instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2022-21486.
CVE ID: CVE-2022-21486 Date Updated: 2024-09-24T20:06:36.783Z Date Published: 2022-04-19T20:38:36 Description: Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2022.html - https://security.netapp.com/advisory/ntap-20220429-0005/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-1344.
CVE ID: CVE-2021-1344 Date Updated: 2024-09-16T23:51:33.793Z Date Published: 2021-02-04T16:40:49.676235Z Description: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-ghZP68yj No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-20696.
CVE ID: CVE-2024-20696 Date Updated: 2024-08-01T21:59:42.317Z Date Published: 2024-01-09T17:56:52.848Z Description: Windows libarchive Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20696 - https://clearbluejar.github.io/posts/patch-tuesday-diffing-cve-2024-20696-windows-libarchive-rce/ - https://github.com/clearbluejar/CVE-2024-20696 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24505.
CVE ID: CVE-2022-24505 Date Updated: 2024-08-03T04:13:55.702Z Date Published: 2022-03-09T17:08:01 Description: Windows ALPC Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24505 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46498.
CVE ID: CVE-2023-46498 Date Updated: 2024-08-02T20:45:41.984Z Date Published: 2023-12-08T00:00:00 Description: An issue in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information and execute arbitrary code via the /deleteCustomer/route.json file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://devhub.checkmarx.com/cve-details/Cx8b24ace3-0c9a/ - https://devhub.checkmarx.com/cve-details/cve-2023-46498/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3239.
CVE ID: CVE-2008-3239 Date Updated: 2024-08-07T09:28:41.924Z Date Published: 2008-07-21T16:00:00 Description: Unrestricted file upload vulnerability in the writeLogEntry function in system/v_cron_proc.php in PHPizabi 0.848b C1 HFP1, when register_globals is enabled, allows remote attackers to upload and execute arbitrary code via a filename in the CONF[CRON_LOGFILE] parameter and file contents in the CONF[LOCALE_LONG_DATE_TIME] parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/31127 - http://securityreason.com/securityalert/4022 - http://www.securityfocus.com/bid/30257 - https://www.exploit-db.com/exploits/6085 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43856 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1263.
CVE ID: CVE-2008-1263 Date Updated: 2024-08-07T08:17:33.568Z Date Published: 2008-03-10T17:00:00 Description: The Linksys WRT54G router stores passwords and keys in cleartext in the Config.bin file, which might allow remote authenticated users to obtain sensitive information via an HTTP request for the top-level Config.bin URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/489009/100/0/threaded - http://www.gnucitizen.org/projects/router-hacking-challenge/ - https://exchange.xforce.ibmcloud.com/vulnerabilities/41115 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38384.
CVE ID: CVE-2024-38384 Date Updated: 2024-08-02T04:04:25.142Z Date Published: 2024-06-24T13:50:51.033Z Description: In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: fix list corruption from reorder of WRITE ->lqueued __blkcg_rstat_flush() can be run anytime, especially when blk_cgroup_bio_start is being executed. If WRITE of `->lqueued` is re-ordered with READ of 'bisc->lnode.next' in the loop of __blkcg_rstat_flush(), `next_bisc` can be assigned with one stat instance being added in blk_cgroup_bio_start(), then the local list in __blkcg_rstat_flush() could be corrupted. Fix the issue by adding one barrier. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/714e59b5456e4d6e4295a9968c564abe193f461c - https://git.kernel.org/stable/c/785298ab6b802afa75089239266b6bbea590809c - https://git.kernel.org/stable/c/d0aac2363549e12cc79b8e285f13d5a9f42fd08e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22411.
CVE ID: CVE-2022-22411 Date Updated: 2024-09-17T04:05:16.559Z Date Published: 2022-08-10T16:50:23.637725Z Description: IBM Spectrum Scale Data Access Services (DAS) 5.1.3.1 could allow an authenticated user to insert code which could allow the attacker to manipulate cluster resources due to excessive permissions. IBM X-Force ID: 223016. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6610277 - https://exchange.xforce.ibmcloud.com/vulnerabilities/223016 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24794.
CVE ID: CVE-2022-24794 Date Updated: 2024-08-03T04:20:50.427Z Date Published: 2022-03-31T22:45:14 Description: Express OpenID Connect is an Express JS middleware implementing sign on for Express web apps using OpenID Connect. Users of the `requiresAuth` middleware, either directly or through the default `authRequired` option, are vulnerable to an Open Redirect when the middleware is applied to a catch all route. If all routes under `example.com` are protected with the `requiresAuth` middleware, a visit to `http://example.com//google.com` will be redirected to `google.com` after login because the original url reported by the Express framework is not properly sanitized. This vulnerability affects versions prior to 2.7.2. Users are advised to upgrade. There are no known workarounds. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7p99-3798-f85c - https://github.com/auth0/express-openid-connect/commit/0947b92164a2c5f661ebcc183d37e7f21de719ad No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36893.
CVE ID: CVE-2024-36893 Date Updated: 2024-08-02T03:43:50.062Z Date Published: 2024-05-30T15:28:59.113Z Description: In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: Check for port partner validity before consuming it typec_register_partner() does not guarantee partner registration to always succeed. In the event of failure, port->partner is set to the error value or NULL. Given that port->partner validity is not checked, this results in the following crash: Unable to handle kernel NULL pointer dereference at virtual address xx pc : run_state_machine+0x1bc8/0x1c08 lr : run_state_machine+0x1b90/0x1c08 .. Call trace: run_state_machine+0x1bc8/0x1c08 tcpm_state_machine_work+0x94/0xe4 kthread_worker_fn+0x118/0x328 kthread+0x1d0/0x23c ret_from_fork+0x10/0x20 To prevent the crash, check for port->partner validity before derefencing it in all the call sites. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/d56d2ca03cc22123fd7626967d096d8661324e57 - https://git.kernel.org/stable/c/789326cafbd1f67f424436b6bc8bdb887a364637 - https://git.kernel.org/stable/c/fc2b655cb6dd2b381f1f284989721002e39b6b77 - https://git.kernel.org/stable/c/ae11f04b452b5205536e1c02d31f8045eba249dd No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9489.
CVE ID: CVE-2014-9489 Date Updated: 2024-08-06T13:47:41.328Z Date Published: 2017-10-17T14:00:00 Description: The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string "master" is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the -O or --open-files-in-pager flags. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2015/01/03/19 - http://www.securityfocus.com/bid/71499 - https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7 - https://github.com/gollum/gollum/issues/913 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10746.
CVE ID: CVE-2017-10746 Date Updated: 2024-08-05T17:50:11.193Z Date Published: 2017-07-05T19:00:00 Description: XnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .rle file, related to a "User Mode Write AV starting at ntdll_77df0000!RtlEnterCriticalSection+0x0000000000000012." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-10746 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21055.
CVE ID: CVE-2021-21055 Date Updated: 2024-09-16T16:13:10.606Z Date Published: 2021-02-11T20:12:37.844018Z Description: Adobe Dreamweaver versions 21.0 (and earlier) and 20.2 (and earlier) is affected by an untrusted search path vulnerability that could result in information disclosure. An attacker with physical access to the system could replace certain configuration files and dynamic libraries that Dreamweaver references, potentially resulting in information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/dreamweaver/apsb21-13.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2654.
CVE ID: CVE-2015-2654 Date Updated: 2024-08-06T05:24:38.063Z Date Published: 2015-07-16T10:00:00 Description: Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015-2624, CVE-2015-2626, CVE-2015-2640, CVE-2015-2656, CVE-2015-4754, CVE-2015-4764, CVE-2015-4775, CVE-2015-4776, CVE-2015-4777, CVE-2015-4778, CVE-2015-4780, CVE-2015-4781, CVE-2015-4782, CVE-2015-4783, CVE-2015-4784, CVE-2015-4785, CVE-2015-4786, CVE-2015-4787, CVE-2015-4789, and CVE-2015-4790. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1310.
CVE ID: CVE-2015-1310 Date Updated: 2024-08-06T04:40:18.489Z Date Published: 2015-01-22T16:00:00 Description: SQL injection vulnerability in SAP Adaptive Server Enterprise (Sybase ASE) allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka SAP Note 2113333. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://erpscan.io/press-center/blog/sap-critical-patch-update-january-2015/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0211.
CVE ID: CVE-2010-0211 Date Updated: 2024-08-07T00:37:54.224Z Date Published: 2010-07-27T22:00:00 Description: The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id?1024221 - http://support.apple.com/kb/HT4435 - http://security.gentoo.org/glsa/glsa-201406-36.xml - http://www.openldap.org/its/index.cgi/Software%20Bugs?id=6570 - http://www.vmware.com/security/advisories/VMSA-2011-0001.html - http://www.vupen.com/english/advisories/2010/1858 - http://secunia.com/advisories/40677 - http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - http://www.vupen.com/english/advisories/2010/1849 - http://www.securityfocus.com/bid/41770 - http://www.redhat.com/support/errata/RHSA-2010-0542.html - http://secunia.com/advisories/40687 - http://www.securityfocus.com/archive/1/515545/100/0/threaded - http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - http://www.redhat.com/support/errata/RHSA-2010-0543.html - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 - http://secunia.com/advisories/40639 - http://secunia.com/advisories/42787 - http://www.vupen.com/english/advisories/2011/0025 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36491.
CVE ID: CVE-2022-36491 Date Updated: 2024-08-03T10:07:34.033Z Date Published: 2022-08-25T13:55:42 Description: H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function UpdateIpv6Params. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-13543.
CVE ID: CVE-2019-13543 Date Updated: 2024-08-04T23:57:39.230Z Date Published: 2019-11-08T19:03:51 Description: Medtronic Valleylab Exchange Client version 3.4 and below, Valleylab FT10 Energy Platform (VLFT10GEN) software version 4.0.0 and below, and Valleylab FX8 Energy Platform (VLFX8GEN) software version 1.1.0 and below use multiple sets of hard-coded credentials. If discovered, they can be used to read files on the device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.us-cert.gov/ics/advisories/icsma-19-311-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1387.
CVE ID: CVE-2010-1387 Date Updated: 2024-08-07T01:21:19.034Z Date Published: 2010-06-18T16:00:00 Description: Use-after-free vulnerability in JavaScriptCore in WebKit in Apple iTunes before 9.2 on Windows, and Apple iOS before 4 on the iPhone and iPod touch, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to page transitions, a different vulnerability than CVE-2010-1763 and CVE-2010-1769. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 - http://support.apple.com/kb/HT4220 - http://www.vupen.com/english/advisories/2010/2722 - http://secunia.com/advisories/43068 - http://www.ubuntu.com/usn/USN-1006-1 - http://secunia.com/advisories/41856 - http://www.vupen.com/english/advisories/2011/0212 - http://support.apple.com/kb/HT4225 - http://secunia.com/advisories/40196 - http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - http://secunia.com/advisories/42314 - http://www.vupen.com/english/advisories/2010/1512 - https://exchange.xforce.ibmcloud.com/vulnerabilities/59506 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7061 - http://www.vupen.com/english/advisories/2011/0552 - http://www.securityfocus.com/bid/41016 - http://support.apple.com/kb/HT4456 - http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html - http://securitytracker.com/id?1024108 - http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2757.
CVE ID: CVE-2013-2757 Date Updated: 2024-08-06T15:44:33.609Z Date Published: 2014-05-23T14:00:00 Description: Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x before 3.0.6 Patch C does not properly restrict access to VNC ports on the management network, which allows remote attackers to have unspecified impact via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/92746 - http://support.citrix.com/article/CTX135815 - https://exchange.xforce.ibmcloud.com/vulnerabilities/83783 - http://www.securitytracker.com/id/1028473 - http://secunia.com/advisories/53204 - http://www.securityfocus.com/bid/59467 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-39273.
CVE ID: CVE-2022-39273 Date Updated: 2024-08-03T12:00:43.608Z Date Published: 2022-10-06T00:00:00 Description: FlyteAdmin is the control plane for the data processing platform Flyte. Users who enable the default Flyte’s authorization server without changing the default clientid hashes will be exposed to the public internet. In an effort to make enabling authentication easier for Flyte administrators, the default configuration for Flyte Admin allows access for Flyte Propeller even after turning on authentication via a hardcoded hashed password. This password is also set on the default Flyte Propeller configmap in the various Flyte Helm charts. Users who enable auth but do not override this setting in Flyte Admin’s configuration may unbeknownst to them be allowing public traffic in by way of this default password with attackers effectively impersonating propeller. This only applies to users who have not specified the ExternalAuthorizationServer setting. Usage of an external auth server automatically turns off this default configuration and are not susceptible to this vulnerability. This issue has been addressed in version 1.1.44. Users should manually set the staticClients in the selfAuthServer section of their configuration if they intend to rely on Admin’s internal auth server. Again, users who use an external auth server are automatically protected from this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-67x4-qr35-qvrm - https://github.com/flyteorg/flyteadmin/pull/478 - https://docs.flyte.org/en/latest/deployment/cluster_config/auth_setup.html#oauth2-authorization-server No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3798.
CVE ID: CVE-2020-3798 Date Updated: 2024-08-04T07:44:50.894Z Date Published: 2020-06-26T20:09:33 Description: Adobe Digital Editions versions 4.5.11.187212 and below have a file enumeration (host or local network) vulnerability. Successful exploitation could lead to information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/Digital-Editions/apsb20-23.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3711.
CVE ID: CVE-2016-3711 Date Updated: 2024-08-06T00:03:34.428Z Date Published: 2016-06-08T17:00:00 Description: HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin allows local users to obtain the internal IP address of a pod by reading the "OPENSHIFT_[namespace]_SERVERID" cookie. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2016:1064 - https://github.com/openshift/origin/pull/8334 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36146.
CVE ID: CVE-2024-36146 Date Updated: 2024-08-02T03:30:12.972Z Date Published: 2024-06-13T07:52:54.893Z Description: Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35947.
CVE ID: CVE-2022-35947 Date Updated: 2024-08-03T09:51:59.148Z Date Published: 2022-09-14T17:50:09 Description: GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions have been found to be vulnerable to a SQL injection attack which an attacker could leverage to simulate an arbitrary user login. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should disable the `Enable login with external token` API configuration. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/glpi-project/glpi/security/advisories/GHSA-7p3q-cffg-c8xh - https://github.com/glpi-project/glpi/commit/564309d2c1180d5ba1615f4bbaf6623df81b4962 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1967.
CVE ID: CVE-2011-1967 Date Updated: 2024-08-06T22:46:00.850Z Date Published: 2011-08-10T21:16:00 Description: Winsrv.dll in the Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly check permissions for sending inter-process device-event messages from low-integrity processes to high-integrity processes, which allows local users to gain privileges via a crafted application, aka "CSRSS Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-063 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12911 - http://www.us-cert.gov/cas/techalerts/TA11-221A.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-48830.
CVE ID: CVE-2023-48830 Date Updated: 2024-08-02T21:46:28.184Z Date Published: 2023-12-07T00:00:00 Description: Shuttle Booking Software 2.0 is vulnerable to CSV Injection in the Languages section via an export. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.phpjabbers.com/shuttle-booking-software/ - http://packetstormsecurity.com/files/176038 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2167.
CVE ID: CVE-2015-2167 Date Updated: 2024-08-06T05:10:14.456Z Date Published: 2015-04-06T15:00:00 Description: Open redirect vulnerability in the 3PI Manager in Ericsson Drutt Mobile Service Delivery Platform (MSDP) 4, 5, and 6 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter to jsp/start-3pi-manager.jsp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/131230/Ericsson-Drutt-MSDP-3PI-Manager-Open-Redirect.html - http://www.securityfocus.com/bid/73934 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-6321.
CVE ID: CVE-2020-6321 Date Updated: 2024-08-04T08:55:22.439Z Date Published: 2020-09-09T12:47:01 Description: SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated U3D file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.support.sap.com/#/notes/2960815 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700 - https://www.zerodayinitiative.com/advisories/ZDI-20-1140/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10614.
CVE ID: CVE-2016-10614 Date Updated: 2024-09-17T02:26:59.820Z Date Published: 2018-06-01T18:00:00Z Description: httpsync is a port of libcurl to node.js. httpsync downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nodesecurity.io/advisories/210 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32530.
CVE ID: CVE-2022-32530 Date Updated: 2024-08-03T07:46:43.411Z Date Published: 2022-06-24T13:00:17 Description: A CWE-668 Exposure of Resource to Wrong Sphere vulnerability exists that could cause users to be misled, hiding alarms, showing the wrong server connection option or the wrong control request when a mobile device has been compromised by a malicious application. Affected Product: Geo SCADA Mobile (Build 222 and prior) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-165-02_Geo_SCADA_Android_App_Security_Notification.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-25048.
CVE ID: CVE-2020-25048 Date Updated: 2024-08-04T15:26:09.415Z Date Published: 2020-08-31T20:25:45 Description: An issue was discovered on Samsung mobile devices with Q(10.0) (with ONEUI 2.1) software. In the Lockscreen state, the Quick Share feature allows unauthenticated downloads, aka file injection. The Samsung ID is SVE-2020-17760 (August 2020). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6804.
CVE ID: CVE-2013-6804 Date Updated: 2024-08-06T17:46:23.708Z Date Published: 2013-12-05T18:00:00 Description: Cross-site scripting (XSS) vulnerability in the Search module before 1.1.1 for Jamroom allows remote attackers to inject arbitrary web script or HTML via the search_string parameter to search/results/all/1/4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jamroom.net/the-jamroom-network/networkmarket/43/search/expanded_changelog=1 - https://www.htbridge.com/advisory/HTB23184 - http://secunia.com/advisories/55886 - https://www.jamroom.net/the-jamroom-network/tracker/128/xss-vulnerability-in-search-module No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23362.
CVE ID: CVE-2024-23362 Date Updated: 2024-09-05T03:56:03.375Z Date Published: 2024-09-02T10:22:29.332Z Description: Cryptographic issue while parsing RSA keys in COBR format. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3385.
CVE ID: CVE-2010-3385 Date Updated: 2024-09-17T02:32:21.349Z Date Published: 2010-10-20T17:00:00Z Description: TuxGuitar 1.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598307 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-13133.
CVE ID: CVE-2017-13133 Date Updated: 2024-08-05T18:58:12.525Z Date Published: 2017-08-23T03:00:00 Description: In ImageMagick 7.0.6-8, the load_level function in coders/xcf.c lacks offset validation, which allows attackers to cause a denial of service (load_tile memory exhaustion) via a crafted file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/100479 - https://security.gentoo.org/glsa/201711-07 - https://github.com/ImageMagick/ImageMagick/issues/679 - https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html - https://lists.debian.org/debian-lts-announce/2020/09/msg00007.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18197.
CVE ID: CVE-2017-18197 Date Updated: 2024-08-05T21:13:49.091Z Date Published: 2018-02-24T02:00:00 Description: In mxGraphViewImageReader.java in mxGraph before 3.7.6, the SAXParserFactory instance in convert() is missing flags to prevent XML External Entity (XXE) attacks, as demonstrated by /ServerView. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jgraph/mxgraph/issues/124 - https://lists.debian.org/debian-lts-announce/2018/03/msg00002.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20635.
CVE ID: CVE-2021-20635 Date Updated: 2024-08-03T17:45:45.340Z Date Published: 2021-02-12T06:15:41 Description: Improper restriction of excessive authentication attempts in LOGITEC LAN-WH450N/GR allows an attacker in the wireless range of the device to recover PIN and access the network. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.elecom.co.jp/news/security/20210126-01/ - https://jvn.jp/en/jp/JVN96783542/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9413.
CVE ID: CVE-2016-9413 Date Updated: 2024-08-06T02:50:37.728Z Date Published: 2017-01-31T22:00:00 Description: The Admin control panel in MyBB (aka MyBulletinBoard) before 1.8.7 and MyBB Merge System before 1.8.7 allows remote attackers to conduct clickjacking attacks via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/94395 - http://www.openwall.com/lists/oss-security/2016/11/18/1 - http://www.openwall.com/lists/oss-security/2016/11/10/8 - https://blog.mybb.com/2016/03/11/mybb-1-8-7-merge-system-1-8-7-release/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5780.
CVE ID: CVE-2008-5780 Date Updated: 2024-08-07T11:04:44.630Z Date Published: 2008-12-30T20:00:00 Description: Forest Blog 1.3.2 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing passwords via a direct request for blog.mdb. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/47359 - https://www.exploit-db.com/exploits/7466 - http://securityreason.com/securityalert/4842 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33086.
CVE ID: CVE-2023-33086 Date Updated: 2024-08-26T20:49:49.690Z Date Published: 2024-03-04T10:48:35.955Z Description: Transient DOS while processing multiple IKEV2 Informational Request to device from IPSEC server with different identifiers. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/march-2024-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8004.
CVE ID: CVE-2018-8004 Date Updated: 2024-09-16T18:29:48.650Z Date Published: 2018-08-29T13:00:00Z Description: There are multiple HTTP smuggling and cache poisoning issues when clients making malicious requests interact with Apache Traffic Server (ATS). This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/apache/trafficserver/pull/3201 - https://github.com/apache/trafficserver/pull/3251 - https://github.com/apache/trafficserver/pull/3192 - http://www.securityfocus.com/bid/105192 - https://www.debian.org/security/2018/dsa-4282 - https://lists.apache.org/thread.html/7df882eb09029a4460768a61f88a30c9c30c9dc88e9bcc6e19ba24d5%40%3Cusers.trafficserver.apache.org%3E - https://github.com/apache/trafficserver/pull/3231 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6313.
CVE ID: CVE-2018-6313 Date Updated: 2024-09-16T20:48:13.658Z Date Published: 2018-01-25T22:00:00Z Description: Cross-site scripting (XSS) in WBCE CMS 1.3.1 allows remote authenticated administrators to inject arbitrary web script or HTML via the Modify Page screen, a different issue than CVE-2017-2118. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/imsebao/404team/blob/master/wbce_cms_xss.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-10665.
CVE ID: CVE-2020-10665 Date Updated: 2024-08-04T11:06:10.628Z Date Published: 2020-03-18T18:45:38 Description: Docker Desktop allows local privilege escalation to NT AUTHORITY\SYSTEM because it mishandles the collection of diagnostics with Administrator privileges, leading to arbitrary DACL permissions overwrites and arbitrary file writes. This affects Docker Desktop Enterprise before 2.1.0.9, Docker Desktop for Windows Stable before 2.2.0.4, and Docker Desktop for Windows Edge before 2.2.2.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-002.md - https://docs.docker.com/release-notes/ - https://github.com/spaceraccoon/CVE-2020-10665 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17761.
CVE ID: CVE-2017-17761 Date Updated: 2024-08-05T20:59:17.670Z Date Published: 2017-12-19T21:00:00 Description: An issue was discovered on Ichano AtHome IP Camera devices. The device runs the "noodles" binary - a service on port 1300 that allows a remote (LAN) unauthenticated user to run arbitrary commands. This binary requires the "system" XML element for specifying the command. For example, a <system>id</system> command results in a <system_ack>ok</system_ack> response. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/102974 - https://blogs.securiteam.com/index.php/archives/3576 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4425.
CVE ID: CVE-2018-4425 Date Updated: 2024-08-05T05:11:22.814Z Date Published: 2019-04-03T17:43:18 Description: A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/kb/HT209107 - https://support.apple.com/kb/HT209193 - https://support.apple.com/kb/HT209106 - https://support.apple.com/kb/HT209139 - https://support.apple.com/kb/HT209108 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2468.
CVE ID: CVE-2009-2468 Date Updated: 2024-08-07T05:52:14.616Z Date Published: 2009-07-22T18:00:00 Description: Integer overflow in Apple CoreGraphics, as used in Safari before 4.0.3, Mozilla Firefox before 3.0.12, and Mac OS X 10.4.11 and 10.5.8, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long text run that triggers a heap-based buffer overflow during font glyph rendering, a related issue to CVE-2009-1194. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.apple.com/archives/security-announce/2009/Aug/msg00002.html - https://bugzilla.mozilla.org/show_bug.cgi?id=480134 - http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html - http://www.securityfocus.com/bid/35758 - http://www.securitytracker.com/id?1022717 - http://www.mozilla.org/security/announce/2009/mfsa2009-36.html - http://support.apple.com/kb/HT3865 - http://secunia.com/advisories/36701 - http://secunia.com/advisories/35914 - http://www.vupen.com/english/advisories/2009/1972 - http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 - http://support.apple.com/kb/HT3733 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22397.
CVE ID: CVE-2021-22397 Date Updated: 2024-08-03T18:44:12.942Z Date Published: 2021-08-02T16:24:40 Description: There is a privilege escalation vulnerability in Huawei ManageOne 8.0.0. External parameters of some files are lack of verification when they are be called. Attackers can exploit this vulnerability by performing these files to cause privilege escalation attack. This can compromise normal service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210714-01-pe-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14367.
CVE ID: CVE-2018-14367 Date Updated: 2024-08-05T09:29:51.054Z Date Published: 2018-07-19T02:00:00 Description: In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector could crash. This was addressed in epan/dissectors/packet-coap.c by properly checking for a NULL condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14966 - http://www.securitytracker.com/id/1041608 - https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81ce5fcb3e37a0aaeb7532f7a2a09366f16fa310 - https://www.wireshark.org/security/wnpa-sec-2018-42.html - http://www.securityfocus.com/bid/104847 - http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-21132.
CVE ID: CVE-2020-21132 Date Updated: 2024-08-04T14:22:25.497Z Date Published: 2021-07-12T12:45:44 Description: SQL Injection vulnerability in Metinfo 7.0.0beta in index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/SZFsir/tmpProject/issues/2 - https://www.mituo.cn/news/2473.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2419.
CVE ID: CVE-2023-2419 Date Updated: 2024-08-02T06:19:14.983Z Date Published: 2023-04-29T01:00:06.164Z Description: A vulnerability was found in Zhong Bang CRMEB 4.6.0. It has been declared as critical. This vulnerability affects the function videoUpload of the file \crmeb\app\services\system\attachment\SystemAttachmentServices.php. The manipulation of the argument filename leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227716. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.227716 - https://vuldb.com/?ctiid.227716 - https://github.com/crmeb/CRMEB/issues/77 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22890.
CVE ID: CVE-2021-22890 Date Updated: 2024-08-03T18:58:25.687Z Date Published: 2021-04-01T17:46:17 Description: curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/1129529 - https://curl.se/docs/CVE-2021-22890.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/ - https://security.gentoo.org/glsa/202105-36 - https://www.oracle.com//security-alerts/cpujul2021.html - https://security.netapp.com/advisory/ntap-20210521-0007/ - https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0791.
CVE ID: CVE-2018-0791 Date Updated: 2024-09-16T20:16:21.788Z Date Published: 2018-01-10T01:00:00Z Description: Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, and Microsoft Outlook 2016 allow a remote code execution vulnerability due to the way email messages are parsed, aka "Microsoft Outlook Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0793. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1040154 - http://www.securityfocus.com/bid/102383 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0791 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2511.
CVE ID: CVE-2008-2511 Date Updated: 2024-08-07T09:05:29.570Z Date Published: 2008-06-02T14:00:00 Description: Directory traversal vulnerability in the UmxEventCli.CachedAuditDataList.1 (aka UmxEventCliLib) ActiveX control in UmxEventCli.dll in CA Internet Security Suite 2008 allows remote attackers to create and overwrite arbitrary files via a .. (dot dot) in the argument to the SaveToFile method. NOTE: this can be leveraged for code execution by writing to a Startup folder. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/5682 - http://www.vupen.com/english/advisories/2008/1696/references - http://secunia.com/advisories/30420 - http://retrogod.altervista.org/9sg_CA_poc.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/42712 - http://www.securitytracker.com/id?1020129 - http://www.securityfocus.com/archive/1/492679/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52127.
CVE ID: CVE-2023-52127 Date Updated: 2024-09-04T19:54:52.383Z Date Published: 2024-01-05T08:52:47.172Z Description: Cross-Site Request Forgery (CSRF) vulnerability in WPClever WPC Product Bundles for WooCommerce.This issue affects WPC Product Bundles for WooCommerce: from n/a through 7.3.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/woo-product-bundle/wordpress-wpc-product-bundles-for-woocommerce-plugin-7-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4803.
CVE ID: CVE-2013-4803 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8835.
CVE ID: CVE-2016-8835 Date Updated: 2017-01-03T19:57:01 Date Published: 2017-01-03T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3076.
CVE ID: CVE-2008-3076 Date Updated: 2024-08-07T09:21:35.108Z Date Published: 2009-02-21T22:00:00 Description: The Netrw plugin 125 in netrw.vim in Vim 7.2a.10 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames used by the execute and system functions within the (1) mz and (2) mc commands, as demonstrated by the netrw.v2 and netrw.v3 test cases. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html - http://marc.info/?l=oss-security&m=122416184431388&w=2 - http://www.openwall.com/lists/oss-security/2008/10/20/2 - http://www.rdancer.org/vulnerablevim-netrw.html - http://www.redhat.com/support/errata/RHSA-2008-0580.html - http://secunia.com/advisories/34418 - http://www.openwall.com/lists/oss-security/2008/07/07/1 - http://www.securityfocus.com/bid/30115 - http://www.rdancer.org/vulnerablevim-netrw.v2.html - http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0324 - http://marc.info/?l=bugtraq&m=121494431426308&w=2 - http://www.openwall.com/lists/oss-security/2008/07/08/12 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506919 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43624 - http://www.openwall.com/lists/oss-security/2008/07/07/4 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:236 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0694.
CVE ID: CVE-2010-0694 Date Updated: 2024-08-07T00:59:38.516Z Date Published: 2010-02-23T18:00:00 Description: SQL injection vulnerability in the PerchaGallery (com_perchagallery) component before 1.5b for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an editunidad action to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://docs.joomla.org/Vulnerable_Extensions_List#New_format_Feed_Starts_Here - https://exchange.xforce.ibmcloud.com/vulnerabilities/55447 - http://packetstormsecurity.org/1001-exploits/joomlaperchagallery-sql.txt - http://www.securityfocus.com/bid/37642 - http://www.exploit-db.com/exploits/11024 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25832.
CVE ID: CVE-2022-25832 Date Updated: 2024-08-03T04:49:43.674Z Date Published: 2022-04-11T19:36:58 Description: Improper authentication vulnerability in S Secure prior to SMR Apr-2022 Release 1 allows physical attackers to use locked Myfiles app without authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41637.
CVE ID: CVE-2023-41637 Date Updated: 2024-10-01T17:05:31.540Z Date Published: 2023-08-31T00:00:00 Description: An arbitrary file upload vulnerability in the Carica immagine function of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted HTML file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41637%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27648.
CVE ID: CVE-2023-27648 Date Updated: 2024-08-02T12:16:36.906Z Date Published: 2023-04-14T00:00:00 Description: Directory Traversal vulnerability found in T-ME Studios Change Color of Keypad v.1.275.1.277 allows a remote attacker to execute arbitrary code via the dex file in the internal storage. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corporate.timmystudios.com/ - https://play.google.com/store/apps/details?id=com.jb.gokeyboard.theme.twchangecolorofkeypad - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27648/CVE%20detail.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12979.
CVE ID: CVE-2020-12979 Date Updated: 2021-06-11T21:44:04 Date Published: 2021-06-11T21:44:04 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-3566.
CVE ID: CVE-2021-3566 Date Updated: 2024-08-03T17:01:08.129Z Date Published: 2021-08-05T20:21:37 Description: Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_probe' function assigned to it. By crafting a legitimate "ffconcat" file that references an image, followed by a file the triggers the tty demuxer, the contents of the second file will be copied into the output file verbatim (as long as the `-vcodec copy` option is passed to ffmpeg). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f - https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4077.
CVE ID: CVE-2008-4077 Date Updated: 2024-08-07T10:00:42.863Z Date Published: 2008-09-15T15:00:00 Description: The CGI scripts in (1) LedgerSMB (LSMB) before 1.2.15 and (2) SQL-Ledger 2.8.17 and earlier allow remote attackers to cause a denial of service (resource exhaustion) via an HTTP POST request with a large Content-Length. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/31843 - http://www.securityfocus.com/bid/31109 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45033 - http://www.securityfocus.com/archive/1/496181/100/0/threaded - http://www.ledgersmb.org/node/70 - http://securityreason.com/securityalert/4250 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2958.
CVE ID: CVE-2019-2958 Date Updated: 2024-10-01T16:28:29.389Z Date Published: 2019-10-16T17:40:56 Description: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - https://security.netapp.com/advisory/ntap-20191017-0001/ - http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html - http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html - https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html - http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4259.
CVE ID: CVE-2010-4259 Date Updated: 2024-08-07T03:34:37.967Z Date Published: 2010-12-07T01:00:00 Description: Stack-based buffer overflow in FontForge 20100501 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long CHARSET_REGISTRY header in a BDF font file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/45162 - http://openwall.com/lists/oss-security/2010/12/02/8 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605537 - http://www.debian.org/security/2011/dsa-2253 - http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052219.html - http://secunia.com/advisories/42577 - http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052201.html - http://openwall.com/lists/oss-security/2010/12/02/5 - https://bugzilla.redhat.com/show_bug.cgi?id=659359 - http://www.exploit-db.com/exploits/15732 - http://www.vupen.com/english/advisories/2010/3200 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5178.
CVE ID: CVE-2024-5178 Date Updated: 2024-08-01T21:03:11.076Z Date Published: 2024-07-10T16:23:39.270Z Description: ServiceNow has addressed a sensitive file read vulnerability that was identified in the Washington DC, Vancouver, and Utah Now Platform releases. This vulnerability could allow an administrative user to gain unauthorized access to sensitive files on the web application server. The vulnerability is addressed in the listed patches and hot fixes, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648312 - https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3996.
CVE ID: CVE-2015-3996 Date Updated: 2024-08-06T06:04:02.823Z Date Published: 2015-10-27T16:00:00 Description: The default AFSecurityPolicy.validatesDomainName configuration for AFSSLPinningModeNone in the AFNetworking framework before 2.5.3, as used in the ownCloud iOS Library, disables verification of a server hostname against the domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/AFNetworking/AFNetworking/issues/2619 - https://owncloud.org/security/advisory/?id=oc-sa-2015-012 - https://github.com/AFNetworking/AFNetworking/releases/tag/2.5.3 - http://www.securityfocus.com/bid/76242 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35601.
CVE ID: CVE-2022-35601 Date Updated: 2024-08-03T09:36:44.402Z Date Published: 2022-08-18T01:21:48 Description: A SQL injection vulnerability in SupplierDAO.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via parameter searchTxt. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 - https://github.com/sazanrjb/InventoryManagementSystem No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-35362.
CVE ID: CVE-2023-35362 Date Updated: 2024-08-02T16:23:59.704Z Date Published: 2023-07-11T17:02:59.370Z Description: Windows Clip Service Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35362 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1153.
CVE ID: CVE-2015-1153 Date Updated: 2024-08-06T04:33:20.597Z Date Published: 2015-05-08T00:00:00 Description: WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1152 and CVE-2015-1154. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT205221 - https://support.apple.com/HT204826 - http://www.securityfocus.com/bid/74523 - http://support.apple.com/kb/HT204941 - http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html - http://www.securitytracker.com/id/1032270 - http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html - https://support.apple.com/kb/HT204949 - http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html - http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html - http://lists.apple.com/archives/security-announce/2015/May/msg00000.html - http://www.ubuntu.com/usn/USN-2937-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1900.
CVE ID: CVE-2017-1900 Date Updated: 2018-01-05T13:57:01 Date Published: 2018-01-05T14:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19262.
CVE ID: CVE-2019-19262 Date Updated: 2024-08-05T02:09:39.604Z Date Published: 2020-01-03T16:36:00 Description: GitLab Enterprise Edition (EE) 11.9 and later through 12.5 has Insecure Permissions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://about.gitlab.com/blog/categories/releases/ - https://about.gitlab.com/blog/2019/11/27/security-release-gitlab-12-5-1-released/ - https://about.gitlab.com/blog/2019/11/27/security-release-gitlab-12-5-2-released/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3036.
CVE ID: CVE-2008-3036 Date Updated: 2024-08-07T09:21:35.022Z Date Published: 2008-07-07T18:20:00 Description: Directory traversal vulnerability in index.php in CMS little 0.0.1 allows remote attackers to include and execute arbitrary local files, and probably remote files, via a .. (dot dot) in the template parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/43539 - http://www.securityfocus.com/bid/30061 - https://www.exploit-db.com/exploits/5992 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0877.
CVE ID: CVE-2023-0877 Date Updated: 2024-08-02T05:24:34.759Z Date Published: 2023-02-17T00:00:00 Description: Code Injection in GitHub repository froxlor/froxlor prior to 2.0.11. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/b29cf038-06f1-4fb0-9437-08f2991f92a8 - https://github.com/froxlor/froxlor/commit/aa48ffca2bcaf7ae57be3b8147bb3138abdab984 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1791.
CVE ID: CVE-2019-1791 Date Updated: 2024-09-16T20:17:32.844Z Date Published: 2019-05-15T20:15:27.487532Z Description: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to execute arbitrary commands with elevated privileges on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-cmdinj-1791 - http://www.securityfocus.com/bid/108390 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-23321.
CVE ID: CVE-2022-23321 Date Updated: 2024-08-03T03:36:20.341Z Date Published: 2022-02-10T18:11:16 Description: A persistent cross-site scripting (XSS) vulnerability exists on two input fields within the administrative panel when editing users in the XMPie UStore application on version 12.3.7244.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://xmpie.com - https://www.triaxiomsecurity.com/xmpie-ustore-vulnerabilities-discovered/ - https://www.xmpie.com/ustore-release-notes/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1563.
CVE ID: CVE-2024-1563 Date Updated: 2024-08-01T18:40:21.368Z Date Published: 2024-02-22T14:56:42.888Z Description: An attacker could have executed unauthorized scripts on top origin sites using a JavaScript URI when opening an external URL with a custom Firefox scheme and a timeout race condition. This vulnerability affects Focus for iOS < 122. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1863831 - https://www.mozilla.org/security/advisories/mfsa2024-09/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0911.
CVE ID: CVE-2016-0911 Date Updated: 2024-08-05T22:38:40.546Z Date Published: 2016-06-19T20:00:00 Description: EMC Data Domain OS 5.4 through 5.7 before 5.7.2.0 has a default no_root_squash option for NFS exports, which makes it easier for remote attackers to obtain filesystem access by leveraging client root privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1036079 - http://seclists.org/bugtraq/2016/Jun/50 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9481.
CVE ID: CVE-2020-9481 Date Updated: 2024-08-04T10:26:16.220Z Date Published: 2020-04-27T21:11:54 Description: Apache ATS 6.0.0 to 6.2.3, 7.0.0 to 7.1.9, and 8.0.0 to 8.0.6 is vulnerable to a HTTP/2 slow read attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread.html/r21ddaf0a4a973f3c43c7ff399ae50d2f858f13f87bd6a9551c5cf6db%40%3Cannounce.trafficserver.apache.org%3E - https://www.debian.org/security/2020/dsa-4672 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0625.
CVE ID: CVE-2013-0625 Date Updated: 2024-08-06T14:33:05.288Z Date Published: 2013-01-09T01:00:00 Description: Adobe ColdFusion 9.0, 9.0.1, and 9.0.2, when a password is not configured, allows remote attackers to bypass authentication and possibly execute arbitrary code via unspecified vectors, as exploited in the wild in January 2013. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/57164 - http://www.adobe.com/support/security/bulletins/apsb13-03.html - http://www.adobe.com/support/security/advisories/apsa13-01.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-45548.
CVE ID: CVE-2022-45548 Date Updated: 2024-08-03T14:17:03.790Z Date Published: 2022-12-06T00:00:00 Description: AyaCMS v3.1.2 has an Arbitrary File Upload vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/loadream/AyaCMS/issues/4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1000612.
CVE ID: CVE-2018-1000612 Date Updated: 2024-09-16T17:42:49.848Z Date Published: 2018-07-09T13:00:00Z Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2402.
CVE ID: CVE-2019-2402 Date Updated: 2024-10-02T16:23:24.438Z Date Published: 2019-01-16T19:00:00 Description: Vulnerability in the Oracle Hospitality Simphony component of Oracle Food and Beverage Applications. The supported version that is affected is 2.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Hospitality Simphony accessible data as well as unauthorized access to critical data or complete access to all Oracle Hospitality Simphony accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hospitality Simphony. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/106573 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4390.
CVE ID: CVE-2018-4390 Date Updated: 2024-08-05T05:11:22.802Z Date Published: 2020-10-27T19:18:38 Description: An inconsistent user interface issue was addressed with improved state management. This issue is fixed in macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan, watchOS 4.3, iOS 12.1. Processing a maliciously crafted text message may lead to UI spoofing. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT209192 - https://support.apple.com/en-us/HT208221 - https://support.apple.com/en-us/HT208696 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-29771.
CVE ID: CVE-2024-29771 Date Updated: 2024-08-02T01:17:56.832Z Date Published: 2024-03-27T12:58:25.517Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SoftLab Dracula Dark Mode - The Revolutionary Dark Mode Plugin For WordPress allows Stored XSS.This issue affects Dracula Dark Mode - The Revolutionary Dark Mode Plugin For WordPress: from n/a through 1.0.8. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/dracula-dark-mode/wordpress-dracula-dark-mode-ai-powered-automatic-dark-mode-for-wordpress-plugin-1-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7409.
CVE ID: CVE-2017-7409 Date Updated: 2024-08-05T16:04:11.175Z Date Published: 2017-04-21T02:11:00 Description: Palo Alto Networks PAN-OS before 7.0.15 has XSS in the GlobalProtect external interface via crafted request parameters, aka PAN-SA-2017-0011 and PAN-70674. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1038355 - http://www.securityfocus.com/bid/97953 - https://security.paloaltonetworks.com/CVE-2017-7409 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-23980.
CVE ID: CVE-2021-23980 Date Updated: 2024-08-03T19:14:09.990Z Date Published: 2023-02-16T00:00:00 Description: A mutation XSS affects users calling bleach.clean with all of: svg or math in the allowed tags p or br in allowed tags style, title, noscript, script, textarea, noframes, iframe, or xmp in allowed tags the keyword argument strip_comments=False Note: none of the above tags are in the default allowed tags and strip_comments defaults to True. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/mozilla/bleach/security/advisories/GHSA-vv2x-vrpj-qqpq - https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2021-23980 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-40812.
CVE ID: CVE-2021-40812 Date Updated: 2024-08-04T02:51:06.850Z Date Published: 2021-09-08T00:00:00 Description: The GD Graphics Library (aka LibGD) through 2.3.2 has an out-of-bounds read because of the lack of certain gdGetBuf and gdPutBuf return value checks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9 - https://github.com/libgd/libgd/issues/750#issuecomment-914872385 - https://lists.debian.org/debian-lts-announce/2024/04/msg00003.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0647.
CVE ID: CVE-2023-0647 Date Updated: 2024-08-02T05:17:50.330Z Date Published: 2023-02-02T13:27:57.263Z Description: A vulnerability, which was classified as critical, has been found in dst-admin 1.5.0. Affected by this issue is some unknown functionality of the file /home/kickPlayer. The manipulation of the argument userId leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-220034 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.220034 - https://vuldb.com/?ctiid.220034 - https://github.com/Ha0Liu/cveAdd/blob/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0kickPlayer%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/Dst-admin%201.5.0%20background%20kickPlayer%20interface%20remote%20command%20execution.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-36855.
CVE ID: CVE-2021-36855 Date Updated: 2024-09-17T00:26:27.648Z Date Published: 2022-09-30T16:53:48.407738Z Description: Cross-Site Scripting (XSS) via Cross-Site Request Forgery (CSRF) vulnerability in Booking Ultra Pro plugin <= 1.1.4 at WordPress. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/booking-ultra-pro/ - https://patchstack.com/database/vulnerability/booking-ultra-pro/wordpress-booking-ultra-pro-plugin-1-1-4-cross-site-scripting-xss-via-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4015.
CVE ID: CVE-2011-4015 Date Updated: 2024-08-06T23:53:32.678Z Date Published: 2012-05-02T10:00:00 Description: Cisco IOS 15.2S allows remote attackers to cause a denial of service (interface queue wedge) via malformed UDP traffic on port 465, aka Bug ID CSCts48300. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.cisco.com/en/US/docs/ios/15_2s/release/notes/15_2s_caveats_15_2_2s.html - http://www.securitytracker.com/id?1027005 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24510.
CVE ID: CVE-2021-24510 Date Updated: 2024-08-03T19:35:20.087Z Date Published: 2021-09-13T17:56:22 Description: The MF Gig Calendar WordPress plugin before 1.2 does not sanitise and escape the id GET parameter before outputting back in the admin dashboard when editing an Event, leading to a reflected Cross-Site Scripting issue No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/715721b0-13a1-413a-864d-2380f38ecd39 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0874.
CVE ID: CVE-2014-0874 Date Updated: 2024-08-06T09:27:20.281Z Date Published: 2014-02-28T02:00:00 Description: Cross-site scripting (XSS) vulnerability in IBM Content Navigator 2.x before 2.0.2.2-ICN-FP002 allows remote authenticated users to inject arbitrary web script or HTML via an unspecified parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21665362 - http://www.securityfocus.com/bid/65852 - http://www-01.ibm.com/support/docview.wss?uid=swg21668907 - https://exchange.xforce.ibmcloud.com/vulnerabilities/91002 - http://www.securitytracker.com/id/1030011 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11871.
CVE ID: CVE-2018-11871 Date Updated: 2024-08-05T08:24:03.046Z Date Published: 2018-10-29T18:00:00 Description: Buffer overwrite can happen in WLAN function while processing set pdev parameter command due to lack of input validation in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version IPQ4019, IPQ8064, IPQ8074, MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9378, QCA9379, QCA9531, QCA9558, QCA9563, QCA9880, QCA9886, QCA9980, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins - http://www.securityfocus.com/bid/107681 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16653.
CVE ID: CVE-2019-16653 Date Updated: 2024-08-05T01:17:41.178Z Date Published: 2020-04-29T13:02:10 Description: An application plugin in Genius Bytes Genius Server (Genius CDDS) 3.2.2 allows remote authenticated users to gain admin privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www2.deloitte.com/it/it/pages/risk/articles/security-advisory-article---deloitte-italy---risk.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4248.
CVE ID: CVE-2024-4248 Date Updated: 2024-08-01T20:33:53.173Z Date Published: 2024-04-27T10:31:04.307Z Description: A vulnerability was found in Tenda i21 1.0.0.14(4656) and classified as critical. This issue affects the function formQosManage_user. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-262139. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.262139 - https://vuldb.com/?ctiid.262139 - https://vuldb.com/?submit.319833 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_user.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12418.
CVE ID: CVE-2020-12418 Date Updated: 2024-08-04T11:56:51.647Z Date Published: 2020-07-09T14:19:50 Description: Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2020-24/ - https://www.mozilla.org/security/advisories/mfsa2020-26/ - https://www.mozilla.org/security/advisories/mfsa2020-25/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1641303 - http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html - http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html - http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html - http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html - https://usn.ubuntu.com/4421-1/ - https://security.gentoo.org/glsa/202007-09 - https://security.gentoo.org/glsa/202007-10 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.