenario, the input is crafted in way that the computation results in pointers to memory locations that do not belong to the relevant process address space. The dereferencing operation is a read operation, and an attack can result in sensitive data exposure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1039791 - https://helpx.adobe.com/security/products/acrobat/apsb17-36.html - http://www.securityfocus.com/bid/101813 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3920.
CVE ID: CVE-2016-3920 Date Updated: 2024-08-06T00:10:31.875Z Date Published: 2016-10-10T10:00:00 Description: id3/ID3.cpp in libstagefright in mediaserver in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-10-01, and 7.0 before 2016-10-01 allows remote attackers to cause a denial of service (device hang or reboot) via a crafted file, aka internal bug 30744884. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://android.googlesource.com/platform/frameworks/av/+/6d0249be2275fd4086783f259f4e2c54722a7c55 - http://source.android.com/security/bulletin/2016-10-01.html - http://www.securityfocus.com/bid/93292 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4222.
CVE ID: CVE-2018-4222 Date Updated: 2024-08-05T05:04:29.957Z Date Published: 2018-06-08T18:00:00 Description: An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages a getWasmBufferFromValue out-of-bounds read during WebAssembly compilation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT208850 - https://www.exploit-db.com/exploits/44859/ - https://bugs.chromium.org/p/project-zero/issues/detail?id=1545 - https://support.apple.com/HT208853 - https://support.apple.com/HT208851 - https://security.gentoo.org/glsa/201808-04 - https://support.apple.com/HT208854 - http://www.securitytracker.com/id/1041029 - https://usn.ubuntu.com/3687-1/ - https://support.apple.com/HT208848 - https://support.apple.com/HT208852 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12170.
CVE ID: CVE-2019-12170 Date Updated: 2024-08-04T23:10:30.829Z Date Published: 2019-05-17T21:52:18 Description: ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PHP files to be written to the web root, and for code to execute on the remote server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File - http://incidentsecurity.com/atutor-2-2-4-backup-remote-command-execution/ - http://packetstormsecurity.com/files/153869/ATutor-2.2.4-Backup-Remote-Command-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43118.
CVE ID: CVE-2021-43118 Date Updated: 2024-08-04T03:47:13.571Z Date Published: 2022-03-29T19:37:57 Description: A Remote Command Injection vulnerability exists in DrayTek Vigor 2960 1.5.1.3, DrayTek Vigor 3900 1.5.1.3, and DrayTek Vigor 300B 1.5.1.3 via a crafted HTTP message containing malformed QUERY STRING in mainfunction.cgi, which could let a remote malicious user execute arbitrary code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/Cossack9989/6034c077f46e4f06d0992e9f2fae7f26 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-39249.
CVE ID: CVE-2022-39249 Date Updated: 2024-08-03T12:00:43.417Z Date Published: 2022-09-28T00:00:00 Description: Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others. This attack is possible due to the matrix-js-sdk implementing a too permissive key forwarding strategy on the receiving end. Starting with version 19.7.0, the default policy for accepting key forwards has been made more strict in the matrix-js-sdk. matrix-js-sdk will now only accept forwarded keys in response to previously issued requests and only from own, verified devices. The SDK now sets a `trusted` flag on the decrypted message upon decryption, based on whether the key used to decrypt the message was received from a trusted source. Clients need to ensure that messages decrypted with a key with `trusted = false` are decorated appropriately, for example, by showing a warning for such messages. This attack requires coordination between a malicious homeserver and an attacker, and those who trust your homeservers do not need a workaround. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76 - https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0 - https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6263-x97c-c4gg - https://github.com/matrix-org/matrix-spec-proposals/pull/3061 - https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients - https://security.gentoo.org/glsa/202210-35 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30309.
CVE ID: CVE-2021-30309 Date Updated: 2024-08-03T22:32:39.875Z Date Published: 2022-02-11T10:40:20 Description: Improper size validation of QXDM commands can lead to memory corruption in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2679.
CVE ID: CVE-2013-2679 Date Updated: 2024-08-06T15:44:33.176Z Date Published: 2020-02-18T16:26:54 Description: Multiple cross-site scripting (XSS) vulnerabilities in Cisco Linksys E4200 router with firmware 1.0.05 build 7 allow remote attackers to inject arbitrary web script or HTML via the (1) log_type, (2) ping_ip, (3) ping_size, (4) submit_type, or (5) traceroute_ip parameter to apply.cgi or (6) new_workgroup or (7) submit_button parameter to storage/apply.cgi. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.cloudscan.me/2013/05/xss-lfi-linksys-e4200-firmware-0d.html - http://packetstormsecurity.com/files/121551/Cisco-Linksys-E4200-Cross-Site-Scripting-Local-File-Inclusion.html - http://osvdb.org/93059 - http://osvdb.org/93060 - https://exchange.xforce.ibmcloud.com/vulnerabilities/84069 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-12721.
CVE ID: CVE-2017-12721 Date Updated: 2024-08-05T18:43:56.602Z Date Published: 2018-02-15T10:00:00 Description: An Improper Certificate Validation issue was discovered in Smiths Medical Medfusion 4000 Wireless Syringe Infusion Pump, Version 1.1, 1.5, and 1.6. The pump does not validate host certificates, leaving the pump vulnerable to a man-in-the-middle (MITM) attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSMA-17-250-02A - http://www.securityfocus.com/bid/100665 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7646.
CVE ID: CVE-2015-7646 Date Updated: 2019-03-05T19:57:01 Date Published: 2019-03-05T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10188.
CVE ID: CVE-2019-10188 Date Updated: 2024-08-04T22:17:18.952Z Date Published: 2019-07-31T21:29:44 Description: A flaw was found in moodle before versions 3.7.1, 3.6.5, 3.5.7. Teachers in a quiz group could modify group overrides for other groups in the same quiz. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/109178 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10188 - https://moodle.org/mod/forum/discuss.php?d=388569 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-17147.
CVE ID: CVE-2018-17147 Date Updated: 2024-08-05T10:39:59.587Z Date Published: 2019-07-10T13:59:13 Description: Nagios XI before 5.5.4 has XSS in the auto login admin management page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://assets.nagios.com/downloads/nagiosxi/CHANGES-5.TXT - http://www.securityfocus.com/bid/109116 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6221.
CVE ID: CVE-2014-6221 Date Updated: 2024-08-06T12:10:12.940Z Date Published: 2015-04-06T00:00:00 Description: The MSCAPI/MSCNG interface implementation in GSKit in IBM Rational ClearCase 7.1.2.x before 7.1.2.17, 8.0.0.x before 8.0.0.14, and 8.0.1.x before 8.0.1.7 does not properly generate random numbers, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21698893 - http://www.securityfocus.com/bid/73915 - http://www.securitytracker.com/id/1032026 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0588.
CVE ID: CVE-2011-0588 Date Updated: 2024-08-06T21:58:25.983Z Date Published: 2011-02-10T17:00:00 Description: Untrusted search path vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, a different vulnerability than CVE-2011-0562 and CVE-2011-0570. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12378 - http://www.securityfocus.com/bid/46254 - http://www.vupen.com/english/advisories/2011/0337 - http://www.securitytracker.com/id?1025033 - http://www.adobe.com/support/security/bulletins/apsb11-03.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/65293 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4761.
CVE ID: CVE-2013-4761 Date Updated: 2024-08-06T16:52:26.979Z Date Published: 2013-08-20T22:00:00 Description: Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2013/dsa-2761 - http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00009.html - http://puppetlabs.com/security/cve/cve-2013-4761/ - http://rhn.redhat.com/errata/RHSA-2013-1284.html - http://rhn.redhat.com/errata/RHSA-2013-1283.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4952.
CVE ID: CVE-2015-4952 Date Updated: 2024-08-06T06:32:31.868Z Date Published: 2018-03-29T18:00:00 Description: The on-demand plugin in IBM Endpoint Manager for Remote Control 9.0.1 and 9.1.0 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors. IBM X-Force ID: 105196. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21962602 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49074.
CVE ID: CVE-2023-49074 Date Updated: 2024-08-02T21:46:28.899Z Date Published: 2024-04-09T14:12:48.559Z Description: A denial of service vulnerability exists in the TDDP functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of network requests can lead to reset to factory settings. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1861 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-32887.
CVE ID: CVE-2024-32887 Date Updated: 2024-08-02T02:20:35.661Z Date Published: 2024-04-26T21:02:42.462Z Description: Sidekiq is simple, efficient background processing for Ruby. Sidekiq is reflected XSS vulnerability. The value of substr parameter is reflected in the response without any encoding, allowing an attacker to inject Javascript code into the response of the application. An attacker could exploit it to target users of the Sidekiq Web UI. Moreover, if other applications are deployed on the same domain or website as Sidekiq, users of those applications could also be affected, leading to a broader scope of compromise. Potentially compromising their accounts, forcing the users to perform sensitive actions, stealing sensitive data, performing CORS attacks, defacement of the web application, etc. This issue has been patched in version 7.2.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/sidekiq/sidekiq/security/advisories/GHSA-q655-3pj8-9fxq - https://github.com/sidekiq/sidekiq/commit/30786e082c70349ab27ffa9eccc42fb0c696164d - https://github.com/sidekiq/sidekiq/releases/tag/v7.2.4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5550.
CVE ID: CVE-2015-5550 Date Updated: 2024-08-06T06:50:02.945Z Date Published: 2015-08-14T01:00:00 Description: Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 - https://security.gentoo.org/glsa/201508-01 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - https://helpx.adobe.com/security/products/flash-player/apsb15-19.html - http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html - http://www.securitytracker.com/id/1033235 - http://www.securityfocus.com/bid/76288 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 - http://rhn.redhat.com/errata/RHSA-2015-1603.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-37992.
CVE ID: CVE-2024-37992 Date Updated: 2024-09-10T15:08:09.459Z Date Published: 2024-09-10T09:36:37.300Z Description: A vulnerability has been identified in SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0) (All versions < V4.2), SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0) (All versions < V4.2), SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0) (All versions < V4.2), SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0) (All versions < V4.2), SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0) (All versions < V4.2), SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0) (All versions < V4.2), SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0) (All versions < V4.2), SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0) (All versions < V4.2), SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0) (All versions < V4.2), SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0) (All versions < V4.2), SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0) (All versions < V4.2), SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0) (All versions < V4.2), SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0) (All versions < V4.2), SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0) (All versions < V4.2), SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0) (All versions < V4.2), SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0) (All versions < V4.2), SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0) (All versions < V4.2), SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0) (All versions < V4.2), SIMATIC RF1140R (6GT2831-6CB00) (All versions < V1.1), SIMATIC RF1170R (6GT2831-6BB00) (All versions < V1.1), SIMATIC RF166C (6GT2002-0EE20) (All versions < V2.2), SIMATIC RF185C (6GT2002-0JE10) (All versions < V2.2), SIMATIC RF186C (6GT2002-0JE20) (All versions < V2.2), SIMATIC RF186CI (6GT2002-0JE50) (All versions < V2.2), SIMATIC RF188C (6GT2002-0JE40) (All versions < V2.2), SIMATIC RF188CI (6GT2002-0JE60) (All versions < V2.2), SIMATIC RF360R (6GT2801-5BA30) (All versions < V2.2). The affected devices does not properly handle the error in case of exceeding characters while setting SNMP leading to the restart of the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/html/ssa-765405.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0093.
CVE ID: CVE-2013-0093 Date Updated: 2024-08-06T14:18:08.351Z Date Published: 2013-03-13T00:00:00 Description: Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.us-cert.gov/ncas/alerts/TA13-071A - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-021 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16239 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38217.
CVE ID: CVE-2021-38217 Date Updated: 2024-08-04T01:37:16.306Z Date Published: 2022-10-28T00:00:00 Description: SEMCMS v 1.2 is vulnerable to SQL Injection via SEMCMS_User.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/BigTiger2020/SEMCMS/blob/main/semcms-1.2-sql-2.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-43303.
CVE ID: CVE-2024-43303 Date Updated: 2024-08-19T14:40:08.287Z Date Published: 2024-08-18T21:09:01.244Z Description: Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in videousermanuals.Com White Label CMS allows Reflected XSS.This issue affects White Label CMS: from n/a through 2.7.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/white-label-cms/wordpress-white-label-cms-plugin-2-7-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3094.
CVE ID: CVE-2024-3094 Date Updated: 2024-08-20T17:24:56.165Z Date Published: 2024-03-29T16:51:12.588Z Description: Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2024/03/29/10 - http://www.openwall.com/lists/oss-security/2024/03/29/12 - http://www.openwall.com/lists/oss-security/2024/03/29/4 - http://www.openwall.com/lists/oss-security/2024/03/29/5 - http://www.openwall.com/lists/oss-security/2024/03/29/8 - http://www.openwall.com/lists/oss-security/2024/03/30/12 - http://www.openwall.com/lists/oss-security/2024/03/30/27 - http://www.openwall.com/lists/oss-security/2024/03/30/36 - http://www.openwall.com/lists/oss-security/2024/03/30/5 - http://www.openwall.com/lists/oss-security/2024/04/16/5 - https://access.redhat.com/security/cve/CVE-2024-3094 - https://ariadne.space/2024/04/02/the-xz-utils-backdoor-is-a-symptom-of-a-larger-problem/ - https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/ - https://aws.amazon.com/security/security-bulletins/AWS-2024-002/ - https://blog.netbsd.org/tnf/entry/statement_on_backdoor_in_xz - https://boehs.org/node/everything-i-know-about-the-xz-backdoor - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024 - https://bugs.gentoo.org/928134 - https://bugzilla.redhat.com/show_bug.cgi?id=2272210 - https://bugzilla.suse.com/show_bug.cgi?id=1222124 - https://discourse.nixos.org/t/cve-2024-3094-malicious-code-in-xz-5-6-0-and-5-6-1-tarballs/42405 - https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27 - https://github.com/advisories/GHSA-rxwq-x6h5-x525 - https://github.com/amlweems/xzbot - https://github.com/karcherm/xz-malware - https://gynvael.coldwind.pl/?lang=en&id=782 - https://lists.debian.org/debian-security-announce/2024/msg00057.html - https://lists.freebsd.org/archives/freebsd-security/2024-March/000248.html - https://lwn.net/Articles/967180/ - https://news.ycombinator.com/item?id=39865810 - https://news.ycombinator.com/item?id=39877267 - https://news.ycombinator.com/item?id=39895344 - https://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-3094/ - https://research.swtch.com/xz-script - https://research.swtch.com/xz-timeline - https://security-tracker.debian.org/tracker/CVE-2024-3094 - https://security.alpinelinux.org/vuln/CVE-2024-3094 - https://security.archlinux.org/CVE-2024-3094 - https://security.netapp.com/advisory/ntap-20240402-0001/ - https://tukaani.org/xz-backdoor/ - https://twitter.com/LetsDefendIO/status/1774804387417751958 - https://twitter.com/debian/status/1774219194638409898 - https://twitter.com/infosecb/status/1774595540233167206 - https://twitter.com/infosecb/status/1774597228864139400 - https://ubuntu.com/security/CVE-2024-3094 - https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 - https://www.darkreading.com/vulnerabilities-threats/are-you-affected-by-the-backdoor-in-xz-utils - https://www.kali.org/blog/about-the-xz-backdoor/ - https://www.openwall.com/lists/oss-security/2024/03/29/4 - https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users - https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils - https://www.theregister.com/2024/03/29/malicious_backdoor_xz/ - https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094 - https://xeiaso.net/notes/2024/xz-vuln/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7572.
CVE ID: CVE-2015-7572 Date Updated: 2017-04-24T17:57:01 Date Published: 2017-04-24T18:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.