instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2020-24524.
CVE ID: CVE-2020-24524 Date Updated: 2023-03-22T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13669.
CVE ID: CVE-2020-13669 Date Updated: 2024-08-04T12:25:16.406Z Date Published: 2022-02-11T15:25:12 Description: Cross-site Scripting (XSS) vulnerability in ckeditor of Drupal Core allows attacker to inject XSS. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10.; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.drupal.org/sa-core-2020-010 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4024.
CVE ID: CVE-2014-4024 Date Updated: 2024-08-06T11:04:28.082Z Date Published: 2018-03-19T21:00:00 Description: SSL virtual servers in F5 BIG-IP systems 10.x before 10.2.4 HF9, 11.x before 11.2.1 HF12, 11.3.0 before HF10, 11.4.0 before HF8, 11.4.1 before HF5, 11.5.0 before HF5, and 11.5.1 before HF5, when used with third-party Secure Sockets Layer (SSL) accelerator cards, might allow remote attackers to have unspecified impact via a timing side-channel attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/95834 - https://support.f5.com/csp/article/K15500 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8479.
CVE ID: CVE-2016-8479 Date Updated: 2024-08-06T02:20:31.343Z Date Published: 2017-03-08T01:00:00 Description: An elevation of privilege vulnerability in the Qualcomm GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31824853. References: QC-CR#1093687. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-03-01 - http://www.securitytracker.com/id/1037968 - http://www.securityfocus.com/bid/96801 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-31510.
CVE ID: CVE-2022-31510 Date Updated: 2024-08-03T07:19:06.156Z Date Published: 2022-07-11T00:54:24 Description: The sergeKashkin/Simple-RAT repository before 2022-05-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 - https://github.com/sergeKashkin/Simple-RAT/pull/11 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10774.
CVE ID: CVE-2018-10774 Date Updated: 2024-08-05T07:46:46.701Z Date Published: 2018-05-07T07:00:00 Description: Read access violation in the isiin_keyword function in isiin.c in libbibutils.a in bibutils through 6.2 allows remote attackers to cause a denial of service (application crash), as demonstrated by isi2xml. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.google.com/document/d/1BuCxbXaGL_3DyaWF8sGnMAWolmYQneRrxHt4mNPkBE4/edit No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0770.
CVE ID: CVE-2024-0770 Date Updated: 2024-08-01T18:18:18.456Z Date Published: 2024-01-21T23:00:05.982Z Description: A vulnerability, which was classified as critical, was found in European Chemicals Agency IUCLID 7.10.3 on Windows. Affected is an unknown function of the file iuclid6.exe of the component Desktop Installer. The manipulation leads to incorrect default permissions. The attack needs to be approached locally. VDB-251670 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.251670 - https://vuldb.com/?ctiid.251670 - https://imagebin.ca/v/7nx8zv3l62Kf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20134.
CVE ID: CVE-2021-20134 Date Updated: 2024-08-03T17:30:07.497Z Date Published: 2021-12-30T21:31:00 Description: Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set an arbitrary file on the router's filesystem as the log file used by either Quagga service (zebra or ripd). Subsequent log messages will be appended to the file, prefixed by a timestamp and some logging metadata. Remote code execution can be achieved by using this vulnerability to append to a shell script on the router's filesystem, and then awaiting or triggering the execution of that script. A remote, unauthenticated root shell can easily be obtained on the device in this fashion. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2021-44 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-31416.
CVE ID: CVE-2023-31416 Date Updated: 2024-09-09T16:16:37.729Z Date Published: 2023-10-26T18:46:21.531Z Description: Secret token configuration is never applied when using ECK <2.8 with APM Server >=8.0. This could lead to anonymous requests to an APM Server being accepted and the data ingested into this APM deployment. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://discuss.elastic.co/t/elastic-cloud-on-kubernetes-eck-2-8-security-update/343854 - https://www.elastic.co/community/security No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0462.
CVE ID: CVE-2008-0462 Date Updated: 2024-08-07T07:46:54.509Z Date Published: 2008-01-25T15:00:00 Description: Cross-site scripting (XSS) vulnerability in the Archive 5.x before 5.x-1.8 module for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://drupal.org/node/213478 - https://exchange.xforce.ibmcloud.com/vulnerabilities/39898 - http://www.vupen.com/english/advisories/2008/0278 - http://secunia.com/advisories/28632 - http://www.securityfocus.com/bid/27436 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-24416.
CVE ID: CVE-2023-24416 Date Updated: 2024-08-02T10:56:04.275Z Date Published: 2024-02-23T11:32:58.824Z Description: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Arne Franken All In One Favicon.This issue affects All In One Favicon: from n/a through 4.7. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/all-in-one-favicon/wordpress-all-in-one-favicon-plugin-4-7-arbitrary-file-deletion-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2018-8355
CVE-CVE-2018-8355 is a vulnerability in ChakraCore. It is related to the MITRE ATT&CK technique T1204.002: Malicious File. The vulnerability is classified as a exploitation_technique type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2018 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2019-5091.
CVE ID: CVE-2019-5091 Date Updated: 2024-08-04T19:47:56.254Z Date Published: 2019-12-11T23:46:56 Description: An exploitable denial-of-service vulnerability exists in the Dicom-packet parsing functionality of LEADTOOLS libltdic.so version 20.0.2019.3.15. A specially crafted packet can cause an infinite loop, resulting in a denial of service. An attacker can send a packet to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0883 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25977.
CVE ID: CVE-2024-25977 Date Updated: 2024-08-01T23:52:06.434Z Date Published: 2024-05-29T12:31:29.973Z Description: The application does not change the session token when using the login or logout functionality. An attacker can set a session token in the victim's browser (e.g. via XSS) and prompt the victim to log in (e.g. via a redirect to the login page). This results in the victim's account being taken over. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://r.sec-consult.com/hawki - https://github.com/HAWK-Digital-Environments/HAWKI/commit/146967f3148e92d1640ffebc21d8914e2d7fb3f1 - http://seclists.org/fulldisclosure/2024/May/34 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-46403.
CVE ID: CVE-2022-46403 Date Updated: 2024-08-03T14:31:46.326Z Date Published: 2022-12-19T00:00:00 Description: The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) mishandles reject messages. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.computer.org/csdl/proceedings/sp/2023/1He7WWuJExG - https://www.computer.org/csdl/proceedings-article/sp/2023/933600a521/1He7Yja1AYM - https://microchip.com - https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/deviating-behaviors-in-bluetooth-le No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-33050.
CVE ID: CVE-2024-33050 Date Updated: 2024-09-03T13:52:53.129Z Date Published: 2024-09-02T10:22:40.544Z Description: Transient DOS while parsing MBSSID during new IE generation in beacon/probe frame when IE length check is either missing or improper. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2644.
CVE ID: CVE-2013-2644 Date Updated: 2014-10-06T01:57:00 Date Published: 2014-10-05T01:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3625.
CVE ID: CVE-2020-3625 Date Updated: 2024-08-04T07:37:55.724Z Date Published: 2020-06-02T15:05:46 Description: When making query to DSP capabilities, Stack out of bounds occurs due to wrong buffer length configured for DSP attributes in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Mobile in SM8250, SXR2130 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/may-2020-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52888.
CVE ID: CVE-2023-52888 Date Updated: 2024-09-11T17:32:59.812Z Date Published: 2024-07-30T07:45:54.812Z Description: In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: Only free buffer VA that is not NULL In the MediaTek vcodec driver, while mtk_vcodec_mem_free() is mostly called only when the buffer to free exists, there are some instances that didn't do the check and triggered warnings in practice. We believe those checks were forgotten unintentionally. Add the checks back to fix the warnings. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/5c217253c76c94f76d1df31d0bbdcb88dc07be91 - https://git.kernel.org/stable/c/303d01082edaf817ee2df53a40dca9da637a2c04 - https://git.kernel.org/stable/c/eb005c801ec70ff4307727bd3bd6e8280169ef32 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-37373.
CVE ID: CVE-2022-37373 Date Updated: 2024-08-03T10:29:20.903Z Date Published: 2023-03-29T00:00:00 Description: This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-17810. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tracker-software.com/product/pdf-xchange-editor/history - https://www.zerodayinitiative.com/advisories/ZDI-22-1101/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1574.
CVE ID: CVE-2010-1574 Date Updated: 2024-08-07T01:28:42.825Z Date Published: 2010-07-08T18:00:00 Description: IOS 12.2(52)SE and 12.2(52)SE1 on Cisco Industrial Ethernet (IE) 3000 series switches has (1) a community name of public for RO access and (2) a community name of private for RW access, which makes it easier for remote attackers to modify the configuration or obtain potentially sensitive information via SNMP requests, aka Bug ID CSCtf25589. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/40407 - http://securitytracker.com/id?1024173 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3891f.shtml - http://www.kb.cert.org/vuls/id/732671 - http://www.vupen.com/english/advisories/2010/1754 - http://www.securityfocus.com/bid/41436 - http://osvdb.org/66120 - https://exchange.xforce.ibmcloud.com/vulnerabilities/60145 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21484.
CVE ID: CVE-2021-21484 Date Updated: 2024-08-03T18:16:22.549Z Date Published: 2021-03-09T14:11:24 Description: LDAP authentication in SAP HANA Database version 2.0 can be bypassed if the attached LDAP directory server is configured to enable unauthenticated bind. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107 - https://launchpad.support.sap.com/#/notes/3017378 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-8309.
CVE ID: CVE-2017-8309 Date Updated: 2024-08-05T16:34:22.556Z Date Published: 2017-05-23T03:56:00 Description: Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html - https://security.gentoo.org/glsa/201706-03 - http://www.securityfocus.com/bid/98302 - https://access.redhat.com/errata/RHSA-2017:2408 - https://lists.gnu.org/archive/html/qemu-devel/2017-04/msg05587.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47422.
CVE ID: CVE-2021-47422 Date Updated: 2024-08-04T05:39:59.509Z Date Published: 2024-05-21T15:04:09.947Z Description: In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/kms/nv50-: fix file release memory leak When using single_open() for opening, single_release() should be called, otherwise the 'op' allocated in single_open() will be leaked. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/65fff0a8efcdca8d84ffe3e23057c3b32403482d - https://git.kernel.org/stable/c/0b4e9fc14973a94ac0520f19b3633493ae13c912 - https://git.kernel.org/stable/c/0b3d4945cc7e7ea1acd52cb06dfa83bfe265b6d5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-44792.
CVE ID: CVE-2022-44792 Date Updated: 2024-08-03T14:01:31.305Z Date Published: 2022-11-07T00:00:00 Description: handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/net-snmp/net-snmp/issues/474 - https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428 - https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html - https://security.netapp.com/advisory/ntap-20230223-0011/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2698.
CVE ID: CVE-2011-2698 Date Updated: 2024-08-06T23:08:23.783Z Date Published: 2011-08-23T21:00:00 Description: Off-by-one error in the elem_cell_id_aux function in epan/dissectors/packet-ansi_a.c in the ANSI MAP dissector in Wireshark 1.4.x before 1.4.8 and 1.6.x before 1.6.1 allows remote attackers to cause a denial of service (infinite loop) via an invalid packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.wireshark.org/security/wnpa-sec-2011-10.html - https://bugzilla.redhat.com/show_bug.cgi?id=723215 - http://www.openwall.com/lists/oss-security/2011/07/19/5 - http://rhn.redhat.com/errata/RHSA-2013-0125.html - http://secunia.com/advisories/45574 - http://www.securityfocus.com/bid/49071 - http://secunia.com/advisories/48947 - http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063586.html - http://www.wireshark.org/security/wnpa-sec-2011-11.html - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6044 - http://anonsvn.wireshark.org/viewvc?view=revision&revision=37930 - http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063591.html - http://www.openwall.com/lists/oss-security/2011/07/20/2 - https://exchange.xforce.ibmcloud.com/vulnerabilities/69074 - http://secunia.com/advisories/45086 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14610 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-38284.
CVE ID: CVE-2022-38284 Date Updated: 2024-08-03T10:54:02.319Z Date Published: 2022-09-09T13:40:50 Description: JFinal CMS 5.1.0 is vulnerable to SQL Injection via /system/department/list. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jflyfox/jfinal_cms/issues/52 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0273.
CVE ID: CVE-2014-0273 Date Updated: 2024-08-06T09:13:09.455Z Date Published: 2014-02-12T02:00:00 Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0270, CVE-2014-0274, and CVE-2014-0288. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-010 - http://www.securityfocus.com/bid/65371 - http://www.securitytracker.com/id/1029741 - http://secunia.com/advisories/56796 - http://osvdb.org/103172 - https://exchange.xforce.ibmcloud.com/vulnerabilities/90763 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-35719.
CVE ID: CVE-2020-35719 Date Updated: 2024-08-04T17:09:15.205Z Date Published: 2021-01-11T02:55:15 Description: Reflected XSS in Quest Policy Authority 8.1.2.200 allows remote attackers to inject malicious code into the browser via a specially crafted link to the /WebCM/Applications/Search/index.jsp file via the added parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://un4gi.io/blog/multiple-vulnerabilities-in-quest-policy-authority-for-unified-communications - https://clandestinelabs.io/security-advisories/advisory-multiple-vulnerabilities-in-quest-policy-authority-for-unified-communications No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3375.
CVE ID: CVE-2012-3375 Date Updated: 2024-08-06T20:05:12.564Z Date Published: 2012-10-03T10:00:00 Description: The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://downloads.avaya.com/css/P8/documents/100165733 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24 - http://www.securitytracker.com/id?1027237 - https://github.com/torvalds/linux/commit/13d518074a952d33d47c428419693f63389547e9 - http://secunia.com/advisories/51164 - http://www.openwall.com/lists/oss-security/2012/07/04/2 - http://ubuntu.com/usn/usn-1529-1 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13d518074a952d33d47c428419693f63389547e9 - https://bugzilla.redhat.com/show_bug.cgi?id=837502 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33655.
CVE ID: CVE-2021-33655 Date Updated: 2024-08-03T23:58:22.899Z Date Published: 2022-07-18T14:45:50 Description: When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4 - http://www.openwall.com/lists/oss-security/2022/07/19/2 - https://www.debian.org/security/2022/dsa-5191 - https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11776.
CVE ID: CVE-2019-11776 Date Updated: 2024-08-04T23:03:32.740Z Date Published: 2019-08-09T18:41:16 Description: In Eclipse BIRT versions 1.0 to 4.7, the Report Viewer allows Reflected XSS in URL parameter. Attacker can execute the payload in victim's browser context. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.eclipse.org/bugs/show_bug.cgi?id=546816 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-3010.
CVE ID: CVE-2019-3010 Date Updated: 2024-09-30T17:06:24.591Z Date Published: 2019-10-16T17:40:59 Description: Vulnerability in the Oracle Solaris product of Oracle Systems (component: XScreenSaver). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - http://seclists.org/fulldisclosure/2019/Oct/39 - http://packetstormsecurity.com/files/154960/Solaris-xscreensaver-Privilege-Escalation.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7193.
CVE ID: CVE-2018-7193 Date Updated: 2024-08-05T06:24:10.501Z Date Published: 2018-03-27T17:00:00 Description: Cross-site scripting (XSS) vulnerability in /scp/directory.php in Enhancesoft osTicket before 1.10.2 allows remote attackers to inject arbitrary web script or HTML via the "order" parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.securityevaluators.com/vulnerabilities-found-in-popular-ticketing-system-dd273bda229c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2408.
CVE ID: CVE-2012-2408 Date Updated: 2024-08-06T19:34:25.814Z Date Published: 2012-09-12T10:00:00 Description: The AAC SDK in RealNetworks RealPlayer before 15.0.6.14, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer before 12.0.1.1750 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted AAC file that is not properly handled during decoding. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/78385 - http://service.real.com/realplayer/security/09072012_player/en/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33331.
CVE ID: CVE-2023-33331 Date Updated: 2024-08-27T15:03:50.481Z Date Published: 2023-12-18T22:39:43.019Z Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WooCommerce Product Vendors allows SQL Injection.This issue affects Product Vendors: from n/a through 2.1.76. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/woocommerce-product-vendors/wordpress-woocommerce-product-vendors-plugin-2-1-76-vendor-admin-sql-injection-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7518.
CVE ID: CVE-2016-7518 Date Updated: 2024-08-06T01:57:47.678Z Date Published: 2017-04-20T18:00:00 Description: The ReadSUNImage function in coders/sun.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted SUN file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ImageMagick/ImageMagick/issues/81 - http://www.openwall.com/lists/oss-security/2016/09/22/2 - http://www.securityfocus.com/bid/93130 - https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1533447 - https://bugzilla.redhat.com/show_bug.cgi?id=1378745 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2403.
CVE ID: CVE-2012-2403 Date Updated: 2024-08-06T19:34:25.816Z Date Published: 2012-04-21T23:00:00 Description: wp-includes/formatting.php in WordPress before 3.3.2 attempts to enable clickable links inside attributes, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/81463 - http://secunia.com/advisories/49138 - http://secunia.com/advisories/48957 - https://exchange.xforce.ibmcloud.com/vulnerabilities/75206 - http://www.debian.org/security/2012/dsa-2470 - http://core.trac.wordpress.org/changeset/20493/branches/3.3/wp-includes/capabilities.php - http://core.trac.wordpress.org/changeset/20493/branches/3.3/wp-includes/formatting.php - http://www.securityfocus.com/bid/53192 - http://wordpress.org/news/2012/04/wordpress-3-3-2/ - https://exchange.xforce.ibmcloud.com/vulnerabilities/75093 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1000165.
CVE ID: CVE-2018-1000165 Date Updated: 2024-08-05T12:33:49.352Z Date Published: 2018-04-18T19:00:00 Description: LightSAML version prior to 1.3.5 contains a Incorrect Access Control vulnerability in signature validation in readers in src/LightSaml/Model/XmlDSig/ that can result in impersonation of any user from Identity Provider. This vulnerability appears to have been fixed in 1.3.5 and later. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/lightSAML/lightSAML/commit/47cef07bb09779df15620799f3763d1b8d32307a - https://github.com/lightSAML/lightSAML/releases/tag/1.3.5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7045.
CVE ID: CVE-2019-7045 Date Updated: 2024-08-04T20:38:32.903Z Date Published: 2019-05-24T18:16:24 Description: Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-07.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-24520.
CVE ID: CVE-2020-24520 Date Updated: 2023-03-22T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-8404.
CVE ID: CVE-2024-8404 Date Updated: 2024-09-26T15:01:21.951Z Date Published: 2024-09-26T01:42:49.400Z Description: An arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server via the web-print-hot-folder. Important: In most installations, this risk is mitigated by the default Windows Server configuration, which restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log into the local console of the Windows environment hosting the PaperCut NG/MF application server. Note: This CVE has been split from CVE-2024-3037. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.papercut.com/kb/Main/Security-Bulletin-May-2024/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-35243.
CVE ID: CVE-2021-35243 Date Updated: 2024-09-16T17:18:45.942Z Date Published: 2021-12-23T19:48:34.603987Z Description: The HTTP PUT and DELETE methods were enabled in the Web Help Desk web server (12.7.7 and earlier), allowing users to execute dangerous HTTP requests. The HTTP PUT method is normally used to upload data that is saved on the server with a user-supplied URL. While the DELETE method requests that the origin server removes the association between the target resource and its current functionality. Improper use of these methods may lead to a loss of integrity. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35243 - https://support.solarwinds.com/SuccessCenter/s/article/Web-Help-Desk-12-7-7-Hotfix-1-Release-Notes?language=en_US No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-48791.
CVE ID: CVE-2023-48791 Date Updated: 2024-08-02T21:37:54.980Z Date Published: 2023-12-13T06:45:22.196Z Description: An improper neutralization of special elements used in a command ('Command Injection') vulnerability [CWE-77] in FortiPortal version 7.2.0, version 7.0.6 and below may allow a remote authenticated attacker with at least R/W permission to execute unauthorized commands via specifically crafted arguments in the Schedule System Backup page field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/psirt/FG-IR-23-425 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21411.
CVE ID: CVE-2021-21411 Date Updated: 2024-08-03T18:09:16.000Z Date Published: 2021-03-26T20:55:14 Description: OAuth2-Proxy is an open source reverse proxy that provides authentication with Google, Github or other providers. The `--gitlab-group` flag for group-based authorization in the GitLab provider stopped working in the v7.0.0 release. Regardless of the flag settings, authorization wasn't restricted. Additionally, any authenticated users had whichever groups were set in `--gitlab-group` added to the new `X-Forwarded-Groups` header to the upstream application. While adding GitLab project based authorization support in #630, a bug was introduced where the user session's groups field was populated with the `--gitlab-group` config entries instead of pulling the individual user's group membership from the GitLab Userinfo endpoint. When the session groups where compared against the allowed groups for authorization, they matched improperly (since both lists were populated with the same data) so authorization was allowed. This impacts GitLab Provider users who relies on group membership for authorization restrictions. Any authenticated users in your GitLab environment can access your applications regardless of `--gitlab-group` membership restrictions. This is patched in v7.1.0. There is no workaround for the Group membership bug. But `--gitlab-project` can be set to use Project membership as the authorization checks instead of groups; it is not broken. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7 - https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-652x-m2gr-hppm - https://github.com/oauth2-proxy/oauth2-proxy/commit/0279fa7dff1752f1710707dbd1ffac839de8bbfc - https://docs.gitlab.com/ee/user/group/ - https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.1.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21114.
CVE ID: CVE-2024-21114 Date Updated: 2024-08-15T15:01:08.041Z Date Published: 2024-04-16T21:26:36.879Z Description: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2024.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-14535.
CVE ID: CVE-2020-14535 Date Updated: 2024-09-27T18:43:44.231Z Date Published: 2020-07-15T17:34:26 Description: Vulnerability in the Oracle Commerce Service Center product of Oracle Commerce (component: Commerce Service Center). Supported versions that are affected are 11.1, 11.2 and prior to 11.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Commerce Service Center. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Commerce Service Center accessible data as well as unauthorized access to critical data or complete access to all Oracle Commerce Service Center accessible data. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujul2020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2787.
CVE ID: CVE-2012-2787 Date Updated: 2024-08-06T19:42:32.500Z Date Published: 2012-09-10T22:00:00 Description: Unspecified vulnerability in the decode_frame function in libavcodec/indeo4.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to the "setup width/height." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2012/09/02/4 - http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=01bf2ad7351fdaa2e21b6bdf963d22d6ffccb920 - http://libav.org/releases/libav-0.8.4.changelog - http://www.securityfocus.com/bid/55355 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:079 - http://www.openwall.com/lists/oss-security/2012/08/31/3 - http://ffmpeg.org/security.html - http://secunia.com/advisories/50468 - http://secunia.com/advisories/51257 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-31912.
CVE ID: CVE-2022-31912 Date Updated: 2024-08-03T07:32:54.663Z Date Published: 2022-06-16T14:57:49 Description: Online Tutor Portal Site v1.0 is vulnerable to SQL Injection via /otps/classes/Master.php?f=delete_team. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/mikeccltt/0525/blob/main/online-tutor-portal-site/sql.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30097.
CVE ID: CVE-2023-30097 Date Updated: 2024-08-02T14:21:44.563Z Date Published: 2023-05-04T00:00:00 Description: A stored cross-site scripting (XSS) vulnerability in TotalJS messenger commit b6cf1c9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the private task field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/totaljs/messenger/issues/9 - https://www.edoardoottavianelli.it/CVE-2023-30097/ - https://www.youtube.com/watch?v=VAlbkvOm_DU No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28311.
CVE ID: CVE-2022-28311 Date Updated: 2024-08-03T05:48:37.943Z Date Published: 2023-03-29T00:00:00 Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.034. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. Crafted data in a DXF file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16341. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0005 - https://www.zerodayinitiative.com/advisories/ZDI-22-601/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-37465.
CVE ID: CVE-2024-37465 Date Updated: 2024-08-02T03:57:39.049Z Date Published: 2024-07-21T21:24:36.259Z Description: Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Senol Sahin GPT3 AI Content Writer allows Stored XSS.This issue affects GPT3 AI Content Writer: from n/a through 1.8.66. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/gpt3-ai-content-generator/wordpress-ai-power-complete-ai-pack-powered-by-gpt-4-plugin-1-8-66-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2673.
CVE ID: CVE-2010-2673 Date Updated: 2024-09-17T03:07:56.892Z Date Published: 2010-07-08T22:00:00Z Description: SQL injection vulnerability in profile_view.php in Devana 1.6.6 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/11922 - http://secunia.com/advisories/39121 - http://packetstormsecurity.org/1003-exploits/devana-sql.txt - http://osvdb.org/63278 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43170.
CVE ID: CVE-2022-43170 Date Updated: 2024-08-03T13:26:02.529Z Date Published: 2022-10-28T00:00:00 Description: A stored cross-site scripting (XSS) vulnerability in the Dashboard Configuration feature (index.php?module=dashboard_configure/index) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking "Add info block". No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/anhdq201/rukovoditel/issues/6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2195.
CVE ID: CVE-2011-2195 Date Updated: 2024-08-06T22:53:17.304Z Date Published: 2021-10-26T12:10:00 Description: A flaw was found in WebSVN 2.3.2. Without prior authentication, if the 'allowDownload' option is enabled in config.php, an attacker can invoke the dl.php script and pass a well formed 'path' argument to execute arbitrary commands against the underlying operating system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://seclists.org/bugtraq/2011/Jun/34 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28154.
CVE ID: CVE-2024-28154 Date Updated: 2024-08-02T00:48:49.469Z Date Published: 2024-03-06T17:01:57.449Z Description: Jenkins MQ Notifier Plugin 1.4.0 and earlier logs potentially sensitive build parameters as part of debug information in build logs by default. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3180 - http://www.openwall.com/lists/oss-security/2024/03/06/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40211.
CVE ID: CVE-2022-40211 Date Updated: 2024-08-03T12:14:39.960Z Date Published: 2024-04-12T13:09:39.686Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GiveWP allows Stored XSS.This issue affects GiveWP: from n/a through 2.25.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/give/wordpress-givewp-plugin-2-25-1-cross-site-scripting-xss-via-render-dropdown-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6523.
CVE ID: CVE-2008-6523 Date Updated: 2024-08-07T11:34:46.925Z Date Published: 2009-03-25T18:00:00 Description: auth.php in openInvoice 0.90 beta and earlier allows remote attackers to bypass authentication and gain privileges by setting the oiauth cookie. NOTE: this can be leveraged with a separate vulnerability in resetpass.php to modify passwords for arbitrary users. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/5466 - https://exchange.xforce.ibmcloud.com/vulnerabilities/41947 - http://www.securityfocus.com/bid/28854 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9793.
CVE ID: CVE-2019-9793 Date Updated: 2024-08-04T22:01:54.816Z Date Published: 2019-04-26T16:13:22 Description: A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2019-07/ - https://www.mozilla.org/security/advisories/mfsa2019-08/ - https://www.mozilla.org/security/advisories/mfsa2019-11/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1528829 - https://access.redhat.com/errata/RHSA-2019:0966 - https://access.redhat.com/errata/RHSA-2019:1144 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39480.
CVE ID: CVE-2021-39480 Date Updated: 2024-08-04T02:06:42.443Z Date Published: 2022-01-21T21:32:21 Description: Bingrep v0.8.5 was discovered to contain a memory allocation failure which can cause a Denial of Service (DoS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/m4b/bingrep/issues/30 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34443.
CVE ID: CVE-2024-34443 Date Updated: 2024-08-02T02:51:11.453Z Date Published: 2024-06-19T14:53:54.645Z Description: Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ThemePunch OHG Slider Revolution allows Stored XSS.This issue affects Slider Revolution: from n/a before 6.7.11. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/revslider/wordpress-slider-revolution-plugin-6-7-11-cross-site-scripting-xss-vulnerability?_s_id=cve - https://patchstack.com/articles/unauthenticated-xss-vulnerability-patched-in-slider-revolution-plugin?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-1805.
CVE ID: CVE-2016-1805 Date Updated: 2024-08-05T23:10:39.617Z Date Published: 2016-05-20T10:00:00 Description: CoreStorage in Apple OS X before 10.11.5 allows attackers to execute arbitrary code in a privileged context via a crafted app. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT206567 - http://lists.apple.com/archives/security-announce/2016/May/msg00004.html - http://www.securityfocus.com/bid/90696 - http://www.securitytracker.com/id/1035895 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17567.
CVE ID: CVE-2017-17567 Date Updated: 2024-08-05T20:51:32.373Z Date Published: 2017-12-13T09:00:00 Description: Scubez Posty Readymade Classifieds has SQL Injection via the admin/user_activate_submit.php ID parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/d4wner/Vulnerabilities-Report/blob/master/Readymade%20Classifieds%20Script.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-3882.
CVE ID: CVE-2017-3882 Date Updated: 2024-08-05T14:39:41.430Z Date Published: 2017-05-16T17:00:00 Description: A vulnerability in the Universal Plug-and-Play (UPnP) implementation in the Cisco CVR100W Wireless-N VPN Router could allow an unauthenticated, Layer 2-adjacent attacker to execute arbitrary code or cause a denial of service (DoS) condition. The remote code execution could occur with root privileges. The vulnerability is due to incomplete range checks of the UPnP input data, which could result in a buffer overflow. An attacker could exploit this vulnerability by sending a malicious request to the UPnP listening port of the targeted device. An exploit could allow the attacker to cause the device to reload or potentially execute arbitrary code with root privileges. This vulnerability affects all firmware releases of the Cisco CVR100W Wireless-N VPN Router prior to Firmware Release 1.0.1.22. Cisco Bug IDs: CSCuz72642. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1038391 - http://www.securityfocus.com/bid/98287 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-cvr100w1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-14965.
CVE ID: CVE-2020-14965 Date Updated: 2024-08-04T13:00:51.997Z Date Published: 2020-06-23T13:30:13 Description: On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/g-rubert/CVE-2020-14965 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2997.
CVE ID: CVE-2010-2997 Date Updated: 2024-08-07T02:55:46.691Z Date Published: 2010-12-14T15:00:00 Description: Use-after-free vulnerability in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.0.1, Mac RealPlayer 11.0 through 11.1, Linux RealPlayer 11.0.2.1744, and possibly HelixPlayer 1.0.6 and other versions, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted StreamTitle tag in an ICY SHOUTcast stream, related to the SMIL file format. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.redhat.com/support/errata/RHSA-2010-0981.html - http://www.zerodayinitiative.com/advisories/ZDI-10-270 - http://www.securitytracker.com/id?1024861 - http://service.real.com/realplayer/security/12102010_player/en/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-2314.
CVE ID: CVE-2020-2314 Date Updated: 2024-08-04T07:09:54.158Z Date Published: 2020-11-04T14:35:43 Description: Jenkins AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2058 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43931.
CVE ID: CVE-2021-43931 Date Updated: 2024-08-04T04:10:17.161Z Date Published: 2021-12-06T17:40:45 Description: The authentication algorithm of the WebHMI portal is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://us-cert.cisa.gov/ics/advisories/icsa-21-336-03 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-42817.
CVE ID: CVE-2022-42817 Date Updated: 2024-08-03T13:19:04.547Z Date Published: 2022-11-01T00:00:00 Description: A logic issue was addressed with improved state management. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 16.1 and iPadOS 16, watchOS 9.1. Visiting a maliciously crafted website may leak sensitive data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213489 - https://support.apple.com/en-us/HT213491 - https://support.apple.com/en-us/HT213490 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5020.
CVE ID: CVE-2018-5020 Date Updated: 2024-08-05T05:26:45.575Z Date Published: 2018-07-20T19:00:00 Description: Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb18-21.html - http://www.securitytracker.com/id/1041250 - http://www.securityfocus.com/bid/104701 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3688.
CVE ID: CVE-2015-3688 Date Updated: 2024-08-06T05:47:58.307Z Date Published: 2015-07-03T01:00:00 Description: CoreText in Apple iOS before 8.4 and OS X before 10.10.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted text file, a different vulnerability than CVE-2015-3685, CVE-2015-3686, CVE-2015-3687, and CVE-2015-3689. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT205221 - http://www.securityfocus.com/bid/75491 - http://support.apple.com/kb/HT204941 - http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html - http://www.securitytracker.com/id/1032760 - http://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html - http://support.apple.com/kb/HT204942 - http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7912.
CVE ID: CVE-2017-7912 Date Updated: 2024-08-05T16:19:29.055Z Date Published: 2019-04-08T14:17:09 Description: Hanwha Techwin SRN-4000, SRN-4000 firmware versions prior to SRN4000_v2.16_170401, A specially crafted http request and response could allow an attacker to gain access to the device management page with admin privileges without proper authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-17-136-03 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17384.
CVE ID: CVE-2017-17384 Date Updated: 2024-08-05T20:51:31.028Z Date Published: 2017-12-07T08:00:00 Description: ISPConfig 3.x before 3.1.9 allows remote authenticated users to obtain root access by creating a crafted cron job. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ispconfig.org/blog/ispconfig-3-1-9-released-important-security-update/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1204.
CVE ID: CVE-2011-1204 Date Updated: 2024-08-06T22:21:34.185Z Date Published: 2011-03-11T01:00:00 Description: Google Chrome before 10.0.648.127 does not properly handle attributes, which allows remote attackers to cause a denial of service (DOM tree corruption) or possibly have unspecified other impact via a crafted document. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13585 - http://support.apple.com/kb/HT4981 - http://www.securityfocus.com/bid/46785 - http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html - http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/65968 - http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html - http://support.apple.com/kb/HT4999 - http://support.apple.com/kb/HT4808 - http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html - http://code.google.com/p/chromium/issues/detail?id=74030 - http://www.vupen.com/english/advisories/2011/0628 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-26507.
CVE ID: CVE-2020-26507 Date Updated: 2024-08-04T15:56:04.389Z Date Published: 2020-11-05T17:09:03 Description: A CSV Injection (also known as Formula Injection) vulnerability in the Marmind web application with version 4.1.141.0 allows malicious users to gain remote control of other computers. By providing formula code in the “Notes” functionality in the main screen, an attacker can inject a payload into the “Description” field under the “Insert To-Do” option. Other users might download this data, for example a CSV file, and execute the malicious commands on their computer by opening the file using a software such as Microsoft Excel. The attacker could gain remote access to the user’s PC. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.marmind.com/en/ - https://www2.deloitte.com/de/de/pages/risk/articles/marmind-csv-injection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15081.
CVE ID: CVE-2019-15081 Date Updated: 2024-08-05T00:34:53.276Z Date Published: 2019-08-15T14:25:18 Description: OpenCart 3.x, when the attacker has login access to the admin panel, allows stored XSS within the Source/HTML editing feature of the Categories, Product, and Information pages. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/nipunsomani/Opencart-3.x.x-Authenticated-Stored-XSS/blob/master/README.md - http://packetstormsecurity.com/files/154286/Opencart-3.x-Cross-Site-Scripting.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15296.
CVE ID: CVE-2017-15296 Date Updated: 2024-08-05T19:50:16.431Z Date Published: 2017-10-16T16:00:00 Description: The Java component in SAP CRM has CSRF. This is SAP Security Note 2478964. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://erpscan.io/advisories/erpscan-17-036-csrf-sap-java-crm/ - https://blogs.sap.com/2017/07/11/sap-security-patch-day-july-2017/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20109.
CVE ID: CVE-2022-20109 Date Updated: 2024-08-03T02:02:30.884Z Date Published: 2022-05-03T19:56:22 Description: In ion, there is a possible use after free due to improper update of reference count. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399915. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/May-2022 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15442.
CVE ID: CVE-2020-15442 Date Updated: 2021-05-27T20:13:10 Date Published: 2021-05-27T20:13:10 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2745.
CVE ID: CVE-2019-2745 Date Updated: 2024-10-01T16:44:37.672Z Date Published: 2019-07-23T22:31:43 Description: Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - https://usn.ubuntu.com/4080-1/ - http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html - http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html - https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html - https://kc.mcafee.com/corporate/index?page=content&id=SB10300 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2010-0840
CVE-CVE-2010-0840 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1204.002: Malicious File. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2010 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2015-4601.
CVE ID: CVE-2015-4601 Date Updated: 2024-08-06T06:18:12.007Z Date Published: 2016-05-16T10:00:00 Description: PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1032709 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - http://php.net/ChangeLog-5.php - http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=0c136a2abd49298b66acb0cad504f0f972f5bfe8 - http://www.securityfocus.com/bid/75246 - http://www.openwall.com/lists/oss-security/2015/06/16/12 - http://rhn.redhat.com/errata/RHSA-2015-1135.html - http://rhn.redhat.com/errata/RHSA-2015-1218.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0471.
CVE ID: CVE-2015-0471 Date Updated: 2024-08-06T04:10:10.952Z Date Published: 2015-04-16T16:00:00 Description: Unspecified vulnerability in Oracle Sun Solaris 10 and 11.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to libelfsign. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/74138 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html - http://www.securitytracker.com/id/1032132 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3956.
CVE ID: CVE-2022-3956 Date Updated: 2024-08-03T01:27:53.084Z Date Published: 2022-11-11T00:00:00 Description: A vulnerability classified as critical has been found in tsruban HHIMS 2.1. Affected is an unknown function of the component Patient Portrait Handler. The manipulation of the argument PID leads to sql injection. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. VDB-213462 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tsruban/HHIMS/issues/1 - https://vuldb.com/?id.213462 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18455.
CVE ID: CVE-2019-18455 Date Updated: 2024-08-05T01:54:14.450Z Date Published: 2019-11-26T16:26:48 Description: An issue was discovered in GitLab Community and Enterprise Edition 11 through 12.4 when building Nested GraphQL queries. It has a large or infinite loop. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://about.gitlab.com/blog/categories/releases/ - https://about.gitlab.com/blog/2019/10/30/security-release-gitlab-12-dot-4-dot-1-released/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21211.
CVE ID: CVE-2021-21211 Date Updated: 2024-08-03T18:01:14.426Z Date Published: 2021-04-26T16:25:59 Description: Inappropriate implementation in Navigation in Google Chrome on iOS prior to 90.0.4430.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html - https://crbug.com/1103119 - https://www.debian.org/security/2021/dsa-4906 - https://security.gentoo.org/glsa/202104-08 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0204.
CVE ID: CVE-2024-0204 Date Updated: 2024-08-01T17:41:15.984Z Date Published: 2024-01-22T18:05:13.194Z Description: Authentication bypass in Fortra's GoAnywhere MFT prior to 7.4.1 allows an unauthorized user to create an admin user via the administration portal. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.fortra.com/security/advisory/fi-2024-001 - https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml - http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html - http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33946.
CVE ID: CVE-2022-33946 Date Updated: 2024-08-03T08:16:15.977Z Date Published: 2023-02-16T20:00:13.217Z Description: Improper authentication in the Intel(R) SUR software before version 2.4.8902 may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00729.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24574.
CVE ID: CVE-2021-24574 Date Updated: 2024-08-03T19:35:20.295Z Date Published: 2021-08-23T11:10:18 Description: The Simple Banner WordPress plugin before 2.10.4 does not sanitise and escape one of its settings, allowing high privilege users such as admin to use Cross-Site Scripting payload even when the unfiltered_html capability is disallowed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/9adf7022-5108-43b7-bf0e-a42593185b74 - https://plugins.trac.wordpress.org/changeset/2571047/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49376.
CVE ID: CVE-2023-49376 Date Updated: 2024-08-02T21:53:45.226Z Date Published: 2023-12-05T00:00:00 Description: JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/tag/delete. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/cui2shark/cms/blob/main/Delete%20existing%20CSRF%20in%20label%20management.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7032.
CVE ID: CVE-2020-7032 Date Updated: 2024-09-17T01:45:48.139Z Date Published: 2020-11-13T00:20:14.764716Z Description: An XML external entity (XXE) vulnerability in Avaya WebLM admin interface allows authenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. Affected versions of Avaya WebLM include: 7.0 through 7.1.3.6 and 8.0 through 8.1.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://downloads.avaya.com/css/P8/documents/101072249 - http://seclists.org/fulldisclosure/2020/Nov/31 - http://packetstormsecurity.com/files/160123/Avaya-Web-License-Manager-XML-Injection.html - https://sec-consult.com/vulnerability-lab/advisory/blind-out-of-band-xml-external-entity-injection-in-avaya-web-license-manager/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-47522.
CVE ID: CVE-2023-47522 Date Updated: 2024-08-02T21:09:37.363Z Date Published: 2023-11-14T21:36:31.992Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Photo Feed plugin <= 2.2.1 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/photo-feed/wordpress-photo-feed-plugin-2-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-22152.
CVE ID: CVE-2020-22152 Date Updated: 2024-08-04T14:51:10.472Z Date Published: 2023-07-03T00:00:00 Description: Cross Site Scripting vulnerability in daylight studio FUEL- CMS v.1.4.6 allows a remote attacker to execute arbitrary code via the page title, meta description and meta keywords of the pages function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/daylightstudio/FUEL-CMS/issues/552 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-22158.
CVE ID: CVE-2020-22158 Date Updated: 2024-08-04T14:51:10.315Z Date Published: 2020-09-14T15:23:51 Description: MediaKind (formerly Ericsson) RX8200 5.13.3 devices are vulnerable to multiple reflected and stored XSS. An attacker has to inject JavaScript code directly in the "path" or "Services+ID" parameters and send the URL to a user in order to exploit reflected XSS. In the case of stored XSS, an attacker must modify the "name" parameter with the malicious code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sku11army.blogspot.com/2020/02/ericsson-multiple-stored-reflected-xss.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3069.
CVE ID: CVE-2013-3069 Date Updated: 2024-08-06T16:00:10.066Z Date Published: 2014-04-25T17:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in NETGEAR WNDR4700 with firmware 1.0.0.34 allow remote authenticated users to inject arbitrary web script or HTML via the (1) UserName or (2) Password to the NAS User Setup page, (3) deviceName to USB_advanced.htm, or (4) Network Key to the Wireless Setup page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf - http://osvdb.org/92557 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-25711.
CVE ID: CVE-2020-25711 Date Updated: 2024-08-04T15:40:36.665Z Date Published: 2020-12-03T00:00:00 Description: A flaw was found in infinispan 10 REST API, where authorization permissions are not checked while performing some server management operations. When authz is enabled, any user with authentication can perform operations like shutting down the server without the ADMIN role. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1897618 - https://security.netapp.com/advisory/ntap-20220210-0023/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0778.
CVE ID: CVE-2017-0778 Date Updated: 2024-09-17T03:53:40.182Z Date Published: 2017-09-08T20:00:00Z Description: A information disclosure vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2. Android ID: A-62133227. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/100649 - https://source.android.com/security/bulletin/2017-09-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21571.
CVE ID: CVE-2023-21571 Date Updated: 2024-08-02T09:44:01.391Z Date Published: 2023-02-14T19:32:53.419Z Description: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21571 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2013-5576
CVE-CVE-2013-5576 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1505.003: Web Shell. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2013 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2016-7034.
CVE ID: CVE-2016-7034 Date Updated: 2024-08-06T01:50:46.810Z Date Published: 2016-09-07T18:00:00 Description: The dashbuilder in Red Hat JBoss BPM Suite 6.3.2 does not properly handle CSRF tokens generated during an active session and includes them in query strings, which makes easier for remote attackers to (1) bypass CSRF protection mechanisms or (2) conduct cross-site request forgery (CSRF) attacks by obtaining an old token. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2017-0557.html - https://access.redhat.com/errata/RHSA-2018:0296 - https://bugzilla.redhat.com/show_bug.cgi?id=1373347 - http://www.securityfocus.com/bid/92760 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.