instruction stringlengths 49 63 ⌀ | input stringlengths 0 69 | output stringlengths 221 18.7k |
|---|---|---|
Provide detailed information about CVE-2016-8205. | CVE ID: CVE-2016-8205
Date Updated: 2024-08-06T02:13:21.873Z
Date Published: 2017-01-14T19:00:00
Description:
A Directory Traversal vulnerability in DashboardFileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to upload a malicious file in a section of the file system where it can be executed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.zerodayinitiative.com/advisories/ZDI-17-050
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-178
- http://www.securityfocus.com/bid/95694
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-2253. | CVE ID: CVE-2021-2253
Date Updated: 2024-09-26T15:02:22.930Z
Date Published: 2021-04-22T21:53:56
Description:
Vulnerability in the Oracle Advanced Supply Chain Planning product of Oracle Supply Chain (component: Core). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Supply Chain Planning. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Advanced Supply Chain Planning accessible data as well as unauthorized access to critical data or complete access to all Oracle Advanced Supply Chain Planning accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpuapr2021.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-18289. | CVE ID: CVE-2017-18289
Date Updated: 2024-09-16T20:02:23.024Z
Date Published: 2018-06-12T18:00:00Z
Description:
An issue was discovered in PvPGN Stats 2.4.6. SQL Injection exist in ladder/stats.php via the GET type parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://rchase.com/blog/posts/pvpgn-stats-multiple-sql-injection-vulnerabilities/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-2998. | CVE ID: CVE-2022-2998
Date Updated: 2024-08-03T00:53:00.650Z
Date Published: 2022-09-26T15:01:18
Description:
Use after free in Browser Creation in Google Chrome prior to 104.0.5112.101 allowed a remote attacker who had convinced a user to engage in a specific UI interaction to potentially exploit heap corruption via a crafted HTML page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html
- https://crbug.com/1329794
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the MITRE ATT&CK technique T1068 | The MITRE ATT&CK technique T1068: Exploitation for Privilege Escalation is related to the vulnerability CVE-CVE-2010-1592. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized. |
Provide detailed information about CVE-2022-3064. | CVE ID: CVE-2022-3064
Date Updated: 2024-08-03T01:00:10.262Z
Date Published: 2022-12-27T21:17:41.860Z
Description:
Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/go-yaml/yaml/commit/f221b8435cfb71e54062f6c6e99e9ade30b124d5
- https://github.com/go-yaml/yaml/releases/tag/v2.2.4
- https://pkg.go.dev/vuln/GO-2022-0956
- https://lists.debian.org/debian-lts-announce/2023/07/msg00001.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4SBIUECMLNC572P23DDOKJNKPJVX26SP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3XC47AUW5J5M2ULJX7WCCL3B2ETLMT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANIOPUXWIHVRA6CEWXCGOMX3YYS6KFHG/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-1853. | CVE ID: CVE-2009-1853
Date Updated: 2024-08-07T05:27:54.792Z
Date Published: 2009-06-01T19:00:00
Description:
Multiple SQL injection vulnerabilities in index.php in Kensei Board 2.0 BETA (aka 2.0.0b) and earlier allow remote attackers to execute arbitrary SQL commands via the (1) f and (2) t parameters in a showforum action.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/8802
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50747
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-52478. | CVE ID: CVE-2023-52478
Date Updated: 2024-08-15T19:25:22.271Z
Date Published: 2024-02-29T05:43:10.698Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect
hidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)
races when it races with itself.
hidpp_connect_event() primarily runs from a workqueue but it also runs
on probe() and if a "device-connected" packet is received by the hw
when the thread running hidpp_connect_event() from probe() is waiting on
the hw, then a second thread running hidpp_connect_event() will be
started from the workqueue.
This opens the following races (note the below code is simplified):
1. Retrieving + printing the protocol (harmless race):
if (!hidpp->protocol_major) {
hidpp_root_get_protocol_version()
hidpp->protocol_major = response.rap.params[0];
}
We can actually see this race hit in the dmesg in the abrt output
attached to rhbz#2227968:
[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.
[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.
Testing with extra logging added has shown that after this the 2 threads
take turn grabbing the hw access mutex (send_mutex) so they ping-pong
through all the other TOCTOU cases managing to hit all of them:
2. Updating the name to the HIDPP name (harmless race):
if (hidpp->name == hdev->name) {
...
hidpp->name = new_name;
}
3. Initializing the power_supply class for the battery (problematic!):
hidpp_initialize_battery()
{
if (hidpp->battery.ps)
return 0;
probe_battery(); /* Blocks, threads take turns executing this */
hidpp->battery.desc.properties =
devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);
hidpp->battery.ps =
devm_power_supply_register(&hidpp->hid_dev->dev,
&hidpp->battery.desc, cfg);
}
4. Creating delayed input_device (potentially problematic):
if (hidpp->delayed_input)
return;
hidpp->delayed_input = hidpp_allocate_input(hdev);
The really big problem here is 3. Hitting the race leads to the following
sequence:
hidpp->battery.desc.properties =
devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);
hidpp->battery.ps =
devm_power_supply_register(&hidpp->hid_dev->dev,
&hidpp->battery.desc, cfg);
...
hidpp->battery.desc.properties =
devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);
hidpp->battery.ps =
devm_power_supply_register(&hidpp->hid_dev->dev,
&hidpp->battery.desc, cfg);
So now we have registered 2 power supplies for the same battery,
which looks a bit weird from userspace's pov but this is not even
the really big problem.
Notice how:
1. This is all devm-maganaged
2. The hidpp->battery.desc struct is shared between the 2 power supplies
3. hidpp->battery.desc.properties points to the result from the second
devm_kmemdup()
This causes a use after free scenario on USB disconnect of the receiver:
1. The last registered power supply class device gets unregistered
2. The memory from the last devm_kmemdup() call gets freed,
hidpp->battery.desc.properties now points to freed memory
3. The first registered power supply class device gets unregistered,
this involves sending a remove uevent to userspace which invokes
power_supply_uevent() to fill the uevent data
4. power_supply_uevent() uses hidpp->battery.desc.properties which
now points to freed memory leading to backtraces like this one:
Sep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08
...
Sep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event
Sep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0
...
Sep 22 20:01:35 eric kernel: ? asm_exc_page_fault+0x26/0x30
Sep 22 20:01:35 eric kernel: ? power_supply_uevent+0xee/0x1d0
Sep 22 20:01:35 eric kernel: ? power_supply_uevent+0x10d/0x1d0
Sep 22 20:01:35 eric kernel: dev_uevent+0x10f/0x2d0
Sep 22 20:01:35 eric kernel: kobject_uevent_env+0x291/0x680
Sep 22 20:01:35 eric kernel:
---truncated---
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
- https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
- https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
- https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
- https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
- https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
- https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
- https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-39471. | CVE ID: CVE-2023-39471
Date Updated: 2024-08-02T18:10:20.683Z
Date Published: 2024-05-03T02:10:38.498Z
Description:
TP-Link TL-WR841N ated_tp Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the ated_tp service. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21825.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-23-1624/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-0040. | CVE ID: CVE-2019-0040
Date Updated: 2024-09-16T19:00:02.889Z
Date Published: 2019-04-10T20:13:51.499559Z
Description:
On Junos OS, rpcbind should only be listening to port 111 on the internal routing instance (IRI). External packets destined to port 111 should be dropped. Due to an information leak vulnerability, responses were being generated from the source address of the management interface (e.g. fxp0) thus disclosing internal addressing and existence of the management interface itself. A high rate of crafted packets destined to port 111 may also lead to a partial Denial of Service (DoS). Note: Systems with fxp0 disabled or unconfigured are not vulnerable to this issue. This issue only affects Junos OS releases based on FreeBSD 10 or higher (typically Junos OS 15.1+). Administrators can confirm whether systems are running a version of Junos OS based on FreeBSD 10 or higher by typing: user@junos> show version | match kernel JUNOS OS Kernel 64-bit [20181214.223829_fbsd-builder_stable_10] Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X53 versions prior to 15.1X53-D236; 16.1 versions prior to 16.1R7-S1; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8; 17.3 versions prior to 17.3R2; 17.4 versions prior to 17.4R1-S1, 17.4R1-S7, 17.4R2. This issue does not affect Junos OS releases prior to 15.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.juniper.net/JSA10929
- http://www.securityfocus.com/bid/107902
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-12012. | CVE ID: CVE-2018-12012
Date Updated: 2024-08-05T08:24:03.622Z
Date Published: 2019-05-24T16:44:16
Description:
While updating blacklisting region shared buffered memory region is not validated against newly updated black list, causing boot-up to be compromised in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SD 8CX, SXR1130
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-12012
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-3238. | CVE ID: CVE-2011-3238
Date Updated: 2024-08-06T23:29:56.560Z
Date Published: 2011-10-12T18:00:00
Description:
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://osvdb.org/76384
- https://exchange.xforce.ibmcloud.com/vulnerabilities/70515
- http://support.apple.com/kb/HT4981
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17212
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00004.html
- http://www.securityfocus.com/bid/50066
- http://support.apple.com/kb/HT5000
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-50777. | CVE ID: CVE-2023-50777
Date Updated: 2024-08-02T22:23:43.907Z
Date Published: 2023-12-13T17:30:21.995Z
Description:
Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier does not mask PaaSLane authentication tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3182
- http://www.openwall.com/lists/oss-security/2023/12/13/4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-45826. | CVE ID: CVE-2024-45826
Date Updated: 2024-09-12T14:58:34.096Z
Date Published: 2024-09-12T14:33:44.373Z
Description:
CVE-2024-45826 IMPACT
Due to improper input validation, a path traversal and remote code execution vulnerability exists when the ThinManager® processes a crafted POST request. If exploited, a user can install an executable file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1700.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-9403. | CVE ID: CVE-2024-9403
Date Updated: 2024-10-01T18:40:25.359Z
Date Published: 2024-10-01T15:13:22.837Z
Description:
Memory safety bugs present in Firefox 130. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 131 and Thunderbird < 131.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.mozilla.org/show_bug.cgi?id=1917807
- https://www.mozilla.org/security/advisories/mfsa2024-46/
- https://www.mozilla.org/security/advisories/mfsa2024-50/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-45637. | CVE ID: CVE-2023-45637
Date Updated: 2024-09-10T17:59:35.364Z
Date Published: 2023-10-24T11:02:56.092Z
Description:
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in EventPrime EventPrime – Events Calendar, Bookings and Tickets plugin <= 3.1.5 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/eventprime-event-calendar-management/wordpress-eventprime-plugin-3-1-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-12758. | CVE ID: CVE-2017-12758
Date Updated: 2024-08-05T18:51:05.606Z
Date Published: 2019-05-09T17:20:47
Description:
https://www.joomlaextensions.co.in/ Joomla! Component Appointment 1.1 is affected by: SQL Injection. The impact is: Code execution (remote). The component is: com_appointment component.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://joomlaextension.biz/appointment/
- https://www.exploit-db.com/exploits/42492
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-7504. | CVE ID: CVE-2016-7504
Date Updated: 2024-08-06T01:57:47.645Z
Date Published: 2016-10-29T01:00:00
Description:
A use-after-free vulnerability was observed in Rp_toString function of Artifex Software, Inc. MuJS before 5c337af4b3df80cf967e4f9f6a21522de84b392a. A successful exploitation of this issue can lead to code execution or denial of service condition.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://bugs.ghostscript.com/show_bug.cgi?id=697142
- http://www.securityfocus.com/bid/94241
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-2487. | CVE ID: CVE-2024-2487
Date Updated: 2024-08-08T20:48:48.983Z
Date Published: 2024-03-15T08:31:04.506Z
Description:
A vulnerability was found in Tenda AC18 15.03.05.05. It has been declared as critical. This vulnerability affects the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName/mac leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-256894 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.256894
- https://vuldb.com/?ctiid.256894
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetDeviceName_devName.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-28055. | CVE ID: CVE-2023-28055
Date Updated: 2024-09-24T13:20:14.242Z
Date Published: 2023-09-26T13:35:38.352Z
Description:
Dell NetWorker, Version 19.7 has an improper authorization vulnerability in the NetWorker client. An unauthenticated attacker within the same network could potentially exploit this by manipulating a command leading to gain of complete access to the server file further resulting in information leaks, denial of service, and arbitrary code execution. Dell recommends customers to upgrade at the earliest opportunity.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.dell.com/support/kbdoc/en-us/000218003/dsa-2023-294-security-update-for-dell-networker-nw-client-vulnerabilities
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-7805. | CVE ID: CVE-2015-7805
Date Updated: 2024-08-06T07:58:59.971Z
Date Published: 2015-11-17T15:00:00
Description:
Heap-based buffer overflow in libsndfile 1.0.25 allows remote attackers to have unspecified impact via the headindex value in the header in an AIFF file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2015/11/03/7
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00077.html
- http://www.securityfocus.com/bid/77427
- http://packetstormsecurity.com/files/133926/libsndfile-1.0.25-Heap-Overflow.html
- http://www.ubuntu.com/usn/USN-2832-1
- https://security.gentoo.org/glsa/201612-03
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172607.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html
- http://www.openwall.com/lists/oss-security/2015/11/03/3
- http://www.nemux.org/2015/10/13/libsndfile-1-0-25-heap-overflow/
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172593.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171466.html
- https://www.exploit-db.com/exploits/38447/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-26815. | CVE ID: CVE-2024-26815
Date Updated: 2024-09-11T17:33:41.649Z
Date Published: 2024-04-10T11:07:03.182Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check
taprio_parse_tc_entry() is not correctly checking
TCA_TAPRIO_TC_ENTRY_INDEX attribute:
int tc; // Signed value
tc = nla_get_u32(tb[TCA_TAPRIO_TC_ENTRY_INDEX]);
if (tc >= TC_QOPT_MAX_QUEUE) {
NL_SET_ERR_MSG_MOD(extack, "TC entry index out of range");
return -ERANGE;
}
syzbot reported that it could fed arbitary negative values:
UBSAN: shift-out-of-bounds in net/sched/sch_taprio.c:1722:18
shift exponent -2147418108 is negative
CPU: 0 PID: 5066 Comm: syz-executor367 Not tainted 6.8.0-rc7-syzkaller-00136-gc8a5c731fd12 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
ubsan_epilogue lib/ubsan.c:217 [inline]
__ubsan_handle_shift_out_of_bounds+0x3c7/0x420 lib/ubsan.c:386
taprio_parse_tc_entry net/sched/sch_taprio.c:1722 [inline]
taprio_parse_tc_entries net/sched/sch_taprio.c:1768 [inline]
taprio_change+0xb87/0x57d0 net/sched/sch_taprio.c:1877
taprio_init+0x9da/0xc80 net/sched/sch_taprio.c:2134
qdisc_create+0x9d4/0x1190 net/sched/sch_api.c:1355
tc_modify_qdisc+0xa26/0x1e40 net/sched/sch_api.c:1776
rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6617
netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg+0x221/0x270 net/socket.c:745
____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
___sys_sendmsg net/socket.c:2638 [inline]
__sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
do_syscall_64+0xf9/0x240
entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7f1b2dea3759
Code: 48 83 c4 28 c3 e8 d7 19 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd4de452f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f1b2def0390 RCX: 00007f1b2dea3759
RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000004
RBP: 0000000000000003 R08: 0000555500000000 R09: 0000555500000000
R10: 0000555500000000 R11: 0000000000000246 R12: 00007ffd4de45340
R13: 00007ffd4de45310 R14: 0000000000000001 R15: 00007ffd4de45340
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/bd2474a45df7c11412c2587de3d4e43760531418
- https://git.kernel.org/stable/c/6915b1b28fe57e92c78e664366dc61c4f15ff03b
- https://git.kernel.org/stable/c/860e838fb089d652a446ced52cbdf051285b68e7
- https://git.kernel.org/stable/c/9b720bb1a69a9f12a4a5c86b6f89386fe05ed0f2
- https://git.kernel.org/stable/c/343041b59b7810f9cdca371f445dd43b35c740b1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-26247. | CVE ID: CVE-2022-26247
Date Updated: 2024-08-03T04:56:37.917Z
Date Published: 2022-03-20T18:34:59
Description:
TMS v2.28.0 contains an insecure permissions vulnerability via the component /TMS/admin/user/Update2. This vulnerability allows attackers to modify the administrator account and password.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/xiweicheng/tms/issues/16
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-4890. | CVE ID: CVE-2012-4890
Date Updated: 2024-08-06T20:50:17.520Z
Date Published: 2012-09-10T22:00:00
Description:
Multiple cross-site scripting (XSS) vulnerabilities in FlatnuX CMS 2011 08.09.2 and earlier allow remote attackers to inject arbitrary web script or HTML via a (1) comment to the news, (2) title to the news, or (3) the folder names in a gallery.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74566
- http://www.osvdb.org/80877
- http://secunia.com/advisories/48656
- http://secunia.com/advisories/48676
- http://www.securityfocus.com/bid/52846
- http://www.vulnerability-lab.com/get_content.php?id=487
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-16959. | CVE ID: CVE-2019-16959
Date Updated: 2024-08-05T01:24:48.746Z
Date Published: 2020-12-21T15:13:21
Description:
SolarWinds Web Help Desk 12.7.0 allows CSV Injection, also known as Formula Injection, via a file attached to a ticket.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.solarwinds.com/SuccessCenter/s/
- https://www.solarwinds.com/free-tools/free-help-desk-software
- https://www.esecforte.com/formula-injection-vulnerability-india-in-solarwinds-web-help-desk/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-3994. | CVE ID: CVE-2019-3994
Date Updated: 2024-08-04T19:26:27.635Z
Date Published: 2019-12-17T21:59:06
Description:
ELOG 3.1.4-57bea22 and below is affected by a denial of service vulnerability due to a use after free. A remote unauthenticated attacker can crash the ELOG server by sending multiple HTTP POST requests which causes the ELOG function retrieve_url() to use a freed variable.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.tenable.com/security/research/tra-2019-53
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2IN3FP6VXYSD4OMUCFZNOL7MKPWRQFAL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4IAS4HI24H2ERKBZTDEVJ3LEQEFWYSCT/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-27907. | CVE ID: CVE-2023-27907
Date Updated: 2024-08-02T12:23:30.127Z
Date Published: 2023-04-17T00:00:00
Description:
A malicious actor may convince a victim to open a malicious USD file that may trigger an out-of-bounds write vulnerability which may result in code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0003
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-23562. | CVE ID: CVE-2020-23562
Date Updated: 2024-08-04T14:58:15.206Z
Date Published: 2022-07-17T23:11:07
Description:
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x000000000000aefe.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.irfanview.com/plugins.htm
- https://github.com/nhiephon/Research
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-6488. | CVE ID: CVE-2017-6488
Date Updated: 2024-08-05T15:33:20.106Z
Date Published: 2017-03-05T20:00:00
Description:
Multiple Cross-Site Scripting (XSS) issues were discovered in EPESI 1.8.1.1. The vulnerabilities exist due to insufficient filtration of user-supplied data (visible, tab, cid) passed to the EPESI-master/modules/Utils/RecordBrowser/Filters/save_filters.php URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/96955
- https://github.com/Telaxus/EPESI/issues/166
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-3847. | CVE ID: CVE-2022-3847
Date Updated: 2024-08-03T01:20:58.782Z
Date Published: 2022-11-28T13:50:08.559Z
Description:
The Showing URL in QR Code WordPress plugin through 0.0.1 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin or editor add Stored XSS payloads via a CSRF attack
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/a70ad549-2e09-44fb-b894-4271ad4a84f6
- https://bulletin.iese.de/post/get-site-to-phone-by-qr-code_0-0-1/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-4910. | CVE ID: CVE-2012-4910
Date Updated: 2017-03-15T17:57:01
Date Published: 2017-03-15T18:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-52758. | CVE ID: CVE-2023-52758
Date Updated: 2024-05-24T15:27:25.169Z
Date Published: 2024-05-21T15:30:45.122Z
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the MITRE ATT&CK technique T1557 | The MITRE ATT&CK technique T1557: Man-in-the-Middle is related to the vulnerability CVE-CVE-2018-16179. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized. |
Provide detailed information about CVE-2009-0879. | CVE ID: CVE-2009-0879
Date Updated: 2024-08-07T04:48:52.612Z
Date Published: 2009-03-12T15:00:00
Description:
The CIM server in IBM Director before 5.20.3 Service Update 2 on Windows allows remote attackers to cause a denial of service (daemon crash) via a long consumer name, as demonstrated by an M-POST request to a long /CIMListener/ URI.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2009/0656
- http://osvdb.org/52615
- http://www.securityfocus.com/archive/1/501638/100/0/threaded
- http://secunia.com/advisories/34212
- https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=dmp&S_PKG=director_x_520&S_TACT=sms&lang=en_US&cp=UTF-8
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49285
- http://securitytracker.com/id?1021825
- http://www.securityfocus.com/bid/34061
- https://www.exploit-db.com/exploits/8190
- https://www.sec-consult.com/files/20090305-1_IBM_director_DoS.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-0698. | CVE ID: CVE-2009-0698
Date Updated: 2024-08-07T04:48:51.312Z
Date Published: 2009-02-23T15:00:00
Description:
Integer overflow in the 4xm demuxer (demuxers/demux_4xm.c) in xine-lib 1.1.16.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a 4X movie file with a large current_track value, a similar issue to CVE-2009-0385.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.ubuntu.com/usn/USN-746-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:299
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48954
- http://sourceforge.net/project/shownotes.php?release_id=660071
- http://bugs.xine-project.org/show_bug.cgi?id=205
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:298
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
- http://www.trapkit.de/advisories/TKADV2009-004.txt
- http://www.securityfocus.com/archive/1/500514/100/0/threaded
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-20446. | CVE ID: CVE-2020-20446
Date Updated: 2024-08-04T14:22:25.155Z
Date Published: 2021-05-25T17:40:59
Description:
FFmpeg 4.2 is affected by a Divide By Zero issue via libavcodec/aacpsy.c, which allows a remote malicious user to cause a Denial of Service.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://trac.ffmpeg.org/ticket/7995
- https://www.debian.org/security/2021/dsa-4990
- https://www.debian.org/security/2021/dsa-4998
- https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-2516. | CVE ID: CVE-2008-2516
Date Updated: 2024-08-07T09:05:29.865Z
Date Published: 2008-06-03T14:00:00
Description:
pam_sm_authenticate in pam_pgsql.c in libpam-pgsql 0.6.3 does not properly consider operator precedence when evaluating the success of a pam_get_pass function call, which allows local users to gain privileges via a SIGINT signal when this function is executing, as demonstrated by a CTRL-C sequence at a sudo password prompt in an "auth sufficient pam_pgsql.so" configuration.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/30391
- http://www.vupen.com/english/advisories/2008/1654/references
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=481970
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42653
- http://sourceforge.net/project/shownotes.php?release_id=601775
- http://www.securitytracker.com/id?1020111
- http://www.securityfocus.com/bid/29360
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-47121. | CVE ID: CVE-2021-47121
Date Updated: 2024-08-04T05:24:39.876Z
Date Published: 2024-03-15T20:14:27.287Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
net: caif: fix memory leak in cfusbl_device_notify
In case of caif_enroll_dev() fail, allocated
link_support won't be assigned to the corresponding
structure. So simply free allocated pointer in case
of error.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/cc302e30a504e6b60a9ac8df7988646f46cd0294
- https://git.kernel.org/stable/c/81afc61cb6e2b553f2c5f992fa79e0ae73857141
- https://git.kernel.org/stable/c/e8b37f5009ea7095529790f022859711e6939c76
- https://git.kernel.org/stable/c/9ea0ab48e755d8f29fe89eb235fb86176fdb597f
- https://git.kernel.org/stable/c/4d94f530cd24c85aede6e72b8923f371b45d6886
- https://git.kernel.org/stable/c/46403c1f80b0d3f937ff9c4f5edc63bb64bc5051
- https://git.kernel.org/stable/c/dde8686985ec24d6b00487080a906609bd613ea1
- https://git.kernel.org/stable/c/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-27325. | CVE ID: CVE-2024-27325
Date Updated: 2024-08-02T00:34:51.003Z
Date Published: 2024-04-01T21:49:14.636Z
Description:
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EMF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22275.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-24-203/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-49093. | CVE ID: CVE-2023-49093
Date Updated: 2024-08-02T21:46:28.698Z
Date Published: 2023-12-04T04:47:27.145Z
Description:
HtmlUnit is a GUI-less browser for Java programs. HtmlUnit is vulnerable to Remote Code Execution (RCE) via XSTL, when browsing the attacker’s webpage. This vulnerability has been patched in version 3.9.0
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/HtmlUnit/htmlunit/security/advisories/GHSA-37vq-hr2f-g7h7
- https://www.htmlunit.org/changes-report.html#a3.9.0
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-46420. | CVE ID: CVE-2023-46420
Date Updated: 2024-09-11T15:34:24.378Z
Date Published: 2023-10-25T00:00:00
Description:
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_41590C function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36
- https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/5/1.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-24113. | CVE ID: CVE-2021-24113
Date Updated: 2024-08-03T19:21:18.545Z
Date Published: 2021-02-25T23:01:58
Description:
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24113
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-36640. | CVE ID: CVE-2022-36640
Date Updated: 2024-08-03T10:07:34.545Z
Date Published: 2022-09-02T20:50:45
Description:
influxData influxDB before v1.8.10 contains no authentication mechanism or controls, allowing unauthenticated attackers to execute arbitrary commands. NOTE: the CVE ID assignment is disputed because the vendor's documentation states "If InfluxDB is being deployed on a publicly accessible endpoint, we strongly recommend authentication be enabled. Otherwise the data will be publicly available to any unauthenticated user. The default settings do NOT enable authentication and authorization.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://influxdata.com
- http://influxdb.com
- http://www.krsecu.com/CVE/409b5310045bd6b9a984a5fb63bd8786d5c5681a8ad5b1c815c84b2b90002ad7.docx
- https://dl.influxdata.com/influxdb/releases/influxdb_1.8.10_amd64.deb
- https://portal.influxdata.com/downloads/
- https://www.influxdata.com/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-0224. | CVE ID: CVE-2012-0224
Date Updated: 2024-08-06T18:16:19.793Z
Date Published: 2012-02-20T21:00:00
Description:
Untrusted search path vulnerability in 7-Technologies (7T) AQUIS 1.5 and earlier allows local users to gain privileges via a Trojan horse DLL in the current working directory, a different vulnerability than CVE-2012-0223.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.us-cert.gov/control_systems/pdf/ICSA-12-025-01.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-3703. | CVE ID: CVE-2013-3703
Date Updated: 2024-09-17T02:21:03.060Z
Date Published: 2018-06-08T17:00:00Z
Description:
The controller of the Open Build Service API prior to version 2.4.4 is missing a write permission check, allowing an authenticated attacker to add or remove user roles from packages and/or project meta data.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.suse.com/show_bug.cgi?id=828256
- https://github.com/openSUSE/open-build-service/commit/06ad7fdbdd7eb2fef8947d14c4cdd00d8f6387b1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-26631. | CVE ID: CVE-2024-26631
Date Updated: 2024-08-27T14:55:52.147Z
Date Published: 2024-03-18T10:07:48.346Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
idev->mc_ifc_count can be written over without proper locking.
Originally found by syzbot [1], fix this issue by encapsulating calls
to mld_ifc_stop_work() (and mld_gq_stop_work() for good measure) with
mutex_lock() and mutex_unlock() accordingly as these functions
should only be called with mc_lock per their declarations.
[1]
BUG: KCSAN: data-race in ipv6_mc_down / mld_ifc_work
write to 0xffff88813a80c832 of 1 bytes by task 3771 on cpu 0:
mld_ifc_stop_work net/ipv6/mcast.c:1080 [inline]
ipv6_mc_down+0x10a/0x280 net/ipv6/mcast.c:2725
addrconf_ifdown+0xe32/0xf10 net/ipv6/addrconf.c:3949
addrconf_notify+0x310/0x980
notifier_call_chain kernel/notifier.c:93 [inline]
raw_notifier_call_chain+0x6b/0x1c0 kernel/notifier.c:461
__dev_notify_flags+0x205/0x3d0
dev_change_flags+0xab/0xd0 net/core/dev.c:8685
do_setlink+0x9f6/0x2430 net/core/rtnetlink.c:2916
rtnl_group_changelink net/core/rtnetlink.c:3458 [inline]
__rtnl_newlink net/core/rtnetlink.c:3717 [inline]
rtnl_newlink+0xbb3/0x1670 net/core/rtnetlink.c:3754
rtnetlink_rcv_msg+0x807/0x8c0 net/core/rtnetlink.c:6558
netlink_rcv_skb+0x126/0x220 net/netlink/af_netlink.c:2545
rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:6576
netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline]
netlink_unicast+0x589/0x650 net/netlink/af_netlink.c:1368
netlink_sendmsg+0x66e/0x770 net/netlink/af_netlink.c:1910
...
write to 0xffff88813a80c832 of 1 bytes by task 22 on cpu 1:
mld_ifc_work+0x54c/0x7b0 net/ipv6/mcast.c:2653
process_one_work kernel/workqueue.c:2627 [inline]
process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2700
worker_thread+0x525/0x730 kernel/workqueue.c:2781
...
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/62b3387beef11738eb6ce667601a28fa089fa02c
- https://git.kernel.org/stable/c/380540bb06bb1d1b12bdc947d1b8f56cda6b5663
- https://git.kernel.org/stable/c/3cc283fd16fba72e2cefe3a6f48d7a36b0438900
- https://git.kernel.org/stable/c/3bb5849675ae1d592929798a2b37ea450879c855
- https://git.kernel.org/stable/c/2e7ef287f07c74985f1bf2858bedc62bd9ebf155
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-1031. | CVE ID: CVE-2010-1031
Date Updated: 2024-09-17T01:21:31.206Z
Date Published: 2010-04-01T19:00:00Z
Description:
Unspecified vulnerability in HP Insight Control for Linux (aka IC-Linux or ICE-LX) 2.11 and earlier allows local users to gain privileges via unknown vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/39052
- http://secunia.com/advisories/39227
- http://marc.info/?l=bugtraq&m=126996888626964&w=2
- http://www.vupen.com/english/advisories/2010/0750
- http://securitytracker.com/id?1023771
- http://marc.info/?l=bugtraq&m=126996888626964&w=2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-42794. | CVE ID: CVE-2023-42794
Date Updated: 2024-08-02T19:30:24.246Z
Date Published: 2023-10-10T17:17:01.378Z
Description:
Incomplete Cleanup vulnerability in Apache Tomcat.
The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased,
in progress refactoring that exposed a potential denial of service on
Windows if a web application opened a stream for an uploaded file but
failed to close the stream. The file would never be deleted from disk
creating the possibility of an eventual denial of service due to the
disk being full.
Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.apache.org/thread/vvbr2ms7lockj1hlhz5q3wmxb2mwcw82
- http://www.openwall.com/lists/oss-security/2023/10/10/8
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-1150. | CVE ID: CVE-2008-1150
Date Updated: 2024-08-07T08:08:57.729Z
Date Published: 2008-03-27T17:00:00
Description:
The virtual private dial-up network (VPDN) component in Cisco IOS before 12.3 allows remote attackers to cause a denial of service (resource exhaustion) via a series of PPTP sessions, related to the persistence of interface descriptor block (IDB) data structures after process termination, aka bug ID CSCdv59309.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2008/1006/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41484
- http://www.securityfocus.com/bid/28460
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080969862.shtml
- http://www.us-cert.gov/cas/techalerts/TA08-087B.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5598
- http://secunia.com/advisories/29507
- http://securitytracker.com/id?1019714
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-41591. | CVE ID: CVE-2021-41591
Date Updated: 2024-08-04T03:15:29.283Z
Date Published: 2021-10-04T16:47:56
Description:
ACINQ Eclair before 0.6.3 allows loss of funds because of dust HTLC exposure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html
- https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing
- https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html
- https://github.com/ACINQ/eclair/pull/1985
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-20824. | CVE ID: CVE-2024-20824
Date Updated: 2024-08-01T22:06:36.395Z
Date Published: 2024-02-06T02:23:14.512Z
Description:
Implicit intent hijacking vulnerability in VoiceSearch of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=02
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-9061. | CVE ID: CVE-2016-9061
Date Updated: 2024-08-06T02:42:09.920Z
Date Published: 2018-06-11T21:00:00
Description:
A previously installed malicious Android application which defines a specific signature-level permissions used by Firefox can access API keys meant for Firefox only. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox < 50.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/94337
- http://www.securitytracker.com/id/1037298
- https://bugzilla.mozilla.org/show_bug.cgi?id=1245795
- https://www.mozilla.org/security/advisories/mfsa2016-89/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-0489. | CVE ID: CVE-2013-0489
Date Updated: 2024-08-06T14:25:10.488Z
Date Published: 2013-03-27T10:00:00
Description:
Cross-site request forgery (CSRF) vulnerability in webadmin.nsf (aka the Web Administrator client) in IBM Domino 8.5.x allows remote authenticated users to hijack the authentication of administrators.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81854
- http://www-01.ibm.com/support/docview.wss?uid=swg21627597
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-37677. | CVE ID: CVE-2024-37677
Date Updated: 2024-08-02T03:57:39.765Z
Date Published: 2024-06-24T00:00:00
Description:
An issue in Shenzhen Weitillage Industrial Co., Ltd the access management specialist V6.62.51215 allows a remote attacker to obtain sensitive information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/dabaizhizhu/123/issues/2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-35732. | CVE ID: CVE-2023-35732
Date Updated: 2024-09-18T18:29:00.331Z
Date Published: 2024-05-03T01:57:50.607Z
Description:
D-Link DAP-2622 DDP Reset Factory Auth Password Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-20059.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-23-1238/
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-30226. | CVE ID: CVE-2023-30226
Date Updated: 2024-08-02T14:21:44.792Z
Date Published: 2023-07-12T00:00:00
Description:
An issue was discovered in function get_gnu_verneed in rizinorg Rizin prior to 0.5.0 verneed_entry allows attackers to cause a denial of service via crafted elf file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/rizinorg/rizin/commit/a6d89de0d44e776f9bccc3a168fdc79f604e14ed
- https://github.com/ifyGecko/CVE-2023-30226
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-29893. | CVE ID: CVE-2024-29893
Date Updated: 2024-08-02T01:17:58.029Z
Date Published: 2024-03-29T15:07:51.057Z
Description:
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of ArgoCD starting from v2.4 have a bug where the ArgoCD repo-server component is vulnerable to a Denial-of-Service attack vector. Specifically, it's possible to crash the repo server component through an out of memory error by pointing it to a malicious Helm registry. The loadRepoIndex() function in the ArgoCD's helm package, does not limit the size nor time while fetching the data. It fetches it and creates a byte slice from the retrieved data in one go. If the registry is implemented to push data continuously, the repo server will keep allocating memory until it runs out of it. A patch for this vulnerability has been released in v2.10.3, v2.9.8, and v2.8.12.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/argoproj/argo-cd/security/advisories/GHSA-jhwx-mhww-rgc3
- https://github.com/argoproj/argo-cd/commit/14f681e3ee7c38731943b98f92277e88a3db109d
- https://github.com/argoproj/argo-cd/commit/36b8a12a38f8d92d55bffc81deed44389bf6eb59
- https://github.com/argoproj/argo-cd/commit/3e5a878f6e30d935fa149723ea2a2e93748fcddd
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-7780. | CVE ID: CVE-2018-7780
Date Updated: 2024-09-17T00:21:09.174Z
Date Published: 2018-07-03T14:00:00Z
Description:
In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior to 3.29.69, a buffer overflow vulnerability exist in cgi program "set".
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.schneider-electric.com/en/download/document/SEVD-2018-114-01/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-1003049. | CVE ID: CVE-2019-1003049
Date Updated: 2024-08-05T03:07:18.205Z
Date Published: 2019-04-10T20:12:29
Description:
Users who cached their CLI authentication before Jenkins was updated to 2.150.2 and newer, or 2.160 and newer, would remain authenticated in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, because the fix for CVE-2019-1003004 in these releases did not reject existing remoting-based CLI authentication caches.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/107901
- https://access.redhat.com/errata/RHBA-2019:1605
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1289
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-0163. | CVE ID: CVE-2019-0163
Date Updated: 2024-08-04T17:44:14.662Z
Date Published: 2019-04-17T17:03:36
Description:
Insufficient input validation in system firmware for Intel(R) Broadwell U i5 vPro before version MYBDWi5v.86A may allow an authenticated user to potentially enable escalation of privilege, denial of service, and/or information disclosure via local access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00239.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-2565. | CVE ID: CVE-2024-2565
Date Updated: 2024-08-12T15:52:09.649Z
Date Published: 2024-03-17T14:31:04.357Z
Description:
A vulnerability was found in PandaXGO PandaX up to 20240310. It has been classified as critical. Affected is an unknown function of the file /apps/system/router/upload.go of the component File Extension Handler. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257064.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.257064
- https://vuldb.com/?ctiid.257064
- https://github.com/PandaXGO/PandaX/issues/5
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-0993. | CVE ID: CVE-2024-0993
Date Updated: 2024-08-01T18:26:30.359Z
Date Published: 2024-01-29T01:31:04.198Z
Description:
A vulnerability was found in Tenda i6 1.0.0.9(3857). It has been classified as critical. Affected is the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-252258 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.252258
- https://vuldb.com/?ctiid.252258
- https://jylsec.notion.site/Tenda-i6-has-stack-buffer-overflow-vulnerability-in-formWifiMacFilterGet-8b2c5cb67e2a433cad62d737782a7e0f?pvs=4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-6901. | CVE ID: CVE-2015-6901
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-21005. | CVE ID: CVE-2024-21005
Date Updated: 2024-08-01T22:13:41.483Z
Date Published: 2024-04-16T21:25:59.621Z
Description:
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u401; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpuapr2024.html
- https://security.netapp.com/advisory/ntap-20240426-0004/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-2415. | CVE ID: CVE-2010-2415
Date Updated: 2024-08-07T02:32:16.587Z
Date Published: 2010-10-13T23:00:00
Description:
Unspecified vulnerability in the Change Data Capture component in Oracle Database Server 10.1.0.5, 10.2.0.4, 11.1.0.7, and 11.2.0.1 allows remote authenticated users to affect confidentiality and integrity, related to DBMS_CDC_PUBLISH.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html
- http://www.us-cert.gov/cas/techalerts/TA10-287A.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-2703. | CVE ID: CVE-2022-2703
Date Updated: 2024-08-03T00:46:04.007Z
Date Published: 2022-08-08T12:50:19
Description:
A vulnerability was found in SourceCodester Gym Management System. It has been classified as critical. This affects an unknown part of the component Exercises Module. The manipulation of the argument exer leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205827.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/gdianq/Gym-Management-Exercises-Sqlinjection/blob/main/README.md
- https://vuldb.com/?id.205827
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-7885. | CVE ID: CVE-2019-7885
Date Updated: 2024-08-04T21:02:19.254Z
Date Published: 2019-08-02T21:20:53
Description:
Insufficient input validation in the config builder of the Elastic search module could lead to remote code execution in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This vulnerability could be abused by an authenticated user with the ability to configure the catalog search.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-1640. | CVE ID: CVE-2010-1640
Date Updated: 2024-08-07T01:28:41.582Z
Date Published: 2010-05-26T18:00:00
Description:
Off-by-one error in the parseicon function in libclamav/pe_icons.c in ClamAV 0.96 allows remote attackers to cause a denial of service (crash) via a crafted PE icon that triggers an out-of-bounds read, related to improper rounding during scaling.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blobdiff%3Bf=libclamav/pe_icons.c%3Bh=3f1bc5be69d0f9d84e576814d1a3cc6f40c4ff2c%3Bhp=39a714f05968f9e929576bf171dd0eb58bf06bef%3Bhb=7f0e3bbf77382d9782e0189bf80f5f59a95779b3%3Bhpb=f0eb394501ec21b9fe67f36cbf5db788711d4236
- http://www.openwall.com/lists/oss-security/2010/05/21/7
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58825
- http://www.securityfocus.com/bid/40318
- http://www.vupen.com/english/advisories/2010/1214
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:110
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2031
- http://secunia.com/advisories/39895
- http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96.1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-7005. | CVE ID: CVE-2024-7005
Date Updated: 2024-08-06T16:12:30.726Z
Date Published: 2024-08-06T15:37:27.850Z
Description:
Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a malicious file. (Chromium security severity: Low)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html
- https://issues.chromium.org/issues/40068800
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-2051. | CVE ID: CVE-2012-2051
Date Updated: 2024-08-06T19:17:27.695Z
Date Published: 2012-08-15T10:00:00
Description:
Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4147, CVE-2012-4148, CVE-2012-4149, CVE-2012-4150, CVE-2012-4151, CVE-2012-4152, CVE-2012-4153, CVE-2012-4154, CVE-2012-4155, CVE-2012-4156, CVE-2012-4157, CVE-2012-4158, CVE-2012-4159, and CVE-2012-4160.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16394
- http://www.adobe.com/support/security/bulletins/apsb12-16.html
- http://security.gentoo.org/glsa/glsa-201308-03.xml
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-28944. | CVE ID: CVE-2020-28944
Date Updated: 2024-08-04T16:48:00.595Z
Date Published: 2021-04-30T21:06:19
Description:
OX Guard 2.10.4 and earlier allows a Denial of Service via a WKS server that responds slowly or with a large amount of data.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://open-xchange.com
- http://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-26861. | CVE ID: CVE-2020-26861
Date Updated: 2022-10-13T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-7357. | CVE ID: CVE-2016-7357
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-28582. | CVE ID: CVE-2024-28582
Date Updated: 2024-08-02T18:55:09.780Z
Date Published: 2024-03-20T00:00:00
Description:
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the rgbe_RGBEToFloat() function when reading images in HDR format.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-17630. | CVE ID: CVE-2017-17630
Date Updated: 2024-08-05T20:59:16.994Z
Date Published: 2017-12-13T09:00:00
Description:
Yoga Class Script 1.0 has SQL Injection via the /list city parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/43282/
- https://packetstormsecurity.com/files/145322/Yoga-Class-Script-1.0-SQL-Injection.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-2084. | CVE ID: CVE-2012-2084
Date Updated: 2024-08-06T19:17:27.825Z
Date Published: 2012-11-22T11:00:00
Description:
Cross-site scripting (XSS) vulnerability in the Printer, email and PDF versions module 6.x-1.x before 6.x-1.15 and 7.x-1.x before 7.x-1.0 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, probably the PATH_INFO.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://drupalcode.org/project/print.git/commit/30480e0
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74611
- http://drupalcode.org/project/print.git/commit/6771c3f
- http://drupal.org/node/1515722
- http://drupal.org/node/1515060
- http://www.securityfocus.com/bid/52896
- http://www.openwall.com/lists/oss-security/2012/04/07/1
- http://drupal.org/node/1515076
- http://secunia.com/advisories/48625
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-1983. | CVE ID: CVE-2013-1983
Date Updated: 2024-08-06T15:20:37.502Z
Date Published: 2013-06-15T19:00:00
Description:
Integer overflow in X.org libXfixes 5.0 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XFixesGetCursorImage function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.debian.org/security/2013/dsa-2676
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106794.html
- http://www.ubuntu.com/usn/USN-1858-1
- http://www.openwall.com/lists/oss-security/2013/05/23/3
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00144.html
- http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-0462. | CVE ID: CVE-2011-0462
Date Updated: 2024-09-16T17:02:55.828Z
Date Published: 2011-04-10T01:00:00Z
Description:
Multiple cross-site scripting (XSS) vulnerabilities in the login page in the webui component in SUSE openSUSE Build Service (OBS) before 2.1.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://news.opensuse.org/2011/03/02/build-service-team-releases-new-versions-fixing-security-problems/
- https://bugzilla.novell.com/show_bug.cgi?id=669909
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-7192. | CVE ID: CVE-2016-7192
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-0224. | CVE ID: CVE-2014-0224
Date Updated: 2024-08-06T09:05:39.462Z
Date Published: 2014-06-05T21:00:00
Description:
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/59342
- http://secunia.com/advisories/59669
- http://secunia.com/advisories/59525
- http://marc.info/?l=bugtraq&m=140604261522465&w=2
- http://secunia.com/advisories/59004
- http://secunia.com/advisories/59530
- http://www-01.ibm.com/support/docview.wss?uid=swg21675626
- http://secunia.com/advisories/59824
- http://secunia.com/advisories/59282
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://secunia.com/advisories/59215
- https://bugzilla.redhat.com/show_bug.cgi?id=1103586
- http://secunia.com/advisories/59990
- http://secunia.com/advisories/59264
- http://secunia.com/advisories/59454
- http://secunia.com/advisories/58492
- http://secunia.com/advisories/59186
- http://secunia.com/advisories/59188
- http://secunia.com/advisories/59126
- http://marc.info/?l=bugtraq&m=140672208601650&w=2
- http://marc.info/?l=bugtraq&m=140784085708882&w=2
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html
- http://secunia.com/advisories/59306
- http://rhn.redhat.com/errata/RHSA-2014-0627.html
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- http://marc.info/?l=bugtraq&m=140544599631400&w=2
- http://rhn.redhat.com/errata/RHSA-2014-0626.html
- http://secunia.com/advisories/59190
- http://secunia.com/advisories/58639
- http://www-01.ibm.com/support/docview.wss?uid=swg21678289
- http://www.ibm.com/support/docview.wss?uid=swg21676877
- http://secunia.com/advisories/59446
- http://secunia.com/advisories/59529
- http://secunia.com/advisories/59445
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://secunia.com/advisories/59589
- http://secunia.com/advisories/59894
- http://secunia.com/advisories/59325
- http://secunia.com/advisories/59354
- http://www-01.ibm.com/support/docview.wss?uid=swg24037729
- http://www-01.ibm.com/support/docview.wss?uid=swg21677131
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://secunia.com/advisories/61254
- http://www-01.ibm.com/support/docview.wss?uid=swg21678233
- http://secunia.com/advisories/59447
- http://www.securitytracker.com/id/1031594
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E
- http://secunia.com/advisories/59223
- http://secunia.com/advisories/58743
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://secunia.com/advisories/58719
- http://secunia.com/advisories/59449
- http://secunia.com/advisories/59132
- http://marc.info/?l=bugtraq&m=142350350616251&w=2
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://marc.info/?l=bugtraq&m=140870499402361&w=2
- http://marc.info/?l=bugtraq&m=140386311427810&w=2
- http://secunia.com/advisories/59442
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- http://marc.info/?l=bugtraq&m=140317760000786&w=2
- http://marc.info/?l=bugtraq&m=142805027510172&w=2
- http://www-01.ibm.com/support/docview.wss?uid=swg21676879
- http://www-01.ibm.com/support/docview.wss?uid=swg24037761
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://secunia.com/advisories/59441
- http://marc.info/?l=bugtraq&m=140621259019789&w=2
- http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
- http://marc.info/?l=bugtraq&m=140852757108392&w=2
- https://filezilla-project.org/versions.php?type=server
- http://www-01.ibm.com/support/docview.wss?uid=swg21676786
- http://secunia.com/advisories/60567
- http://secunia.com/advisories/59189
- http://secunia.com/advisories/59368
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:106
- http://secunia.com/advisories/59142
- http://www-01.ibm.com/support/docview.wss?uid=swg21676478
- http://www-01.ibm.com/support/docview.wss?uid=swg21676845
- http://secunia.com/advisories/58742
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004670
- http://rhn.redhat.com/errata/RHSA-2014-0624.html
- http://secunia.com/advisories/59602
- http://www.kerio.com/support/kerio-control/release-history
- http://secunia.com/advisories/59300
- http://secunia.com/advisories/58930
- http://www-01.ibm.com/support/docview.wss?uid=swg21677080
- http://secunia.com/advisories/61815
- http://secunia.com/advisories/58667
- http://security.gentoo.org/glsa/glsa-201407-05.xml
- http://www-01.ibm.com/support/docview.wss?uid=swg21677390
- http://secunia.com/advisories/59191
- http://secunia.com/advisories/59284
- http://secunia.com/advisories/59444
- https://www.imperialviolet.org/2014/06/05/earlyccs.html
- http://www.ibm.com/support/docview.wss?uid=swg24037783
- http://secunia.com/advisories/59365
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://secunia.com/advisories/59305
- http://www-01.ibm.com/support/docview.wss?uid=swg21676529
- http://secunia.com/advisories/59483
- http://secunia.com/advisories/58385
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://secunia.com/advisories/59495
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
- http://www-01.ibm.com/support/docview.wss?uid=swg21676889
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://secunia.com/advisories/58945
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://marc.info/?l=bugtraq&m=141025641601169&w=2
- http://secunia.com/advisories/59659
- http://secunia.com/advisories/59440
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://secunia.com/advisories/59429
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://secunia.com/advisories/59655
- http://secunia.com/advisories/59370
- http://secunia.com/advisories/59827
- http://secunia.com/advisories/58660
- http://secunia.com/advisories/59163
- http://secunia.com/advisories/58716
- http://secunia.com/advisories/59055
- http://www-01.ibm.com/support/docview.wss?uid=swg21676071
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737
- http://www-01.ibm.com/support/docview.wss?uid=swg21677836
- http://secunia.com/advisories/59437
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
- http://secunia.com/advisories/60176
- http://marc.info/?l=bugtraq&m=141147110427269&w=2
- http://secunia.com/advisories/59101
- http://esupport.trendmicro.com/solution/en-US/1103813.aspx
- http://secunia.com/advisories/59374
- http://secunia.com/advisories/59063
- http://www.vmware.com/security/advisories/VMSA-2014-0006.html
- https://discussions.nessus.org/thread/7517
- http://secunia.com/advisories/59310
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://marc.info/?l=bugtraq&m=142350350616251&w=2
- http://www-01.ibm.com/support/docview.wss?uid=swg21676536
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506
- http://secunia.com/advisories/59502
- http://www.splunk.com/view/SP-CAAAM2D
- http://secunia.com/advisories/59878
- http://www.fortiguard.com/advisory/FG-IR-14-018/
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- http://marc.info/?l=bugtraq&m=140852826008699&w=2
- http://www.ibm.com/support/docview.wss?uid=swg21676793
- http://secunia.com/advisories/59214
- http://www.ibm.com/support/docview.wss?uid=swg21676356
- http://marc.info/?l=bugtraq&m=140794476212181&w=2
- http://marc.info/?l=bugtraq&m=140389274407904&w=2
- http://support.citrix.com/article/CTX140876
- http://secunia.com/advisories/59167
- http://secunia.com/advisories/59120
- http://www-01.ibm.com/support/docview.wss?uid=swg24037732
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172
- http://marc.info/?l=bugtraq&m=140369637402535&w=2
- http://secunia.com/advisories/59380
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:105
- http://secunia.com/advisories/59460
- http://secunia.com/advisories/59506
- http://secunia.com/advisories/58939
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://secunia.com/advisories/59661
- http://secunia.com/advisories/59514
- http://secunia.com/advisories/59677
- http://rhn.redhat.com/errata/RHSA-2014-0630.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
- http://rhn.redhat.com/errata/RHSA-2014-0632.html
- http://www-01.ibm.com/support/docview.wss?uid=swg24037730
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www-01.ibm.com/support/docview.wss?uid=swg24037731
- http://secunia.com/advisories/58745
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://secunia.com/advisories/59438
- http://www.ibm.com/support/docview.wss?uid=isg3T1020948
- http://www-01.ibm.com/support/docview.wss?uid=swg21676496
- http://secunia.com/advisories/58714
- http://marc.info/?l=bugtraq&m=140482916501310&w=2
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html
- http://ccsinjection.lepidum.co.jp
- http://secunia.com/advisories/59435
- http://marc.info/?l=bugtraq&m=141658880509699&w=2
- http://www.openssl.org/news/secadv_20140605.txt
- http://secunia.com/advisories/58615
- http://marc.info/?l=bugtraq&m=142546741516006&w=2
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://www-01.ibm.com/support/docview.wss?uid=swg21676644
- http://secunia.com/advisories/59231
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004671
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://support.apple.com/kb/HT6443
- http://secunia.com/advisories/59211
- http://secunia.com/advisories/58433
- http://secunia.com/advisories/60066
- http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html
- https://access.redhat.com/site/blogs/766093/posts/908133
- http://secunia.com/advisories/59301
- http://secunia.com/advisories/60522
- http://secunia.com/advisories/59784
- https://kb.bluecoat.com/index?page=content&id=SA80
- http://marc.info/?l=bugtraq&m=141383410222440&w=2
- http://seclists.org/fulldisclosure/2014/Jun/38
- http://marc.info/?l=bugtraq&m=140904544427729&w=2
- http://www.f-secure.com/en/web/labs_global/fsc-2014-6
- http://secunia.com/advisories/59135
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://www-01.ibm.com/support/docview.wss?uid=swg21678167
- http://secunia.com/advisories/58759
- http://secunia.com/advisories/59093
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740
- http://puppetlabs.com/security/cve/cve-2014-0224
- http://secunia.com/advisories/59192
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- http://secunia.com/advisories/58579
- https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf
- http://secunia.com/advisories/59040
- http://marc.info/?l=bugtraq&m=140389355508263&w=2
- http://secunia.com/advisories/59175
- http://secunia.com/advisories/60819
- http://marc.info/?l=bugtraq&m=140448122410568&w=2
- http://secunia.com/advisories/59666
- http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download
- http://secunia.com/advisories/58128
- http://marc.info/?l=bugtraq&m=140431828824371&w=2
- http://secunia.com/advisories/59413
- http://www-01.ibm.com/support/docview.wss?uid=swg21676334
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21675821
- http://www-01.ibm.com/support/docview.wss?uid=swg24037870
- http://secunia.com/advisories/59721
- http://marc.info/?l=bugtraq&m=141383465822787&w=2
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
- http://rhn.redhat.com/errata/RHSA-2014-0680.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://secunia.com/advisories/59012
- http://secunia.com/advisories/58713
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://secunia.com/advisories/59362
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://marc.info/?l=bugtraq&m=140499864129699&w=2
- http://rhn.redhat.com/errata/RHSA-2014-0631.html
- http://secunia.com/advisories/59338
- http://secunia.com/advisories/59450
- http://linux.oracle.com/errata/ELSA-2014-1053.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.kb.cert.org/vuls/id/978508
- http://www.securitytracker.com/id/1031032
- http://secunia.com/advisories/59287
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1
- http://www-01.ibm.com/support/docview.wss?uid=swg21683332
- http://secunia.com/advisories/59491
- http://secunia.com/advisories/59364
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues
- http://secunia.com/advisories/59451
- http://secunia.com/advisories/58977
- https://www.novell.com/support/kb/doc.php?id=7015271
- http://www-01.ibm.com/support/docview.wss?uid=swg21676333
- http://secunia.com/advisories/60571
- http://secunia.com/advisories/59459
- http://www-01.ibm.com/support/docview.wss?uid=swg21676833
- http://secunia.com/advisories/60577
- http://secunia.com/advisories/59448
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441
- https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf
- http://www.blackberry.com/btsc/KB36051
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://marc.info/?l=bugtraq&m=141164638606214&w=2
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690
- http://secunia.com/advisories/59885
- http://www-01.ibm.com/support/docview.wss?uid=swg21677527
- http://secunia.com/advisories/59202
- http://rhn.redhat.com/errata/RHSA-2014-0633.html
- http://www.ibm.com/support/docview.wss?uid=ssg1S1004678
- http://secunia.com/advisories/59375
- http://marc.info/?l=bugtraq&m=140983229106599&w=2
- http://secunia.com/advisories/59528
- http://secunia.com/advisories/58337
- http://secunia.com/advisories/59518
- http://secunia.com/advisories/59389
- http://secunia.com/advisories/59162
- http://secunia.com/advisories/59383
- http://www-01.ibm.com/support/docview.wss?uid=swg21677567
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217
- http://secunia.com/advisories/59490
- http://secunia.com/advisories/59916
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E
- http://marc.info/?l=bugtraq&m=140491231331543&w=2
- http://www-01.ibm.com/support/docview.wss?uid=swg24037727
- http://www.ibm.com/support/docview.wss?uid=swg1IT02314
- http://secunia.com/advisories/59043
- http://secunia.com/advisories/59347
- http://secunia.com/advisories/60049
- http://www-01.ibm.com/support/docview.wss?uid=swg21676615
- https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
- https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-6393. | CVE ID: CVE-2014-6393
Date Updated: 2024-08-06T12:17:23.956Z
Date Published: 2017-08-09T18:00:00
Description:
The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://nodesecurity.io/advisories/express-no-charset-in-content-type-header
- https://bugzilla.redhat.com/show_bug.cgi?id=1203190
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-26834. | CVE ID: CVE-2024-26834
Date Updated: 2024-08-02T00:14:13.630Z
Date Published: 2024-04-17T10:10:02.282Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_flow_offload: release dst in case direct xmit path is used
Direct xmit does not use it since it calls dev_queue_xmit() to send
packets, hence it calls dst_release().
kmemleak reports:
unreferenced object 0xffff88814f440900 (size 184):
comm "softirq", pid 0, jiffies 4294951896
hex dump (first 32 bytes):
00 60 5b 04 81 88 ff ff 00 e6 e8 82 ff ff ff ff .`[.............
21 0b 50 82 ff ff ff ff 00 00 00 00 00 00 00 00 !.P.............
backtrace (crc cb2bf5d6):
[<000000003ee17107>] kmem_cache_alloc+0x286/0x340
[<0000000021a5de2c>] dst_alloc+0x43/0xb0
[<00000000f0671159>] rt_dst_alloc+0x2e/0x190
[<00000000fe5092c9>] __mkroute_output+0x244/0x980
[<000000005fb96fb0>] ip_route_output_flow+0xc0/0x160
[<0000000045367433>] nf_ip_route+0xf/0x30
[<0000000085da1d8e>] nf_route+0x2d/0x60
[<00000000d1ecd1cb>] nft_flow_route+0x171/0x6a0 [nft_flow_offload]
[<00000000d9b2fb60>] nft_flow_offload_eval+0x4e8/0x700 [nft_flow_offload]
[<000000009f447dbb>] expr_call_ops_eval+0x53/0x330 [nf_tables]
[<00000000072e1be6>] nft_do_chain+0x17c/0x840 [nf_tables]
[<00000000d0551029>] nft_do_chain_inet+0xa1/0x210 [nf_tables]
[<0000000097c9d5c6>] nf_hook_slow+0x5b/0x160
[<0000000005eccab1>] ip_forward+0x8b6/0x9b0
[<00000000553a269b>] ip_rcv+0x221/0x230
[<00000000412872e5>] __netif_receive_skb_one_core+0xfe/0x110
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/13b57b5cd591d5b22f9bbf047b2922967de411f3
- https://git.kernel.org/stable/c/a6cafdb49a7bbf4a88367db209703eee6941e023
- https://git.kernel.org/stable/c/9256ab9232e35a16af9c30fa4e522e6d1bd3605a
- https://git.kernel.org/stable/c/2d17cf10179a7de6d8f0128168b84ad0b4a1863f
- https://git.kernel.org/stable/c/8762785f459be1cfe6fcf7285c123aad6a3703f0
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-31740. | CVE ID: CVE-2022-31740
Date Updated: 2024-08-03T07:26:01.078Z
Date Published: 2022-12-22T00:00:00
Description:
On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.mozilla.org/security/advisories/mfsa2022-20/
- https://www.mozilla.org/security/advisories/mfsa2022-22/
- https://www.mozilla.org/security/advisories/mfsa2022-21/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1766806
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-7256. | CVE ID: CVE-2024-7256
Date Updated: 2024-08-03T18:04:16.512Z
Date Published: 2024-08-01T18:05:33.105Z
Description:
Insufficient data validation in Dawn in Google Chrome on Android prior to 127.0.6533.88 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_30.html
- https://issues.chromium.org/issues/354748060
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-18109. | CVE ID: CVE-2017-18109
Date Updated: 2024-09-16T17:08:13.135Z
Date Published: 2019-03-29T14:04:53.255719Z
Description:
The login resource of CrowdId in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://jira.atlassian.com/browse/CWD-5071
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-0074. | CVE ID: CVE-2014-0074
Date Updated: 2024-08-06T09:05:38.510Z
Date Published: 2014-10-06T14:00:00
Description:
Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://seclists.org/fulldisclosure/2014/Mar/22
- https://issues.apache.org/jira/browse/SHIRO-460
- http://rhn.redhat.com/errata/RHSA-2014-1351.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-2286. | CVE ID: CVE-2021-2286
Date Updated: 2024-09-26T14:12:40.699Z
Date Published: 2021-04-22T21:53:59
Description:
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpuapr2021.html
- https://security.gentoo.org/glsa/202208-36
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-16995. | CVE ID: CVE-2019-16995
Date Updated: 2024-08-05T01:24:48.595Z
Date Published: 2019-09-30T12:03:53
Description:
In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/torvalds/linux/commit/6caabe7f197d3466d238f70915d65301f1716626
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6caabe7f197d3466d238f70915d65301f1716626
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.3
- https://security.netapp.com/advisory/ntap-20191031-0005/
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-3386. | CVE ID: CVE-2020-3386
Date Updated: 2024-09-16T18:03:14.536Z
Date Published: 2020-07-31T00:00:22.150152Z
Description:
A vulnerability in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with a low-privileged account to bypass authorization on the API of an affected device. The vulnerability is due to insufficient authorization of certain API functions. An attacker could exploit this vulnerability by sending a crafted request to the API using low-privileged credentials. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-improper-auth-7Krd9TDT
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-45435. | CVE ID: CVE-2021-45435
Date Updated: 2024-08-04T04:39:20.841Z
Date Published: 2022-01-28T14:05:13
Description:
An SQL Injection vulnerability exists in Sourcecodester Simple Cold Storage Management System using PHP/OOP 1.0 via the username field in login.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kuiilsec.github.io/blog/cve-2021-45436/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-0736. | CVE ID: CVE-2023-0736
Date Updated: 2024-08-02T05:24:33.515Z
Date Published: 2023-02-07T00:00:00
Description:
Cross-site Scripting (XSS) - Stored in GitHub repository wallabag/wallabag prior to 2.5.4.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.dev/bounties/7e6f9614-6a96-4295-83f0-06a240be844e
- https://github.com/wallabag/wallabag/commit/4e023bddc3622ba5e901cc14a261fcb98d955cd7
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-2049. | CVE ID: CVE-2013-2049
Date Updated: 2024-08-06T15:20:37.481Z
Date Published: 2018-05-01T19:00:00
Description:
Red Hat CloudForms 2 Management Engine (CFME) allows remote attackers to conduct session tampering attacks by leveraging use of a static secret_token.rb secret.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=959041
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-27989. | CVE ID: CVE-2024-27989
Date Updated: 2024-08-02T00:41:56.014Z
Date Published: 2024-03-21T15:14:50.620Z
Description:
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in I Thirteen Web Solution WP Responsive Tabs horizontal vertical and accordion Tabs allows Stored XSS.This issue affects WP Responsive Tabs horizontal vertical and accordion Tabs: from n/a through 1.1.17.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/responsive-horizontal-vertical-and-accordion-tabs/wordpress-wp-responsive-tabs-horizontal-vertical-and-accordion-tabs-plugin-1-1-17-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-4221. | CVE ID: CVE-2023-4221
Date Updated: 2024-08-02T07:17:12.372Z
Date Published: 2023-11-28T07:13:51.191Z
Description:
Command injection in `main/lp/openoffice_presentation.class.php` in Chamilo LMS <= v1.11.24 allows users permitted to upload Learning Paths to obtain remote code execution via improper neutralisation of special characters.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-128-2023-09-04-Critical-impact-Moderate-risk-Authenticated-users-may-gain-unauthenticated-RCE-CVE-2023-4221CVE-2023-4222
- https://starlabs.sg/advisories/23/23-4221
- https://github.com/chamilo/chamilo-lms/commit/ed72914608d2a07ee2eb587c1a654480d08201db
- https://github.com/chamilo/chamilo-lms/commit/841a07396fed0ef27c5db13a1b700eac02754fc7
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-7784. | CVE ID: CVE-2014-7784
Date Updated: 2024-08-06T13:03:27.065Z
Date Published: 2014-10-21T10:00:00
Description:
The Schon! Magazine (aka com.magzter.schonmagazine) application 3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/974713
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-35227. | CVE ID: CVE-2021-35227
Date Updated: 2024-09-16T23:15:48.252Z
Date Published: 2021-10-21T17:41:34.442595Z
Description:
The HTTP interface was enabled for RabbitMQ Plugin in ARM 2020.2.6 and the ability to configure HTTPS was not available.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35227
- https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2021-4_release_notes.htm
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-4267. | CVE ID: CVE-2024-4267
Date Updated: 2024-08-01T20:33:53.200Z
Date Published: 2024-05-22T19:29:56.867Z
Description:
A remote code execution (RCE) vulnerability exists in the parisneo/lollms-webui, specifically within the 'open_file' module, version 9.5. The vulnerability arises due to improper neutralization of special elements used in a command within the 'open_file' function. An attacker can exploit this vulnerability by crafting a malicious file path that, when processed by the 'open_file' function, executes arbitrary system commands or reads sensitive file content. This issue is present in the code where subprocess.Popen is used unsafely to open files based on user-supplied paths without adequate validation, leading to potential command injection.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.com/bounties/5a127724-cc13-4ea6-b81f-41546a7fff81
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-26842. | CVE ID: CVE-2023-26842
Date Updated: 2024-08-02T11:53:54.607Z
Date Published: 2023-05-31T00:00:00
Description:
A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the OptionManager.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26842
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-8481. | CVE ID: CVE-2024-8481
Date Updated: 2024-09-25T14:10:55.014Z
Date Published: 2024-09-25T02:05:00.954Z
Description:
The The Special Text Boxes plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 6.2.2. This is due to the plugin adding the filter add_filter('comment_text', 'do_shortcode'); which will run all shortcodes in comments. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/15b2a08f-2122-4eaf-ab46-1945cf6a68ca?source=cve
- https://plugins.trac.wordpress.org/browser/wp-special-textboxes/trunk/stb-class.php#L36
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-15709. | CVE ID: CVE-2017-15709
Date Updated: 2024-09-16T22:14:34.363Z
Date Published: 2018-02-13T20:00:00Z
Description:
When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain system details (such as the OS and kernel version) are exposed as plain text.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.apache.org/thread.html/2b6f04a552c6ec2de6563c2df3bba813f0fe9c7e22cce27b7829db89%40%3Cdev.activemq.apache.org%3E
- https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc%40%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b%40%3Cdev.activemq.apache.org%3E
- https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1%40%3Cdev.activemq.apache.org%3E
- https://lists.apache.org/thread.html/3f1e41bc9153936e065ca3094bd89ff8167ad2d39ac0b410f24382d2%40%3Cgitbox.activemq.apache.org%3E
- https://lists.apache.org/thread.html/c0ec53b72b3240b187afb1cf67e4309a9e5f607282010aa196734814%40%3Cgitbox.activemq.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.