instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2016-8205.
CVE ID: CVE-2016-8205 Date Updated: 2024-08-06T02:13:21.873Z Date Published: 2017-01-14T19:00:00 Description: A Directory Traversal vulnerability in DashboardFileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to upload a malicious file in a section of the file system where it can be executed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.zerodayinitiative.com/advisories/ZDI-17-050 - https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-178 - http://www.securityfocus.com/bid/95694 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-2253.
CVE ID: CVE-2021-2253 Date Updated: 2024-09-26T15:02:22.930Z Date Published: 2021-04-22T21:53:56 Description: Vulnerability in the Oracle Advanced Supply Chain Planning product of Oracle Supply Chain (component: Core). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Supply Chain Planning. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Advanced Supply Chain Planning accessible data as well as unauthorized access to critical data or complete access to all Oracle Advanced Supply Chain Planning accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18289.
CVE ID: CVE-2017-18289 Date Updated: 2024-09-16T20:02:23.024Z Date Published: 2018-06-12T18:00:00Z Description: An issue was discovered in PvPGN Stats 2.4.6. SQL Injection exist in ladder/stats.php via the GET type parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://rchase.com/blog/posts/pvpgn-stats-multiple-sql-injection-vulnerabilities/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2998.
CVE ID: CVE-2022-2998 Date Updated: 2024-08-03T00:53:00.650Z Date Published: 2022-09-26T15:01:18 Description: Use after free in Browser Creation in Google Chrome prior to 104.0.5112.101 allowed a remote attacker who had convinced a user to engage in a specific UI interaction to potentially exploit heap corruption via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html - https://crbug.com/1329794 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1068
The MITRE ATT&CK technique T1068: Exploitation for Privilege Escalation is related to the vulnerability CVE-CVE-2010-1592. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2022-3064.
CVE ID: CVE-2022-3064 Date Updated: 2024-08-03T01:00:10.262Z Date Published: 2022-12-27T21:17:41.860Z Description: Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/go-yaml/yaml/commit/f221b8435cfb71e54062f6c6e99e9ade30b124d5 - https://github.com/go-yaml/yaml/releases/tag/v2.2.4 - https://pkg.go.dev/vuln/GO-2022-0956 - https://lists.debian.org/debian-lts-announce/2023/07/msg00001.html - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4SBIUECMLNC572P23DDOKJNKPJVX26SP/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3XC47AUW5J5M2ULJX7WCCL3B2ETLMT/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANIOPUXWIHVRA6CEWXCGOMX3YYS6KFHG/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1853.
CVE ID: CVE-2009-1853 Date Updated: 2024-08-07T05:27:54.792Z Date Published: 2009-06-01T19:00:00 Description: Multiple SQL injection vulnerabilities in index.php in Kensei Board 2.0 BETA (aka 2.0.0b) and earlier allow remote attackers to execute arbitrary SQL commands via the (1) f and (2) t parameters in a showforum action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/8802 - https://exchange.xforce.ibmcloud.com/vulnerabilities/50747 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52478.
CVE ID: CVE-2023-52478 Date Updated: 2024-08-15T19:25:22.271Z Date Published: 2024-02-29T05:43:10.698Z Description: In the Linux kernel, the following vulnerability has been resolved: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect hidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU) races when it races with itself. hidpp_connect_event() primarily runs from a workqueue but it also runs on probe() and if a "device-connected" packet is received by the hw when the thread running hidpp_connect_event() from probe() is waiting on the hw, then a second thread running hidpp_connect_event() will be started from the workqueue. This opens the following races (note the below code is simplified): 1. Retrieving + printing the protocol (harmless race): if (!hidpp->protocol_major) { hidpp_root_get_protocol_version() hidpp->protocol_major = response.rap.params[0]; } We can actually see this race hit in the dmesg in the abrt output attached to rhbz#2227968: [ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected. [ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected. Testing with extra logging added has shown that after this the 2 threads take turn grabbing the hw access mutex (send_mutex) so they ping-pong through all the other TOCTOU cases managing to hit all of them: 2. Updating the name to the HIDPP name (harmless race): if (hidpp->name == hdev->name) { ... hidpp->name = new_name; } 3. Initializing the power_supply class for the battery (problematic!): hidpp_initialize_battery() { if (hidpp->battery.ps) return 0; probe_battery(); /* Blocks, threads take turns executing this */ hidpp->battery.desc.properties = devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL); hidpp->battery.ps = devm_power_supply_register(&hidpp->hid_dev->dev, &hidpp->battery.desc, cfg); } 4. Creating delayed input_device (potentially problematic): if (hidpp->delayed_input) return; hidpp->delayed_input = hidpp_allocate_input(hdev); The really big problem here is 3. Hitting the race leads to the following sequence: hidpp->battery.desc.properties = devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL); hidpp->battery.ps = devm_power_supply_register(&hidpp->hid_dev->dev, &hidpp->battery.desc, cfg); ... hidpp->battery.desc.properties = devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL); hidpp->battery.ps = devm_power_supply_register(&hidpp->hid_dev->dev, &hidpp->battery.desc, cfg); So now we have registered 2 power supplies for the same battery, which looks a bit weird from userspace's pov but this is not even the really big problem. Notice how: 1. This is all devm-maganaged 2. The hidpp->battery.desc struct is shared between the 2 power supplies 3. hidpp->battery.desc.properties points to the result from the second devm_kmemdup() This causes a use after free scenario on USB disconnect of the receiver: 1. The last registered power supply class device gets unregistered 2. The memory from the last devm_kmemdup() call gets freed, hidpp->battery.desc.properties now points to freed memory 3. The first registered power supply class device gets unregistered, this involves sending a remove uevent to userspace which invokes power_supply_uevent() to fill the uevent data 4. power_supply_uevent() uses hidpp->battery.desc.properties which now points to freed memory leading to backtraces like this one: Sep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08 ... Sep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event Sep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0 ... Sep 22 20:01:35 eric kernel: ? asm_exc_page_fault+0x26/0x30 Sep 22 20:01:35 eric kernel: ? power_supply_uevent+0xee/0x1d0 Sep 22 20:01:35 eric kernel: ? power_supply_uevent+0x10d/0x1d0 Sep 22 20:01:35 eric kernel: dev_uevent+0x10f/0x2d0 Sep 22 20:01:35 eric kernel: kobject_uevent_env+0x291/0x680 Sep 22 20:01:35 eric kernel: ---truncated--- No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5 - https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c - https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b - https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1 - https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528 - https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d - https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e - https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39471.
CVE ID: CVE-2023-39471 Date Updated: 2024-08-02T18:10:20.683Z Date Published: 2024-05-03T02:10:38.498Z Description: TP-Link TL-WR841N ated_tp Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ated_tp service. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21825. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-1624/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0040.
CVE ID: CVE-2019-0040 Date Updated: 2024-09-16T19:00:02.889Z Date Published: 2019-04-10T20:13:51.499559Z Description: On Junos OS, rpcbind should only be listening to port 111 on the internal routing instance (IRI). External packets destined to port 111 should be dropped. Due to an information leak vulnerability, responses were being generated from the source address of the management interface (e.g. fxp0) thus disclosing internal addressing and existence of the management interface itself. A high rate of crafted packets destined to port 111 may also lead to a partial Denial of Service (DoS). Note: Systems with fxp0 disabled or unconfigured are not vulnerable to this issue. This issue only affects Junos OS releases based on FreeBSD 10 or higher (typically Junos OS 15.1+). Administrators can confirm whether systems are running a version of Junos OS based on FreeBSD 10 or higher by typing: user@junos> show version | match kernel JUNOS OS Kernel 64-bit [20181214.223829_fbsd-builder_stable_10] Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X53 versions prior to 15.1X53-D236; 16.1 versions prior to 16.1R7-S1; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8; 17.3 versions prior to 17.3R2; 17.4 versions prior to 17.4R1-S1, 17.4R1-S7, 17.4R2. This issue does not affect Junos OS releases prior to 15.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.juniper.net/JSA10929 - http://www.securityfocus.com/bid/107902 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12012.
CVE ID: CVE-2018-12012 Date Updated: 2024-08-05T08:24:03.622Z Date Published: 2019-05-24T16:44:16 Description: While updating blacklisting region shared buffered memory region is not validated against newly updated black list, causing boot-up to be compromised in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SD 8CX, SXR1130 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins#_CVE-2018-12012 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3238.
CVE ID: CVE-2011-3238 Date Updated: 2024-08-06T23:29:56.560Z Date Published: 2011-10-12T18:00:00 Description: WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/76384 - https://exchange.xforce.ibmcloud.com/vulnerabilities/70515 - http://support.apple.com/kb/HT4981 - http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17212 - http://lists.apple.com/archives/Security-announce/2011//Oct/msg00004.html - http://www.securityfocus.com/bid/50066 - http://support.apple.com/kb/HT5000 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50777.
CVE ID: CVE-2023-50777 Date Updated: 2024-08-02T22:23:43.907Z Date Published: 2023-12-13T17:30:21.995Z Description: Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier does not mask PaaSLane authentication tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3182 - http://www.openwall.com/lists/oss-security/2023/12/13/4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-45826.
CVE ID: CVE-2024-45826 Date Updated: 2024-09-12T14:58:34.096Z Date Published: 2024-09-12T14:33:44.373Z Description: CVE-2024-45826 IMPACT Due to improper input validation, a path traversal and remote code execution vulnerability exists when the ThinManager® processes a crafted POST request. If exploited, a user can install an executable file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1700.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-9403.
CVE ID: CVE-2024-9403 Date Updated: 2024-10-01T18:40:25.359Z Date Published: 2024-10-01T15:13:22.837Z Description: Memory safety bugs present in Firefox 130. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 131 and Thunderbird < 131. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1917807 - https://www.mozilla.org/security/advisories/mfsa2024-46/ - https://www.mozilla.org/security/advisories/mfsa2024-50/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-45637.
CVE ID: CVE-2023-45637 Date Updated: 2024-09-10T17:59:35.364Z Date Published: 2023-10-24T11:02:56.092Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in EventPrime EventPrime – Events Calendar, Bookings and Tickets plugin <= 3.1.5 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/eventprime-event-calendar-management/wordpress-eventprime-plugin-3-1-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-12758.
CVE ID: CVE-2017-12758 Date Updated: 2024-08-05T18:51:05.606Z Date Published: 2019-05-09T17:20:47 Description: https://www.joomlaextensions.co.in/ Joomla! Component Appointment 1.1 is affected by: SQL Injection. The impact is: Code execution (remote). The component is: com_appointment component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://joomlaextension.biz/appointment/ - https://www.exploit-db.com/exploits/42492 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7504.
CVE ID: CVE-2016-7504 Date Updated: 2024-08-06T01:57:47.645Z Date Published: 2016-10-29T01:00:00 Description: A use-after-free vulnerability was observed in Rp_toString function of Artifex Software, Inc. MuJS before 5c337af4b3df80cf967e4f9f6a21522de84b392a. A successful exploitation of this issue can lead to code execution or denial of service condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://bugs.ghostscript.com/show_bug.cgi?id=697142 - http://www.securityfocus.com/bid/94241 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2487.
CVE ID: CVE-2024-2487 Date Updated: 2024-08-08T20:48:48.983Z Date Published: 2024-03-15T08:31:04.506Z Description: A vulnerability was found in Tenda AC18 15.03.05.05. It has been declared as critical. This vulnerability affects the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName/mac leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-256894 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.256894 - https://vuldb.com/?ctiid.256894 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetDeviceName_devName.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28055.
CVE ID: CVE-2023-28055 Date Updated: 2024-09-24T13:20:14.242Z Date Published: 2023-09-26T13:35:38.352Z Description: Dell NetWorker, Version 19.7 has an improper authorization vulnerability in the NetWorker client. An unauthenticated attacker within the same network could potentially exploit this by manipulating a command leading to gain of complete access to the server file further resulting in information leaks, denial of service, and arbitrary code execution. Dell recommends customers to upgrade at the earliest opportunity. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000218003/dsa-2023-294-security-update-for-dell-networker-nw-client-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7805.
CVE ID: CVE-2015-7805 Date Updated: 2024-08-06T07:58:59.971Z Date Published: 2015-11-17T15:00:00 Description: Heap-based buffer overflow in libsndfile 1.0.25 allows remote attackers to have unspecified impact via the headindex value in the header in an AIFF file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2015/11/03/7 - http://lists.opensuse.org/opensuse-updates/2015-11/msg00077.html - http://www.securityfocus.com/bid/77427 - http://packetstormsecurity.com/files/133926/libsndfile-1.0.25-Heap-Overflow.html - http://www.ubuntu.com/usn/USN-2832-1 - https://security.gentoo.org/glsa/201612-03 - http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172607.html - http://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html - http://www.openwall.com/lists/oss-security/2015/11/03/3 - http://www.nemux.org/2015/10/13/libsndfile-1-0-25-heap-overflow/ - http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172593.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171466.html - https://www.exploit-db.com/exploits/38447/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26815.
CVE ID: CVE-2024-26815 Date Updated: 2024-09-11T17:33:41.649Z Date Published: 2024-04-10T11:07:03.182Z Description: In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check taprio_parse_tc_entry() is not correctly checking TCA_TAPRIO_TC_ENTRY_INDEX attribute: int tc; // Signed value tc = nla_get_u32(tb[TCA_TAPRIO_TC_ENTRY_INDEX]); if (tc >= TC_QOPT_MAX_QUEUE) { NL_SET_ERR_MSG_MOD(extack, "TC entry index out of range"); return -ERANGE; } syzbot reported that it could fed arbitary negative values: UBSAN: shift-out-of-bounds in net/sched/sch_taprio.c:1722:18 shift exponent -2147418108 is negative CPU: 0 PID: 5066 Comm: syz-executor367 Not tainted 6.8.0-rc7-syzkaller-00136-gc8a5c731fd12 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:217 [inline] __ubsan_handle_shift_out_of_bounds+0x3c7/0x420 lib/ubsan.c:386 taprio_parse_tc_entry net/sched/sch_taprio.c:1722 [inline] taprio_parse_tc_entries net/sched/sch_taprio.c:1768 [inline] taprio_change+0xb87/0x57d0 net/sched/sch_taprio.c:1877 taprio_init+0x9da/0xc80 net/sched/sch_taprio.c:2134 qdisc_create+0x9d4/0x1190 net/sched/sch_api.c:1355 tc_modify_qdisc+0xa26/0x1e40 net/sched/sch_api.c:1776 rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6617 netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543 netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline] netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367 netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [inline] __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667 do_syscall_64+0xf9/0x240 entry_SYSCALL_64_after_hwframe+0x6f/0x77 RIP: 0033:0x7f1b2dea3759 Code: 48 83 c4 28 c3 e8 d7 19 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd4de452f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f1b2def0390 RCX: 00007f1b2dea3759 RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000004 RBP: 0000000000000003 R08: 0000555500000000 R09: 0000555500000000 R10: 0000555500000000 R11: 0000000000000246 R12: 00007ffd4de45340 R13: 00007ffd4de45310 R14: 0000000000000001 R15: 00007ffd4de45340 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/bd2474a45df7c11412c2587de3d4e43760531418 - https://git.kernel.org/stable/c/6915b1b28fe57e92c78e664366dc61c4f15ff03b - https://git.kernel.org/stable/c/860e838fb089d652a446ced52cbdf051285b68e7 - https://git.kernel.org/stable/c/9b720bb1a69a9f12a4a5c86b6f89386fe05ed0f2 - https://git.kernel.org/stable/c/343041b59b7810f9cdca371f445dd43b35c740b1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26247.
CVE ID: CVE-2022-26247 Date Updated: 2024-08-03T04:56:37.917Z Date Published: 2022-03-20T18:34:59 Description: TMS v2.28.0 contains an insecure permissions vulnerability via the component /TMS/admin/user/Update2. This vulnerability allows attackers to modify the administrator account and password. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xiweicheng/tms/issues/16 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4890.
CVE ID: CVE-2012-4890 Date Updated: 2024-08-06T20:50:17.520Z Date Published: 2012-09-10T22:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in FlatnuX CMS 2011 08.09.2 and earlier allow remote attackers to inject arbitrary web script or HTML via a (1) comment to the news, (2) title to the news, or (3) the folder names in a gallery. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.org/files/111473/Flatnux-CMS-2011-08.09.2-CSRF-XSS-Directory-Traversal.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/74566 - http://www.osvdb.org/80877 - http://secunia.com/advisories/48656 - http://secunia.com/advisories/48676 - http://www.securityfocus.com/bid/52846 - http://www.vulnerability-lab.com/get_content.php?id=487 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16959.
CVE ID: CVE-2019-16959 Date Updated: 2024-08-05T01:24:48.746Z Date Published: 2020-12-21T15:13:21 Description: SolarWinds Web Help Desk 12.7.0 allows CSV Injection, also known as Formula Injection, via a file attached to a ticket. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.solarwinds.com/SuccessCenter/s/ - https://www.solarwinds.com/free-tools/free-help-desk-software - https://www.esecforte.com/formula-injection-vulnerability-india-in-solarwinds-web-help-desk/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-3994.
CVE ID: CVE-2019-3994 Date Updated: 2024-08-04T19:26:27.635Z Date Published: 2019-12-17T21:59:06 Description: ELOG 3.1.4-57bea22 and below is affected by a denial of service vulnerability due to a use after free. A remote unauthenticated attacker can crash the ELOG server by sending multiple HTTP POST requests which causes the ELOG function retrieve_url() to use a freed variable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2019-53 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2IN3FP6VXYSD4OMUCFZNOL7MKPWRQFAL/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4IAS4HI24H2ERKBZTDEVJ3LEQEFWYSCT/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27907.
CVE ID: CVE-2023-27907 Date Updated: 2024-08-02T12:23:30.127Z Date Published: 2023-04-17T00:00:00 Description: A malicious actor may convince a victim to open a malicious USD file that may trigger an out-of-bounds write vulnerability which may result in code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0003 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-23562.
CVE ID: CVE-2020-23562 Date Updated: 2024-08-04T14:58:15.206Z Date Published: 2022-07-17T23:11:07 Description: IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x000000000000aefe. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.irfanview.com/plugins.htm - https://github.com/nhiephon/Research No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6488.
CVE ID: CVE-2017-6488 Date Updated: 2024-08-05T15:33:20.106Z Date Published: 2017-03-05T20:00:00 Description: Multiple Cross-Site Scripting (XSS) issues were discovered in EPESI 1.8.1.1. The vulnerabilities exist due to insufficient filtration of user-supplied data (visible, tab, cid) passed to the EPESI-master/modules/Utils/RecordBrowser/Filters/save_filters.php URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/96955 - https://github.com/Telaxus/EPESI/issues/166 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3847.
CVE ID: CVE-2022-3847 Date Updated: 2024-08-03T01:20:58.782Z Date Published: 2022-11-28T13:50:08.559Z Description: The Showing URL in QR Code WordPress plugin through 0.0.1 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin or editor add Stored XSS payloads via a CSRF attack No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/a70ad549-2e09-44fb-b894-4271ad4a84f6 - https://bulletin.iese.de/post/get-site-to-phone-by-qr-code_0-0-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4910.
CVE ID: CVE-2012-4910 Date Updated: 2017-03-15T17:57:01 Date Published: 2017-03-15T18:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52758.
CVE ID: CVE-2023-52758 Date Updated: 2024-05-24T15:27:25.169Z Date Published: 2024-05-21T15:30:45.122Z Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1557
The MITRE ATT&CK technique T1557: Man-in-the-Middle is related to the vulnerability CVE-CVE-2018-16179. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2009-0879.
CVE ID: CVE-2009-0879 Date Updated: 2024-08-07T04:48:52.612Z Date Published: 2009-03-12T15:00:00 Description: The CIM server in IBM Director before 5.20.3 Service Update 2 on Windows allows remote attackers to cause a denial of service (daemon crash) via a long consumer name, as demonstrated by an M-POST request to a long /CIMListener/ URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2009/0656 - http://osvdb.org/52615 - http://www.securityfocus.com/archive/1/501638/100/0/threaded - http://secunia.com/advisories/34212 - https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=dmp&S_PKG=director_x_520&S_TACT=sms&lang=en_US&cp=UTF-8 - https://exchange.xforce.ibmcloud.com/vulnerabilities/49285 - http://securitytracker.com/id?1021825 - http://www.securityfocus.com/bid/34061 - https://www.exploit-db.com/exploits/8190 - https://www.sec-consult.com/files/20090305-1_IBM_director_DoS.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0698.
CVE ID: CVE-2009-0698 Date Updated: 2024-08-07T04:48:51.312Z Date Published: 2009-02-23T15:00:00 Description: Integer overflow in the 4xm demuxer (demuxers/demux_4xm.c) in xine-lib 1.1.16.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a 4X movie file with a large current_track value, a similar issue to CVE-2009-0385. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ubuntu.com/usn/USN-746-1 - http://www.mandriva.com/security/advisories?name=MDVSA-2009:299 - https://exchange.xforce.ibmcloud.com/vulnerabilities/48954 - http://sourceforge.net/project/shownotes.php?release_id=660071 - http://bugs.xine-project.org/show_bug.cgi?id=205 - http://www.mandriva.com/security/advisories?name=MDVSA-2009:298 - http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html - http://www.trapkit.de/advisories/TKADV2009-004.txt - http://www.securityfocus.com/archive/1/500514/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-20446.
CVE ID: CVE-2020-20446 Date Updated: 2024-08-04T14:22:25.155Z Date Published: 2021-05-25T17:40:59 Description: FFmpeg 4.2 is affected by a Divide By Zero issue via libavcodec/aacpsy.c, which allows a remote malicious user to cause a Denial of Service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://trac.ffmpeg.org/ticket/7995 - https://www.debian.org/security/2021/dsa-4990 - https://www.debian.org/security/2021/dsa-4998 - https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2516.
CVE ID: CVE-2008-2516 Date Updated: 2024-08-07T09:05:29.865Z Date Published: 2008-06-03T14:00:00 Description: pam_sm_authenticate in pam_pgsql.c in libpam-pgsql 0.6.3 does not properly consider operator precedence when evaluating the success of a pam_get_pass function call, which allows local users to gain privileges via a SIGINT signal when this function is executing, as demonstrated by a CTRL-C sequence at a sudo password prompt in an "auth sufficient pam_pgsql.so" configuration. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/30391 - http://www.vupen.com/english/advisories/2008/1654/references - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=481970 - https://exchange.xforce.ibmcloud.com/vulnerabilities/42653 - http://sourceforge.net/project/shownotes.php?release_id=601775 - http://www.securitytracker.com/id?1020111 - http://www.securityfocus.com/bid/29360 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47121.
CVE ID: CVE-2021-47121 Date Updated: 2024-08-04T05:24:39.876Z Date Published: 2024-03-15T20:14:27.287Z Description: In the Linux kernel, the following vulnerability has been resolved: net: caif: fix memory leak in cfusbl_device_notify In case of caif_enroll_dev() fail, allocated link_support won't be assigned to the corresponding structure. So simply free allocated pointer in case of error. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/cc302e30a504e6b60a9ac8df7988646f46cd0294 - https://git.kernel.org/stable/c/81afc61cb6e2b553f2c5f992fa79e0ae73857141 - https://git.kernel.org/stable/c/e8b37f5009ea7095529790f022859711e6939c76 - https://git.kernel.org/stable/c/9ea0ab48e755d8f29fe89eb235fb86176fdb597f - https://git.kernel.org/stable/c/4d94f530cd24c85aede6e72b8923f371b45d6886 - https://git.kernel.org/stable/c/46403c1f80b0d3f937ff9c4f5edc63bb64bc5051 - https://git.kernel.org/stable/c/dde8686985ec24d6b00487080a906609bd613ea1 - https://git.kernel.org/stable/c/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27325.
CVE ID: CVE-2024-27325 Date Updated: 2024-08-02T00:34:51.003Z Date Published: 2024-04-01T21:49:14.636Z Description: PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EMF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22275. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-24-203/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49093.
CVE ID: CVE-2023-49093 Date Updated: 2024-08-02T21:46:28.698Z Date Published: 2023-12-04T04:47:27.145Z Description: HtmlUnit is a GUI-less browser for Java programs. HtmlUnit is vulnerable to Remote Code Execution (RCE) via XSTL, when browsing the attacker’s webpage. This vulnerability has been patched in version 3.9.0 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/HtmlUnit/htmlunit/security/advisories/GHSA-37vq-hr2f-g7h7 - https://www.htmlunit.org/changes-report.html#a3.9.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46420.
CVE ID: CVE-2023-46420 Date Updated: 2024-09-11T15:34:24.378Z Date Published: 2023-10-25T00:00:00 Description: TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_41590C function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.totolink.cn/index.php/home/menu/detail.html?menu_listtpl=download&id=88&ids=36 - https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X6000R/5/1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24113.
CVE ID: CVE-2021-24113 Date Updated: 2024-08-03T19:21:18.545Z Date Published: 2021-02-25T23:01:58 Description: Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24113 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36640.
CVE ID: CVE-2022-36640 Date Updated: 2024-08-03T10:07:34.545Z Date Published: 2022-09-02T20:50:45 Description: influxData influxDB before v1.8.10 contains no authentication mechanism or controls, allowing unauthenticated attackers to execute arbitrary commands. NOTE: the CVE ID assignment is disputed because the vendor's documentation states "If InfluxDB is being deployed on a publicly accessible endpoint, we strongly recommend authentication be enabled. Otherwise the data will be publicly available to any unauthenticated user. The default settings do NOT enable authentication and authorization. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://influxdata.com - http://influxdb.com - http://www.krsecu.com/CVE/409b5310045bd6b9a984a5fb63bd8786d5c5681a8ad5b1c815c84b2b90002ad7.docx - https://dl.influxdata.com/influxdb/releases/influxdb_1.8.10_amd64.deb - https://portal.influxdata.com/downloads/ - https://www.influxdata.com/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-0224.
CVE ID: CVE-2012-0224 Date Updated: 2024-08-06T18:16:19.793Z Date Published: 2012-02-20T21:00:00 Description: Untrusted search path vulnerability in 7-Technologies (7T) AQUIS 1.5 and earlier allows local users to gain privileges via a Trojan horse DLL in the current working directory, a different vulnerability than CVE-2012-0223. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.us-cert.gov/control_systems/pdf/ICSA-12-025-01.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3703.
CVE ID: CVE-2013-3703 Date Updated: 2024-09-17T02:21:03.060Z Date Published: 2018-06-08T17:00:00Z Description: The controller of the Open Build Service API prior to version 2.4.4 is missing a write permission check, allowing an authenticated attacker to add or remove user roles from packages and/or project meta data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.suse.com/show_bug.cgi?id=828256 - https://github.com/openSUSE/open-build-service/commit/06ad7fdbdd7eb2fef8947d14c4cdd00d8f6387b1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26631.
CVE ID: CVE-2024-26631 Date Updated: 2024-08-27T14:55:52.147Z Date Published: 2024-03-18T10:07:48.346Z Description: In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work idev->mc_ifc_count can be written over without proper locking. Originally found by syzbot [1], fix this issue by encapsulating calls to mld_ifc_stop_work() (and mld_gq_stop_work() for good measure) with mutex_lock() and mutex_unlock() accordingly as these functions should only be called with mc_lock per their declarations. [1] BUG: KCSAN: data-race in ipv6_mc_down / mld_ifc_work write to 0xffff88813a80c832 of 1 bytes by task 3771 on cpu 0: mld_ifc_stop_work net/ipv6/mcast.c:1080 [inline] ipv6_mc_down+0x10a/0x280 net/ipv6/mcast.c:2725 addrconf_ifdown+0xe32/0xf10 net/ipv6/addrconf.c:3949 addrconf_notify+0x310/0x980 notifier_call_chain kernel/notifier.c:93 [inline] raw_notifier_call_chain+0x6b/0x1c0 kernel/notifier.c:461 __dev_notify_flags+0x205/0x3d0 dev_change_flags+0xab/0xd0 net/core/dev.c:8685 do_setlink+0x9f6/0x2430 net/core/rtnetlink.c:2916 rtnl_group_changelink net/core/rtnetlink.c:3458 [inline] __rtnl_newlink net/core/rtnetlink.c:3717 [inline] rtnl_newlink+0xbb3/0x1670 net/core/rtnetlink.c:3754 rtnetlink_rcv_msg+0x807/0x8c0 net/core/rtnetlink.c:6558 netlink_rcv_skb+0x126/0x220 net/netlink/af_netlink.c:2545 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:6576 netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline] netlink_unicast+0x589/0x650 net/netlink/af_netlink.c:1368 netlink_sendmsg+0x66e/0x770 net/netlink/af_netlink.c:1910 ... write to 0xffff88813a80c832 of 1 bytes by task 22 on cpu 1: mld_ifc_work+0x54c/0x7b0 net/ipv6/mcast.c:2653 process_one_work kernel/workqueue.c:2627 [inline] process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2700 worker_thread+0x525/0x730 kernel/workqueue.c:2781 ... No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/62b3387beef11738eb6ce667601a28fa089fa02c - https://git.kernel.org/stable/c/380540bb06bb1d1b12bdc947d1b8f56cda6b5663 - https://git.kernel.org/stable/c/3cc283fd16fba72e2cefe3a6f48d7a36b0438900 - https://git.kernel.org/stable/c/3bb5849675ae1d592929798a2b37ea450879c855 - https://git.kernel.org/stable/c/2e7ef287f07c74985f1bf2858bedc62bd9ebf155 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1031.
CVE ID: CVE-2010-1031 Date Updated: 2024-09-17T01:21:31.206Z Date Published: 2010-04-01T19:00:00Z Description: Unspecified vulnerability in HP Insight Control for Linux (aka IC-Linux or ICE-LX) 2.11 and earlier allows local users to gain privileges via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/39052 - http://secunia.com/advisories/39227 - http://marc.info/?l=bugtraq&m=126996888626964&w=2 - http://www.vupen.com/english/advisories/2010/0750 - http://securitytracker.com/id?1023771 - http://marc.info/?l=bugtraq&m=126996888626964&w=2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-42794.
CVE ID: CVE-2023-42794 Date Updated: 2024-08-02T19:30:24.246Z Date Published: 2023-10-10T17:17:01.378Z Description: Incomplete Cleanup vulnerability in Apache Tomcat. The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, in progress refactoring that exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the stream. The file would never be deleted from disk creating the possibility of an eventual denial of service due to the disk being full. Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/vvbr2ms7lockj1hlhz5q3wmxb2mwcw82 - http://www.openwall.com/lists/oss-security/2023/10/10/8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1150.
CVE ID: CVE-2008-1150 Date Updated: 2024-08-07T08:08:57.729Z Date Published: 2008-03-27T17:00:00 Description: The virtual private dial-up network (VPDN) component in Cisco IOS before 12.3 allows remote attackers to cause a denial of service (resource exhaustion) via a series of PPTP sessions, related to the persistence of interface descriptor block (IDB) data structures after process termination, aka bug ID CSCdv59309. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2008/1006/references - https://exchange.xforce.ibmcloud.com/vulnerabilities/41484 - http://www.securityfocus.com/bid/28460 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080969862.shtml - http://www.us-cert.gov/cas/techalerts/TA08-087B.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5598 - http://secunia.com/advisories/29507 - http://securitytracker.com/id?1019714 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41591.
CVE ID: CVE-2021-41591 Date Updated: 2024-08-04T03:15:29.283Z Date Published: 2021-10-04T16:47:56 Description: ACINQ Eclair before 0.6.3 allows loss of funds because of dust HTLC exposure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-May/002714.html - https://bitcoinmagazine.com/technical/good-griefing-a-lingering-vulnerability-on-lightning-network-that-still-needs-fixing - https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-October/003257.html - https://github.com/ACINQ/eclair/pull/1985 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-20824.
CVE ID: CVE-2024-20824 Date Updated: 2024-08-01T22:06:36.395Z Date Published: 2024-02-06T02:23:14.512Z Description: Implicit intent hijacking vulnerability in VoiceSearch of Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9061.
CVE ID: CVE-2016-9061 Date Updated: 2024-08-06T02:42:09.920Z Date Published: 2018-06-11T21:00:00 Description: A previously installed malicious Android application which defines a specific signature-level permissions used by Firefox can access API keys meant for Firefox only. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox < 50. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/94337 - http://www.securitytracker.com/id/1037298 - https://bugzilla.mozilla.org/show_bug.cgi?id=1245795 - https://www.mozilla.org/security/advisories/mfsa2016-89/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0489.
CVE ID: CVE-2013-0489 Date Updated: 2024-08-06T14:25:10.488Z Date Published: 2013-03-27T10:00:00 Description: Cross-site request forgery (CSRF) vulnerability in webadmin.nsf (aka the Web Administrator client) in IBM Domino 8.5.x allows remote authenticated users to hijack the authentication of administrators. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/81854 - http://www-01.ibm.com/support/docview.wss?uid=swg21627597 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-37677.
CVE ID: CVE-2024-37677 Date Updated: 2024-08-02T03:57:39.765Z Date Published: 2024-06-24T00:00:00 Description: An issue in Shenzhen Weitillage Industrial Co., Ltd the access management specialist V6.62.51215 allows a remote attacker to obtain sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/dabaizhizhu/123/issues/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-35732.
CVE ID: CVE-2023-35732 Date Updated: 2024-09-18T18:29:00.331Z Date Published: 2024-05-03T01:57:50.607Z Description: D-Link DAP-2622 DDP Reset Factory Auth Password Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-20059. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-1238/ - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30226.
CVE ID: CVE-2023-30226 Date Updated: 2024-08-02T14:21:44.792Z Date Published: 2023-07-12T00:00:00 Description: An issue was discovered in function get_gnu_verneed in rizinorg Rizin prior to 0.5.0 verneed_entry allows attackers to cause a denial of service via crafted elf file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/rizinorg/rizin/commit/a6d89de0d44e776f9bccc3a168fdc79f604e14ed - https://github.com/ifyGecko/CVE-2023-30226 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-29893.
CVE ID: CVE-2024-29893 Date Updated: 2024-08-02T01:17:58.029Z Date Published: 2024-03-29T15:07:51.057Z Description: Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of ArgoCD starting from v2.4 have a bug where the ArgoCD repo-server component is vulnerable to a Denial-of-Service attack vector. Specifically, it's possible to crash the repo server component through an out of memory error by pointing it to a malicious Helm registry. The loadRepoIndex() function in the ArgoCD's helm package, does not limit the size nor time while fetching the data. It fetches it and creates a byte slice from the retrieved data in one go. If the registry is implemented to push data continuously, the repo server will keep allocating memory until it runs out of it. A patch for this vulnerability has been released in v2.10.3, v2.9.8, and v2.8.12. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/argoproj/argo-cd/security/advisories/GHSA-jhwx-mhww-rgc3 - https://github.com/argoproj/argo-cd/commit/14f681e3ee7c38731943b98f92277e88a3db109d - https://github.com/argoproj/argo-cd/commit/36b8a12a38f8d92d55bffc81deed44389bf6eb59 - https://github.com/argoproj/argo-cd/commit/3e5a878f6e30d935fa149723ea2a2e93748fcddd No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7780.
CVE ID: CVE-2018-7780 Date Updated: 2024-09-17T00:21:09.174Z Date Published: 2018-07-03T14:00:00Z Description: In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior to 3.29.69, a buffer overflow vulnerability exist in cgi program "set". No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.schneider-electric.com/en/download/document/SEVD-2018-114-01/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1003049.
CVE ID: CVE-2019-1003049 Date Updated: 2024-08-05T03:07:18.205Z Date Published: 2019-04-10T20:12:29 Description: Users who cached their CLI authentication before Jenkins was updated to 2.150.2 and newer, or 2.160 and newer, would remain authenticated in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, because the fix for CVE-2019-1003004 in these releases did not reject existing remoting-based CLI authentication caches. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/107901 - https://access.redhat.com/errata/RHBA-2019:1605 - https://www.oracle.com/security-alerts/cpuapr2022.html - https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1289 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0163.
CVE ID: CVE-2019-0163 Date Updated: 2024-08-04T17:44:14.662Z Date Published: 2019-04-17T17:03:36 Description: Insufficient input validation in system firmware for Intel(R) Broadwell U i5 vPro before version MYBDWi5v.86A may allow an authenticated user to potentially enable escalation of privilege, denial of service, and/or information disclosure via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00239.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2565.
CVE ID: CVE-2024-2565 Date Updated: 2024-08-12T15:52:09.649Z Date Published: 2024-03-17T14:31:04.357Z Description: A vulnerability was found in PandaXGO PandaX up to 20240310. It has been classified as critical. Affected is an unknown function of the file /apps/system/router/upload.go of the component File Extension Handler. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257064. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.257064 - https://vuldb.com/?ctiid.257064 - https://github.com/PandaXGO/PandaX/issues/5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0993.
CVE ID: CVE-2024-0993 Date Updated: 2024-08-01T18:26:30.359Z Date Published: 2024-01-29T01:31:04.198Z Description: A vulnerability was found in Tenda i6 1.0.0.9(3857). It has been classified as critical. Affected is the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-252258 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.252258 - https://vuldb.com/?ctiid.252258 - https://jylsec.notion.site/Tenda-i6-has-stack-buffer-overflow-vulnerability-in-formWifiMacFilterGet-8b2c5cb67e2a433cad62d737782a7e0f?pvs=4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6901.
CVE ID: CVE-2015-6901 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21005.
CVE ID: CVE-2024-21005 Date Updated: 2024-08-01T22:13:41.483Z Date Published: 2024-04-16T21:25:59.621Z Description: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u401; Oracle GraalVM Enterprise Edition: 20.3.13 and 21.3.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2024.html - https://security.netapp.com/advisory/ntap-20240426-0004/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2415.
CVE ID: CVE-2010-2415 Date Updated: 2024-08-07T02:32:16.587Z Date Published: 2010-10-13T23:00:00 Description: Unspecified vulnerability in the Change Data Capture component in Oracle Database Server 10.1.0.5, 10.2.0.4, 11.1.0.7, and 11.2.0.1 allows remote authenticated users to affect confidentiality and integrity, related to DBMS_CDC_PUBLISH. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html - http://www.us-cert.gov/cas/techalerts/TA10-287A.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2703.
CVE ID: CVE-2022-2703 Date Updated: 2024-08-03T00:46:04.007Z Date Published: 2022-08-08T12:50:19 Description: A vulnerability was found in SourceCodester Gym Management System. It has been classified as critical. This affects an unknown part of the component Exercises Module. The manipulation of the argument exer leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205827. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/gdianq/Gym-Management-Exercises-Sqlinjection/blob/main/README.md - https://vuldb.com/?id.205827 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7885.
CVE ID: CVE-2019-7885 Date Updated: 2024-08-04T21:02:19.254Z Date Published: 2019-08-02T21:20:53 Description: Insufficient input validation in the config builder of the Elastic search module could lead to remote code execution in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This vulnerability could be abused by an authenticated user with the ability to configure the catalog search. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1640.
CVE ID: CVE-2010-1640 Date Updated: 2024-08-07T01:28:41.582Z Date Published: 2010-05-26T18:00:00 Description: Off-by-one error in the parseicon function in libclamav/pe_icons.c in ClamAV 0.96 allows remote attackers to cause a denial of service (crash) via a crafted PE icon that triggers an out-of-bounds read, related to improper rounding during scaling. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blobdiff%3Bf=libclamav/pe_icons.c%3Bh=3f1bc5be69d0f9d84e576814d1a3cc6f40c4ff2c%3Bhp=39a714f05968f9e929576bf171dd0eb58bf06bef%3Bhb=7f0e3bbf77382d9782e0189bf80f5f59a95779b3%3Bhpb=f0eb394501ec21b9fe67f36cbf5db788711d4236 - http://www.openwall.com/lists/oss-security/2010/05/21/7 - https://exchange.xforce.ibmcloud.com/vulnerabilities/58825 - http://www.securityfocus.com/bid/40318 - http://www.vupen.com/english/advisories/2010/1214 - http://www.mandriva.com/security/advisories?name=MDVSA-2010:110 - http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2031 - http://secunia.com/advisories/39895 - http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96.1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-7005.
CVE ID: CVE-2024-7005 Date Updated: 2024-08-06T16:12:30.726Z Date Published: 2024-08-06T15:37:27.850Z Description: Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a malicious file. (Chromium security severity: Low) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html - https://issues.chromium.org/issues/40068800 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2051.
CVE ID: CVE-2012-2051 Date Updated: 2024-08-06T19:17:27.695Z Date Published: 2012-08-15T10:00:00 Description: Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4147, CVE-2012-4148, CVE-2012-4149, CVE-2012-4150, CVE-2012-4151, CVE-2012-4152, CVE-2012-4153, CVE-2012-4154, CVE-2012-4155, CVE-2012-4156, CVE-2012-4157, CVE-2012-4158, CVE-2012-4159, and CVE-2012-4160. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16394 - http://www.adobe.com/support/security/bulletins/apsb12-16.html - http://security.gentoo.org/glsa/glsa-201308-03.xml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-28944.
CVE ID: CVE-2020-28944 Date Updated: 2024-08-04T16:48:00.595Z Date Published: 2021-04-30T21:06:19 Description: OX Guard 2.10.4 and earlier allows a Denial of Service via a WKS server that responds slowly or with a large amount of data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://open-xchange.com - http://packetstormsecurity.com/files/162406/OX-App-Suite-OX-Guard-SSRF-DoS-Cross-Site-Scripting.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-26861.
CVE ID: CVE-2020-26861 Date Updated: 2022-10-13T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7357.
CVE ID: CVE-2016-7357 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28582.
CVE ID: CVE-2024-28582 Date Updated: 2024-08-02T18:55:09.780Z Date Published: 2024-03-20T00:00:00 Description: Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909] allows a local attacker to execute arbitrary code via the rgbe_RGBEToFloat() function when reading images in HDR format. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17630.
CVE ID: CVE-2017-17630 Date Updated: 2024-08-05T20:59:16.994Z Date Published: 2017-12-13T09:00:00 Description: Yoga Class Script 1.0 has SQL Injection via the /list city parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/43282/ - https://packetstormsecurity.com/files/145322/Yoga-Class-Script-1.0-SQL-Injection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2084.
CVE ID: CVE-2012-2084 Date Updated: 2024-08-06T19:17:27.825Z Date Published: 2012-11-22T11:00:00 Description: Cross-site scripting (XSS) vulnerability in the Printer, email and PDF versions module 6.x-1.x before 6.x-1.15 and 7.x-1.x before 7.x-1.0 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, probably the PATH_INFO. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://drupalcode.org/project/print.git/commit/30480e0 - https://exchange.xforce.ibmcloud.com/vulnerabilities/74611 - http://drupalcode.org/project/print.git/commit/6771c3f - http://drupal.org/node/1515722 - http://drupal.org/node/1515060 - http://www.securityfocus.com/bid/52896 - http://www.openwall.com/lists/oss-security/2012/04/07/1 - http://drupal.org/node/1515076 - http://secunia.com/advisories/48625 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1983.
CVE ID: CVE-2013-1983 Date Updated: 2024-08-06T15:20:37.502Z Date Published: 2013-06-15T19:00:00 Description: Integer overflow in X.org libXfixes 5.0 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XFixesGetCursorImage function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2013/dsa-2676 - http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106794.html - http://www.ubuntu.com/usn/USN-1858-1 - http://www.openwall.com/lists/oss-security/2013/05/23/3 - http://lists.opensuse.org/opensuse-updates/2013-06/msg00144.html - http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0462.
CVE ID: CVE-2011-0462 Date Updated: 2024-09-16T17:02:55.828Z Date Published: 2011-04-10T01:00:00Z Description: Multiple cross-site scripting (XSS) vulnerabilities in the login page in the webui component in SUSE openSUSE Build Service (OBS) before 2.1.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://news.opensuse.org/2011/03/02/build-service-team-releases-new-versions-fixing-security-problems/ - https://bugzilla.novell.com/show_bug.cgi?id=669909 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7192.
CVE ID: CVE-2016-7192 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0224.
CVE ID: CVE-2014-0224 Date Updated: 2024-08-06T09:05:39.462Z Date Published: 2014-06-05T21:00:00 Description: OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/59342 - http://secunia.com/advisories/59669 - http://secunia.com/advisories/59525 - http://marc.info/?l=bugtraq&m=140604261522465&w=2 - http://secunia.com/advisories/59004 - http://secunia.com/advisories/59530 - http://www-01.ibm.com/support/docview.wss?uid=swg21675626 - http://secunia.com/advisories/59824 - http://secunia.com/advisories/59282 - http://www.novell.com/support/kb/doc.php?id=7015300 - http://secunia.com/advisories/59215 - https://bugzilla.redhat.com/show_bug.cgi?id=1103586 - http://secunia.com/advisories/59990 - http://secunia.com/advisories/59264 - http://secunia.com/advisories/59454 - http://secunia.com/advisories/58492 - http://secunia.com/advisories/59186 - http://secunia.com/advisories/59188 - http://secunia.com/advisories/59126 - http://marc.info/?l=bugtraq&m=140672208601650&w=2 - http://marc.info/?l=bugtraq&m=140784085708882&w=2 - http://www.novell.com/support/kb/doc.php?id=7015264 - http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html - http://secunia.com/advisories/59306 - http://rhn.redhat.com/errata/RHSA-2014-0627.html - http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 - http://marc.info/?l=bugtraq&m=140544599631400&w=2 - http://rhn.redhat.com/errata/RHSA-2014-0626.html - http://secunia.com/advisories/59190 - http://secunia.com/advisories/58639 - http://www-01.ibm.com/support/docview.wss?uid=swg21678289 - http://www.ibm.com/support/docview.wss?uid=swg21676877 - http://secunia.com/advisories/59446 - http://secunia.com/advisories/59529 - http://secunia.com/advisories/59445 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html - http://secunia.com/advisories/59589 - http://secunia.com/advisories/59894 - http://secunia.com/advisories/59325 - http://secunia.com/advisories/59354 - http://www-01.ibm.com/support/docview.wss?uid=swg24037729 - http://www-01.ibm.com/support/docview.wss?uid=swg21677131 - http://marc.info/?l=bugtraq&m=140266410314613&w=2 - http://secunia.com/advisories/61254 - http://www-01.ibm.com/support/docview.wss?uid=swg21678233 - http://secunia.com/advisories/59447 - http://www.securitytracker.com/id/1031594 - http://www-01.ibm.com/support/docview.wss?uid=swg21676655 - http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E - http://secunia.com/advisories/59223 - http://secunia.com/advisories/58743 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - http://secunia.com/advisories/58719 - http://secunia.com/advisories/59449 - http://secunia.com/advisories/59132 - http://marc.info/?l=bugtraq&m=142350350616251&w=2 - http://www-01.ibm.com/support/docview.wss?uid=isg400001843 - http://marc.info/?l=bugtraq&m=140870499402361&w=2 - http://marc.info/?l=bugtraq&m=140386311427810&w=2 - http://secunia.com/advisories/59442 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 - http://marc.info/?l=bugtraq&m=140317760000786&w=2 - http://marc.info/?l=bugtraq&m=142805027510172&w=2 - http://www-01.ibm.com/support/docview.wss?uid=swg21676879 - http://www-01.ibm.com/support/docview.wss?uid=swg24037761 - http://www-01.ibm.com/support/docview.wss?uid=swg21677828 - http://secunia.com/advisories/59441 - http://marc.info/?l=bugtraq&m=140621259019789&w=2 - http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf - http://marc.info/?l=bugtraq&m=140852757108392&w=2 - https://filezilla-project.org/versions.php?type=server - http://www-01.ibm.com/support/docview.wss?uid=swg21676786 - http://secunia.com/advisories/60567 - http://secunia.com/advisories/59189 - http://secunia.com/advisories/59368 - http://www.mandriva.com/security/advisories?name=MDVSA-2014:106 - http://secunia.com/advisories/59142 - http://www-01.ibm.com/support/docview.wss?uid=swg21676478 - http://www-01.ibm.com/support/docview.wss?uid=swg21676845 - http://secunia.com/advisories/58742 - https://www.ibm.com/support/docview.wss?uid=ssg1S1004670 - http://rhn.redhat.com/errata/RHSA-2014-0624.html - http://secunia.com/advisories/59602 - http://www.kerio.com/support/kerio-control/release-history - http://secunia.com/advisories/59300 - http://secunia.com/advisories/58930 - http://www-01.ibm.com/support/docview.wss?uid=swg21677080 - http://secunia.com/advisories/61815 - http://secunia.com/advisories/58667 - http://security.gentoo.org/glsa/glsa-201407-05.xml - http://www-01.ibm.com/support/docview.wss?uid=swg21677390 - http://secunia.com/advisories/59191 - http://secunia.com/advisories/59284 - http://secunia.com/advisories/59444 - https://www.imperialviolet.org/2014/06/05/earlyccs.html - http://www.ibm.com/support/docview.wss?uid=swg24037783 - http://secunia.com/advisories/59365 - http://www-01.ibm.com/support/docview.wss?uid=swg21677695 - http://secunia.com/advisories/59305 - http://www-01.ibm.com/support/docview.wss?uid=swg21676529 - http://secunia.com/advisories/59483 - http://secunia.com/advisories/58385 - http://www.securityfocus.com/archive/1/534161/100/0/threaded - http://secunia.com/advisories/59495 - http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163 - http://www-01.ibm.com/support/docview.wss?uid=swg21676889 - http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html - http://secunia.com/advisories/58945 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 - http://marc.info/?l=bugtraq&m=141025641601169&w=2 - http://secunia.com/advisories/59659 - http://secunia.com/advisories/59440 - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html - http://secunia.com/advisories/59429 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - http://secunia.com/advisories/59655 - http://secunia.com/advisories/59370 - http://secunia.com/advisories/59827 - http://secunia.com/advisories/58660 - http://secunia.com/advisories/59163 - http://secunia.com/advisories/58716 - http://secunia.com/advisories/59055 - http://www-01.ibm.com/support/docview.wss?uid=swg21676071 - http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737 - http://www-01.ibm.com/support/docview.wss?uid=swg21677836 - http://secunia.com/advisories/59437 - http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 - http://secunia.com/advisories/60176 - http://marc.info/?l=bugtraq&m=141147110427269&w=2 - http://secunia.com/advisories/59101 - http://esupport.trendmicro.com/solution/en-US/1103813.aspx - http://secunia.com/advisories/59374 - http://secunia.com/advisories/59063 - http://www.vmware.com/security/advisories/VMSA-2014-0006.html - https://discussions.nessus.org/thread/7517 - http://secunia.com/advisories/59310 - http://www-01.ibm.com/support/docview.wss?uid=swg21676501 - http://marc.info/?l=bugtraq&m=142350350616251&w=2 - http://www-01.ibm.com/support/docview.wss?uid=swg21676536 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc - http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506 - http://secunia.com/advisories/59502 - http://www.splunk.com/view/SP-CAAAM2D - http://secunia.com/advisories/59878 - http://www.fortiguard.com/advisory/FG-IR-14-018/ - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html - http://marc.info/?l=bugtraq&m=140852826008699&w=2 - http://www.ibm.com/support/docview.wss?uid=swg21676793 - http://secunia.com/advisories/59214 - http://www.ibm.com/support/docview.wss?uid=swg21676356 - http://marc.info/?l=bugtraq&m=140794476212181&w=2 - http://marc.info/?l=bugtraq&m=140389274407904&w=2 - http://support.citrix.com/article/CTX140876 - http://secunia.com/advisories/59167 - http://secunia.com/advisories/59120 - http://www-01.ibm.com/support/docview.wss?uid=swg24037732 - http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 - http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172 - http://marc.info/?l=bugtraq&m=140369637402535&w=2 - http://secunia.com/advisories/59380 - http://www.mandriva.com/security/advisories?name=MDVSA-2014:105 - http://secunia.com/advisories/59460 - http://secunia.com/advisories/59506 - http://secunia.com/advisories/58939 - http://marc.info/?l=bugtraq&m=140266410314613&w=2 - http://secunia.com/advisories/59661 - http://secunia.com/advisories/59514 - http://secunia.com/advisories/59677 - http://rhn.redhat.com/errata/RHSA-2014-0630.html - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl - http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 - http://rhn.redhat.com/errata/RHSA-2014-0632.html - http://www-01.ibm.com/support/docview.wss?uid=swg24037730 - https://kc.mcafee.com/corporate/index?page=content&id=SB10075 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - http://www-01.ibm.com/support/docview.wss?uid=swg24037731 - http://secunia.com/advisories/58745 - http://www-01.ibm.com/support/docview.wss?uid=swg21676419 - http://secunia.com/advisories/59438 - http://www.ibm.com/support/docview.wss?uid=isg3T1020948 - http://www-01.ibm.com/support/docview.wss?uid=swg21676496 - http://secunia.com/advisories/58714 - http://marc.info/?l=bugtraq&m=140482916501310&w=2 - http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html - http://ccsinjection.lepidum.co.jp - http://secunia.com/advisories/59435 - http://marc.info/?l=bugtraq&m=141658880509699&w=2 - http://www.openssl.org/news/secadv_20140605.txt - http://secunia.com/advisories/58615 - http://marc.info/?l=bugtraq&m=142546741516006&w=2 - http://seclists.org/fulldisclosure/2014/Dec/23 - http://www-01.ibm.com/support/docview.wss?uid=swg21676644 - http://secunia.com/advisories/59231 - https://www.ibm.com/support/docview.wss?uid=ssg1S1004671 - http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html - http://support.apple.com/kb/HT6443 - http://secunia.com/advisories/59211 - http://secunia.com/advisories/58433 - http://secunia.com/advisories/60066 - http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html - https://access.redhat.com/site/blogs/766093/posts/908133 - http://secunia.com/advisories/59301 - http://secunia.com/advisories/60522 - http://secunia.com/advisories/59784 - https://kb.bluecoat.com/index?page=content&id=SA80 - http://marc.info/?l=bugtraq&m=141383410222440&w=2 - http://seclists.org/fulldisclosure/2014/Jun/38 - http://marc.info/?l=bugtraq&m=140904544427729&w=2 - http://www.f-secure.com/en/web/labs_global/fsc-2014-6 - http://secunia.com/advisories/59135 - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 - http://www-01.ibm.com/support/docview.wss?uid=swg21678167 - http://secunia.com/advisories/58759 - http://secunia.com/advisories/59093 - http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740 - http://puppetlabs.com/security/cve/cve-2014-0224 - http://secunia.com/advisories/59192 - http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html - http://marc.info/?l=bugtraq&m=140752315422991&w=2 - http://secunia.com/advisories/58579 - https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf - http://secunia.com/advisories/59040 - http://marc.info/?l=bugtraq&m=140389355508263&w=2 - http://secunia.com/advisories/59175 - http://secunia.com/advisories/60819 - http://marc.info/?l=bugtraq&m=140448122410568&w=2 - http://secunia.com/advisories/59666 - http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download - http://secunia.com/advisories/58128 - http://marc.info/?l=bugtraq&m=140431828824371&w=2 - http://secunia.com/advisories/59413 - http://www-01.ibm.com/support/docview.wss?uid=swg21676334 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html - http://www-01.ibm.com/support/docview.wss?uid=swg21675821 - http://www-01.ibm.com/support/docview.wss?uid=swg24037870 - http://secunia.com/advisories/59721 - http://marc.info/?l=bugtraq&m=141383465822787&w=2 - http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 - http://rhn.redhat.com/errata/RHSA-2014-0680.html - http://www-01.ibm.com/support/docview.wss?uid=swg21676062 - http://secunia.com/advisories/59012 - http://secunia.com/advisories/58713 - http://www-01.ibm.com/support/docview.wss?uid=swg21673137 - http://secunia.com/advisories/59362 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 - http://www-01.ibm.com/support/docview.wss?uid=swg21676035 - http://marc.info/?l=bugtraq&m=140499864129699&w=2 - http://rhn.redhat.com/errata/RHSA-2014-0631.html - http://secunia.com/advisories/59338 - http://secunia.com/advisories/59450 - http://linux.oracle.com/errata/ELSA-2014-1053.html - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html - http://www.kb.cert.org/vuls/id/978508 - http://www.securitytracker.com/id/1031032 - http://secunia.com/advisories/59287 - https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1 - http://www-01.ibm.com/support/docview.wss?uid=swg21683332 - http://secunia.com/advisories/59491 - http://secunia.com/advisories/59364 - https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues - http://secunia.com/advisories/59451 - http://secunia.com/advisories/58977 - https://www.novell.com/support/kb/doc.php?id=7015271 - http://www-01.ibm.com/support/docview.wss?uid=swg21676333 - http://secunia.com/advisories/60571 - http://secunia.com/advisories/59459 - http://www-01.ibm.com/support/docview.wss?uid=swg21676833 - http://secunia.com/advisories/60577 - http://secunia.com/advisories/59448 - https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441 - https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf - http://www.blackberry.com/btsc/KB36051 - http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm - http://marc.info/?l=bugtraq&m=141164638606214&w=2 - http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690 - http://secunia.com/advisories/59885 - http://www-01.ibm.com/support/docview.wss?uid=swg21677527 - http://secunia.com/advisories/59202 - http://rhn.redhat.com/errata/RHSA-2014-0633.html - http://www.ibm.com/support/docview.wss?uid=ssg1S1004678 - http://secunia.com/advisories/59375 - http://marc.info/?l=bugtraq&m=140983229106599&w=2 - http://secunia.com/advisories/59528 - http://secunia.com/advisories/58337 - http://secunia.com/advisories/59518 - http://secunia.com/advisories/59389 - http://secunia.com/advisories/59162 - http://secunia.com/advisories/59383 - http://www-01.ibm.com/support/docview.wss?uid=swg21677567 - http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217 - http://secunia.com/advisories/59490 - http://secunia.com/advisories/59916 - http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E - http://marc.info/?l=bugtraq&m=140491231331543&w=2 - http://www-01.ibm.com/support/docview.wss?uid=swg24037727 - http://www.ibm.com/support/docview.wss?uid=swg1IT02314 - http://secunia.com/advisories/59043 - http://secunia.com/advisories/59347 - http://secunia.com/advisories/60049 - http://www-01.ibm.com/support/docview.wss?uid=swg21676615 - https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf - https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6393.
CVE ID: CVE-2014-6393 Date Updated: 2024-08-06T12:17:23.956Z Date Published: 2017-08-09T18:00:00 Description: The Express web framework before 3.11 and 4.x before 4.5 for Node.js does not provide a charset field in HTTP Content-Type headers in 400 level responses, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via characters in a non-standard encoding. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nodesecurity.io/advisories/express-no-charset-in-content-type-header - https://bugzilla.redhat.com/show_bug.cgi?id=1203190 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26834.
CVE ID: CVE-2024-26834 Date Updated: 2024-08-02T00:14:13.630Z Date Published: 2024-04-17T10:10:02.282Z Description: In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_flow_offload: release dst in case direct xmit path is used Direct xmit does not use it since it calls dev_queue_xmit() to send packets, hence it calls dst_release(). kmemleak reports: unreferenced object 0xffff88814f440900 (size 184): comm "softirq", pid 0, jiffies 4294951896 hex dump (first 32 bytes): 00 60 5b 04 81 88 ff ff 00 e6 e8 82 ff ff ff ff .`[............. 21 0b 50 82 ff ff ff ff 00 00 00 00 00 00 00 00 !.P............. backtrace (crc cb2bf5d6): [<000000003ee17107>] kmem_cache_alloc+0x286/0x340 [<0000000021a5de2c>] dst_alloc+0x43/0xb0 [<00000000f0671159>] rt_dst_alloc+0x2e/0x190 [<00000000fe5092c9>] __mkroute_output+0x244/0x980 [<000000005fb96fb0>] ip_route_output_flow+0xc0/0x160 [<0000000045367433>] nf_ip_route+0xf/0x30 [<0000000085da1d8e>] nf_route+0x2d/0x60 [<00000000d1ecd1cb>] nft_flow_route+0x171/0x6a0 [nft_flow_offload] [<00000000d9b2fb60>] nft_flow_offload_eval+0x4e8/0x700 [nft_flow_offload] [<000000009f447dbb>] expr_call_ops_eval+0x53/0x330 [nf_tables] [<00000000072e1be6>] nft_do_chain+0x17c/0x840 [nf_tables] [<00000000d0551029>] nft_do_chain_inet+0xa1/0x210 [nf_tables] [<0000000097c9d5c6>] nf_hook_slow+0x5b/0x160 [<0000000005eccab1>] ip_forward+0x8b6/0x9b0 [<00000000553a269b>] ip_rcv+0x221/0x230 [<00000000412872e5>] __netif_receive_skb_one_core+0xfe/0x110 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/13b57b5cd591d5b22f9bbf047b2922967de411f3 - https://git.kernel.org/stable/c/a6cafdb49a7bbf4a88367db209703eee6941e023 - https://git.kernel.org/stable/c/9256ab9232e35a16af9c30fa4e522e6d1bd3605a - https://git.kernel.org/stable/c/2d17cf10179a7de6d8f0128168b84ad0b4a1863f - https://git.kernel.org/stable/c/8762785f459be1cfe6fcf7285c123aad6a3703f0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-31740.
CVE ID: CVE-2022-31740 Date Updated: 2024-08-03T07:26:01.078Z Date Published: 2022-12-22T00:00:00 Description: On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2022-20/ - https://www.mozilla.org/security/advisories/mfsa2022-22/ - https://www.mozilla.org/security/advisories/mfsa2022-21/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1766806 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-7256.
CVE ID: CVE-2024-7256 Date Updated: 2024-08-03T18:04:16.512Z Date Published: 2024-08-01T18:05:33.105Z Description: Insufficient data validation in Dawn in Google Chrome on Android prior to 127.0.6533.88 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_30.html - https://issues.chromium.org/issues/354748060 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18109.
CVE ID: CVE-2017-18109 Date Updated: 2024-09-16T17:08:13.135Z Date Published: 2019-03-29T14:04:53.255719Z Description: The login resource of CrowdId in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to redirect users to a different website which they may use as part of performing a phishing attack via an open redirect. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jira.atlassian.com/browse/CWD-5071 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0074.
CVE ID: CVE-2014-0074 Date Updated: 2024-08-06T09:05:38.510Z Date Published: 2014-10-06T14:00:00 Description: Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2014/Mar/22 - https://issues.apache.org/jira/browse/SHIRO-460 - http://rhn.redhat.com/errata/RHSA-2014-1351.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-2286.
CVE ID: CVE-2021-2286 Date Updated: 2024-09-26T14:12:40.699Z Date Published: 2021-04-22T21:53:59 Description: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 7.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2021.html - https://security.gentoo.org/glsa/202208-36 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16995.
CVE ID: CVE-2019-16995 Date Updated: 2024-08-05T01:24:48.595Z Date Published: 2019-09-30T12:03:53 Description: In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/torvalds/linux/commit/6caabe7f197d3466d238f70915d65301f1716626 - https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6caabe7f197d3466d238f70915d65301f1716626 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.3 - https://security.netapp.com/advisory/ntap-20191031-0005/ - http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html - http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3386.
CVE ID: CVE-2020-3386 Date Updated: 2024-09-16T18:03:14.536Z Date Published: 2020-07-31T00:00:22.150152Z Description: A vulnerability in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with a low-privileged account to bypass authorization on the API of an affected device. The vulnerability is due to insufficient authorization of certain API functions. An attacker could exploit this vulnerability by sending a crafted request to the API using low-privileged credentials. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-improper-auth-7Krd9TDT No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-45435.
CVE ID: CVE-2021-45435 Date Updated: 2024-08-04T04:39:20.841Z Date Published: 2022-01-28T14:05:13 Description: An SQL Injection vulnerability exists in Sourcecodester Simple Cold Storage Management System using PHP/OOP 1.0 via the username field in login.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kuiilsec.github.io/blog/cve-2021-45436/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0736.
CVE ID: CVE-2023-0736 Date Updated: 2024-08-02T05:24:33.515Z Date Published: 2023-02-07T00:00:00 Description: Cross-site Scripting (XSS) - Stored in GitHub repository wallabag/wallabag prior to 2.5.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/7e6f9614-6a96-4295-83f0-06a240be844e - https://github.com/wallabag/wallabag/commit/4e023bddc3622ba5e901cc14a261fcb98d955cd7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2049.
CVE ID: CVE-2013-2049 Date Updated: 2024-08-06T15:20:37.481Z Date Published: 2018-05-01T19:00:00 Description: Red Hat CloudForms 2 Management Engine (CFME) allows remote attackers to conduct session tampering attacks by leveraging use of a static secret_token.rb secret. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=959041 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27989.
CVE ID: CVE-2024-27989 Date Updated: 2024-08-02T00:41:56.014Z Date Published: 2024-03-21T15:14:50.620Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in I Thirteen Web Solution WP Responsive Tabs horizontal vertical and accordion Tabs allows Stored XSS.This issue affects WP Responsive Tabs horizontal vertical and accordion Tabs: from n/a through 1.1.17. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/responsive-horizontal-vertical-and-accordion-tabs/wordpress-wp-responsive-tabs-horizontal-vertical-and-accordion-tabs-plugin-1-1-17-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4221.
CVE ID: CVE-2023-4221 Date Updated: 2024-08-02T07:17:12.372Z Date Published: 2023-11-28T07:13:51.191Z Description: Command injection in `main/lp/openoffice_presentation.class.php` in Chamilo LMS <= v1.11.24 allows users permitted to upload Learning Paths to obtain remote code execution via improper neutralisation of special characters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-128-2023-09-04-Critical-impact-Moderate-risk-Authenticated-users-may-gain-unauthenticated-RCE-CVE-2023-4221CVE-2023-4222 - https://starlabs.sg/advisories/23/23-4221 - https://github.com/chamilo/chamilo-lms/commit/ed72914608d2a07ee2eb587c1a654480d08201db - https://github.com/chamilo/chamilo-lms/commit/841a07396fed0ef27c5db13a1b700eac02754fc7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7784.
CVE ID: CVE-2014-7784 Date Updated: 2024-08-06T13:03:27.065Z Date Published: 2014-10-21T10:00:00 Description: The Schon! Magazine (aka com.magzter.schonmagazine) application 3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/974713 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-35227.
CVE ID: CVE-2021-35227 Date Updated: 2024-09-16T23:15:48.252Z Date Published: 2021-10-21T17:41:34.442595Z Description: The HTTP interface was enabled for RabbitMQ Plugin in ARM 2020.2.6 and the ability to configure HTTPS was not available. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35227 - https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2021-4_release_notes.htm No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4267.
CVE ID: CVE-2024-4267 Date Updated: 2024-08-01T20:33:53.200Z Date Published: 2024-05-22T19:29:56.867Z Description: A remote code execution (RCE) vulnerability exists in the parisneo/lollms-webui, specifically within the 'open_file' module, version 9.5. The vulnerability arises due to improper neutralization of special elements used in a command within the 'open_file' function. An attacker can exploit this vulnerability by crafting a malicious file path that, when processed by the 'open_file' function, executes arbitrary system commands or reads sensitive file content. This issue is present in the code where subprocess.Popen is used unsafely to open files based on user-supplied paths without adequate validation, leading to potential command injection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.com/bounties/5a127724-cc13-4ea6-b81f-41546a7fff81 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-26842.
CVE ID: CVE-2023-26842 Date Updated: 2024-08-02T11:53:54.607Z Date Published: 2023-05-31T00:00:00 Description: A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the OptionManager.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26842 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-8481.
CVE ID: CVE-2024-8481 Date Updated: 2024-09-25T14:10:55.014Z Date Published: 2024-09-25T02:05:00.954Z Description: The The Special Text Boxes plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 6.2.2. This is due to the plugin adding the filter add_filter('comment_text', 'do_shortcode'); which will run all shortcodes in comments. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/15b2a08f-2122-4eaf-ab46-1945cf6a68ca?source=cve - https://plugins.trac.wordpress.org/browser/wp-special-textboxes/trunk/stb-class.php#L36 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15709.
CVE ID: CVE-2017-15709 Date Updated: 2024-09-16T22:14:34.363Z Date Published: 2018-02-13T20:00:00Z Description: When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain system details (such as the OS and kernel version) are exposed as plain text. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread.html/2b6f04a552c6ec2de6563c2df3bba813f0fe9c7e22cce27b7829db89%40%3Cdev.activemq.apache.org%3E - https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc%40%3Ccommits.activemq.apache.org%3E - https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b%40%3Cdev.activemq.apache.org%3E - https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E - https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1%40%3Cdev.activemq.apache.org%3E - https://lists.apache.org/thread.html/3f1e41bc9153936e065ca3094bd89ff8167ad2d39ac0b410f24382d2%40%3Cgitbox.activemq.apache.org%3E - https://lists.apache.org/thread.html/c0ec53b72b3240b187afb1cf67e4309a9e5f607282010aa196734814%40%3Cgitbox.activemq.apache.org%3E - https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.