instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2022-33929.
CVE ID: CVE-2022-33929 Date Updated: 2024-09-17T04:09:04.781Z Date Published: 2022-08-10T16:31:24.123698Z Description: Dell Wyse Management Suite 3.6.1 and below contains a Reflected Cross-Site Scripting Vulnerability in EndUserSummary page. An authenticated attacker could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000201383/dsa-2022-134-dell-wyse-management-suite-security-update-for-multiple-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1005
The MITRE ATT&CK technique T1005: Data from Local System is related to the vulnerability CVE-CVE-2020-11652. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2019-13352.
CVE ID: CVE-2019-13352 Date Updated: 2024-08-04T23:49:24.830Z Date Published: 2019-07-05T19:33:50 Description: WolfVision Cynap before 1.30j uses a static, hard-coded cryptographic secret for generating support PINs for the 'forgot password' feature. By knowing this static secret and the corresponding algorithm for calculating support PINs, an attacker can reset the ADMIN password and thus gain remote access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/153530/WolfVision-Cynap-1.18g-1.28j-Hardcoded-Credential.html - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-021.txt - http://seclists.org/fulldisclosure/2019/Jul/9 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3069.
CVE ID: CVE-2010-3069 Date Updated: 2024-08-07T02:55:46.813Z Date Published: 2010-09-15T17:26:00 Description: Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://marc.info/?l=bugtraq&m=130835366526620&w=2 - http://secunia.com/advisories/42885 - http://www.vupen.com/english/advisories/2010/2378 - http://support.apple.com/kb/HT4723 - http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047697.html - http://us1.samba.org/samba/security/CVE-2010-3069.html - http://secunia.com/advisories/41354 - http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html - http://marc.info/?l=bugtraq&m=130835366526620&w=2 - http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/61773 - http://www.securityfocus.com/archive/1/515055/100/0/threaded - http://www.ubuntu.com/usn/USN-987-1 - http://www.securitytracker.com/id?1024434 - http://secunia.com/advisories/41447 - http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047650.html - http://secunia.com/advisories/42531 - http://www.vupen.com/english/advisories/2010/3126 - http://us1.samba.org/samba/history/samba-3.5.5.html - http://www.vmware.com/security/advisories/VMSA-2010-0019.html - http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html - http://www.securityfocus.com/bid/43212 - http://www.vupen.com/english/advisories/2011/0091 - http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047758.html - http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html - http://www.redhat.com/support/errata/RHSA-2010-0860.html - http://support.apple.com/kb/HT4581 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-17840.
CVE ID: CVE-2018-17840 Date Updated: 2024-08-05T10:54:10.749Z Date Published: 2019-06-19T16:34:27 Description: SQL injection exists in Scriptzee Education Website 1.0 via the college_list.html subject, city, or country parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/author/?a=8844 - https://www.exploit-db.com/exploits/45510 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20358.
CVE ID: CVE-2018-20358 Date Updated: 2024-08-05T11:58:19.487Z Date Published: 2018-12-22T15:00:00 Description: An invalid memory address dereference was discovered in the lt_prediction function of libfaad/lt_predict.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/knik0/faad2/issues/31 - https://www.debian.org/security/2019/dsa-4522 - https://seclists.org/bugtraq/2019/Sep/28 - https://security.gentoo.org/glsa/202006-17 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2831.
CVE ID: CVE-2017-2831 Date Updated: 2024-08-05T14:09:16.665Z Date Published: 2017-06-21T13:00:00 Description: An exploitable buffer overflow vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can cause a buffer overflow resulting in overwriting arbitrary data. An attacker can simply send an HTTP request to the device to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/99190 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0332 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-22124.
CVE ID: CVE-2024-22124 Date Updated: 2024-08-01T22:35:34.827Z Date Published: 2024-01-09T01:19:55.940Z Description: Under certain conditions, Internet Communication Manager (ICM) or SAP Web Dispatcher - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22_EXT, WEBDISP 7.22_EXT, WEBDISP 7.53, WEBDISP 7.54, could allow an attacker to access information which would otherwise be restricted causing high impact on confidentiality. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://me.sap.com/notes/3392626 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12338.
CVE ID: CVE-2020-12338 Date Updated: 2024-08-04T11:56:51.977Z Date Published: 2020-11-13T20:00:05 Description: Insufficient control flow management in the Open WebRTC Toolkit before version 4.3.1 may allow an unauthenticated user to potentially enable escalation of privilege via network access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00424 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16899.
CVE ID: CVE-2019-16899 Date Updated: 2024-08-05T01:24:48.560Z Date Published: 2019-09-26T01:00:40 Description: In Advantech WebAccess/HMI Designer 2.1.9.31, Data from a Faulting Address controls Code Flow starting at PM_V3!CTagInfoThreadBase::GetNICInfo+0x0000000000512918. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38041.
CVE ID: CVE-2023-38041 Date Updated: 2024-08-02T17:30:13.558Z Date Published: 2023-10-25T00:24:34.090Z Description: A logged in user may elevate its permissions by abusing a Time-of-Check to Time-of-Use (TOCTOU) race condition. When a particular process flow is initiated, an attacker can exploit this condition to gain unauthorized elevated privileges on the affected system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://forums.ivanti.com/s/article/CVE-2023-38041-New-client-side-release-to-address-a-privilege-escalation-on-Windows-user-machines?language=en_US No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38918.
CVE ID: CVE-2021-38918 Date Updated: 2024-09-16T20:47:29.123Z Date Published: 2022-01-05T16:30:11.969607Z Description: IBM PowerVM Hypervisor FW860, FW940, FW950, and FW1010, through a specific sequence of VM management operations could lead to a violation of the isolation between peer VMs. IBM X-Force ID: 210019. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6525032 - https://exchange.xforce.ibmcloud.com/vulnerabilities/210019 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5443.
CVE ID: CVE-2018-5443 Date Updated: 2024-08-05T05:33:44.434Z Date Published: 2018-01-25T03:00:00 Description: A SQL Injection issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. WebAccess/SCADA does not properly sanitize its inputs for SQL commands. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-18-023-01 - http://www.securityfocus.com/bid/102781 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4209.
CVE ID: CVE-2021-4209 Date Updated: 2024-08-03T17:16:04.444Z Date Published: 2022-08-24T15:07:31 Description: A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gnutls/gnutls/-/issues/1306 - https://bugzilla.redhat.com/show_bug.cgi?id=2044156 - https://access.redhat.com/security/cve/CVE-2021-4209 - https://gitlab.com/gnutls/gnutls/-/merge_requests/1503 - https://gitlab.com/gnutls/gnutls/-/commit/3db352734472d851318944db13be73da61300568 - https://security.netapp.com/advisory/ntap-20220915-0005/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0666.
CVE ID: CVE-2021-0666 Date Updated: 2024-08-03T15:47:28.204Z Date Published: 2021-11-18T14:58:13 Description: In apusys, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672086; Issue ID: ALPS05672086. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/November-2021 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40958.
CVE ID: CVE-2023-40958 Date Updated: 2024-09-25T19:42:31.129Z Date Published: 2023-09-14T00:00:00 Description: A SQL injection vulnerability in Didotech srl Engineering & Lifecycle Management (aka pdm) v.14.0, v.15.0 and v.16.0 fixed in pdm-14.0.1.0.0, pdm-15.0.1.0.0, and pdm-16.0.1.0.0 allows a remote authenticated attacker to execute arbitrary code via the query parameter in models/base_client.py component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8193.
CVE ID: CVE-2014-8193 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4026.
CVE ID: CVE-2015-4026 Date Updated: 2024-08-06T06:04:02.379Z Date Published: 2015-06-09T18:00:00 Description: The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2015-1187.html - http://rhn.redhat.com/errata/RHSA-2015-1186.html - http://rhn.redhat.com/errata/RHSA-2015-1219.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - https://bugs.php.net/bug.php?id=68598 - http://lists.opensuse.org/opensuse-updates/2015-06/msg00002.html - http://php.net/ChangeLog-5.php - http://www.debian.org/security/2015/dsa-3280 - http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html - http://rhn.redhat.com/errata/RHSA-2015-1135.html - http://www.securitytracker.com/id/1032431 - https://support.apple.com/kb/HT205031 - http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158915.html - http://www.securityfocus.com/bid/75056 - http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158616.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159031.html - https://security.gentoo.org/glsa/201606-10 - http://rhn.redhat.com/errata/RHSA-2015-1218.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4553.
CVE ID: CVE-2015-4553 Date Updated: 2024-08-06T06:18:11.999Z Date Published: 2020-01-06T20:54:57 Description: A file upload issue exists in DeDeCMS before 5.7-sp1, which allows malicious users getshell. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/75285 - http://seclists.org/fulldisclosure/2015/Jun/47 - https://www.exploit-db.com/exploits/37423/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3138.
CVE ID: CVE-2009-3138 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1549.
CVE ID: CVE-2017-1549 Date Updated: 2024-09-16T19:20:51.437Z Date Published: 2017-12-11T21:00:00Z Description: IBM Sterling File Gateway 2.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 131289. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/131289 - http://www.securityfocus.com/bid/102037 - http://www.ibm.com/support/docview.wss?uid=swg22010759 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2950.
CVE ID: CVE-2019-2950 Date Updated: 2024-10-01T16:29:27.112Z Date Published: 2019-10-16T17:40:55 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - https://security.netapp.com/advisory/ntap-20191017-0002/ - https://usn.ubuntu.com/4195-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36181.
CVE ID: CVE-2024-36181 Date Updated: 2024-08-02T03:30:13.076Z Date Published: 2024-06-13T07:53:14.863Z Description: Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. Exploitation of this issue requires user interaction, typically in the form of convincing a victim to visit a maliciously crafted web page or to interact with a maliciously modified DOM element within the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13912.
CVE ID: CVE-2020-13912 Date Updated: 2024-08-04T12:32:14.518Z Date Published: 2020-06-07T20:13:37 Description: SolarWinds Advanced Monitoring Agent before 10.8.9 allows local users to gain privileges via a Trojan horse .exe file, because everyone can write to a certain .exe file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hansesecure.de/2020/06/vulnerability-in-monitoring-software/?lang=en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40717.
CVE ID: CVE-2022-40717 Date Updated: 2024-08-03T12:21:46.629Z Date Published: 2023-01-26T00:00:00 Description: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the anweb service, which listens on TCP ports 80 and 443 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15727. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-22-1220/ - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10304 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21811.
CVE ID: CVE-2023-21811 Date Updated: 2024-08-02T09:51:51.162Z Date Published: 2023-02-14T19:33:14.147Z Description: Windows iSCSI Service Denial of Service Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21811 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9693.
CVE ID: CVE-2014-9693 Date Updated: 2024-08-06T13:55:04.126Z Date Published: 2017-04-02T20:00:00 Description: Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions could allow attackers to execute arbitrary code or restart the system via crafted DNS packets. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.huawei.com/en/psirt/security-advisories/hw-408100 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6997.
CVE ID: CVE-2013-6997 Date Updated: 2024-08-06T17:53:45.844Z Date Published: 2014-01-09T00:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange (OX) AppSuite 7.4.0 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) an HTML email with crafted CSS code containing wildcards or (2) office documents containing "crafted hyperlinks with script URL handlers." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/90113 - http://www.securityfocus.com/bid/64676 - http://software.open-xchange.com/OX6/doc/Release_Notes_for_Public_Patch_Release_1766_7.4.0_Rev21_2013_12_13.pdf - http://www.osvdb.org/101714 - http://www.securitytracker.com/id/1029554 - http://www.osvdb.org/101715 - http://www.securityfocus.com/archive/1/530681/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46523.
CVE ID: CVE-2023-46523 Date Updated: 2024-09-11T15:26:17.060Z Date Published: 2023-10-25T00:00:00 Description: TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function upgradeInfoRegister. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165 - https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/3/1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5136.
CVE ID: CVE-2008-5136 Date Updated: 2024-08-07T10:40:17.188Z Date Published: 2008-11-18T15:00:00 Description: tkusr in tkusr 0.82 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/tkusr.pgm temporary file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/32406 - http://lists.debian.org/debian-devel/2008/08/msg00285.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20698.
CVE ID: CVE-2019-20698 Date Updated: 2024-08-05T02:46:10.331Z Date Published: 2020-04-16T14:34:31 Description: Certain NETGEAR devices are affected by disclosure of sensitive information. This affects WAC505 before 8.0.5.5 and WAC510 before 8.0.5.5. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000061231/Security-Advisory-for-Sensitive-Information-Disclosure-on-WAC505-and-WAC510-PSV-2019-0060 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4951.
CVE ID: CVE-2019-4951 Date Updated: 2019-12-30T16:19:34 Date Published: 2019-12-30T16:19:34 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5099.
CVE ID: CVE-2008-5099 Date Updated: 2024-08-07T10:40:17.230Z Date Published: 2008-11-17T18:00:00 Description: Sun Logical Domain Manager (aka LDoms Manager or ldm) 1.0 through 1.0.3 displays the value of the OpenBoot PROM (OBP) security-password variable in cleartext, which allows local users to bypass the SPARC firmware's password protection, and gain privileges or obtain data access, via the "ldm ls -l" command, a different vulnerability than CVE-2008-4992. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.avaya.com/elmodocs2/security/ASA-2008-460.htm - http://sunsolve.sun.com/search/document.do?assetkey=1-21-139395-02-1 - http://securitytracker.com/id?1021224 - http://sunsolve.sun.com/search/document.do?assetkey=1-21-139397-02-1 - http://sunsolve.sun.com/search/document.do?assetkey=1-21-139398-01-1 - http://sunsolve.sun.com/search/document.do?assetkey=1-26-243606-1 - http://secunia.com/advisories/32674 - http://www.vupen.com/english/advisories/2008/3154 - http://www.securityfocus.com/bid/32286 - http://sunsolve.sun.com/search/document.do?assetkey=1-21-139396-02-1 - https://exchange.xforce.ibmcloud.com/vulnerabilities/46594 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5003.
CVE ID: CVE-2017-5003 Date Updated: 2024-08-05T14:47:43.892Z Date Published: 2017-06-09T21:00:00 Description: EMC RSA Identity Governance and Lifecycle versions 7.0.1, 7.0.2 (all patch levels); RSA Via Lifecycle and Governance version 7.0 (all patch levels); and RSA Identity Management and Governance (IMG) version 6.9.1 (all patch levels) have Reflected Cross Site Scripting vulnerabilities that could potentially be exploited by malicious users to compromise an affected system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1038648 - http://www.securityfocus.com/bid/98974 - http://www.securityfocus.com/archive/1/540693/30/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1776.
CVE ID: CVE-2010-1776 Date Updated: 2024-08-07T01:35:53.631Z Date Published: 2017-04-24T19:00:00 Description: Find My iPhone on iOS 2.0 through 3.1.3 for iPhone 3G and later and iOS 2.1 through 3.1.3 for iPod touch (2nd generation) and later, when Find My iPhone is disabled, allows remote authenticated users with an associated MobileMe account to wipe the device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT4225 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28747.
CVE ID: CVE-2022-28747 Date Updated: 2024-08-03T06:03:52.746Z Date Published: 2022-08-25T22:38:12 Description: Key reuse in GoSecure Titan Inbox Detection & Response (IDR) through 2022-04-05 leads to remote code execution. To exploit this vulnerability, an attacker must craft and sign a serialized payload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.gosecure.net - https://s3.us-west-2.amazonaws.com/download.countertack.com/files/IDR/IDR-4.1.1-Release-Notes.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-19210.
CVE ID: CVE-2018-19210 Date Updated: 2024-08-05T11:30:04.380Z Date Published: 2018-11-12T19:00:00 Description: In LibTIFF 4.0.9, there is a NULL pointer dereference in the TIFFWriteDirectorySec function in tif_dirwrite.c that will lead to a denial of service attack, as demonstrated by tiffset. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/105932 - https://usn.ubuntu.com/3906-1/ - https://lists.debian.org/debian-lts-announce/2019/02/msg00026.html - http://bugzilla.maptools.org/show_bug.cgi?id=2820 - http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TX5UEYHGMTNEHJB4FHE7HCJ75UQDNKGB/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C6IL2QFKE6MGVUTOPU2UUWITTE36KRDF/ - https://seclists.org/bugtraq/2019/Nov/5 - http://packetstormsecurity.com/files/155095/Slackware-Security-Advisory-libtiff-Updates.html - https://security.gentoo.org/glsa/202003-25 - https://www.debian.org/security/2020/dsa-4670 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1034.
CVE ID: CVE-2009-1034 Date Updated: 2024-08-07T04:57:17.567Z Date Published: 2009-03-20T18:00:00 Description: SQL injection vulnerability in the Tasklist module 5.x-1.x before 5.x-1.3 and 5.x-2.x before 5.x-2.0-alpha1, a module for Drupal, allows remote attackers to execute arbitrary SQL commands via values in the URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/49320 - http://www.securityfocus.com/bid/34171 - http://www.osvdb.org/52781 - http://drupal.org/node/406316 - http://secunia.com/advisories/34376 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5764.
CVE ID: CVE-2019-5764 Date Updated: 2024-08-04T20:01:52.300Z Date Published: 2019-02-19T17:00:00 Description: Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/106767 - https://access.redhat.com/errata/RHSA-2019:0309 - https://www.debian.org/security/2019/dsa-4395 - https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html - https://crbug.com/913246 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41651.
CVE ID: CVE-2021-41651 Date Updated: 2024-08-04T03:15:29.292Z Date Published: 2021-10-04T18:01:24 Description: A blind SQL injection vulnerability exists in the Raymart DG / Ahmed Helal Hotel-mgmt-system. A malicious attacker can retrieve sensitive database information and interact with the database using the vulnerable cid parameter in process_update_profile.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tramyardg/hotel-mgmt-system - https://github.com/MobiusBinary/CVE-2021-41651/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6065.
CVE ID: CVE-2023-6065 Date Updated: 2024-08-02T08:21:17.223Z Date Published: 2023-12-18T20:07:56.766Z Description: The Quttera Web Malware Scanner WordPress plugin before 3.4.2.1 doesn't restrict access to detailed scan logs, which allows a malicious actor to discover local paths and portions of the site's code No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/64f2557f-c5e4-4779-9e28-911dfaf2dda5 - https://drive.google.com/file/d/1w83xWsVLS_gCpQy4LDwbjNK9JaB87EEf/view?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3609.
CVE ID: CVE-2008-3609 Date Updated: 2024-08-07T09:45:18.935Z Date Published: 2008-09-16T23:00:00 Description: The kernel in Apple Mac OS X 10.5 through 10.5.4 does not properly flush cached credentials during recycling (aka purging) of a vnode, which might allow local users to bypass the intended read or write permissions of a file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/31189 - http://www.securitytracker.com/id?1020877 - http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html - http://www.us-cert.gov/cas/techalerts/TA08-260A.html - http://www.vupen.com/english/advisories/2008/2584 - http://secunia.com/advisories/31882 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45169 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7633.
CVE ID: CVE-2017-7633 Date Updated: 2024-09-16T22:30:54.342Z Date Published: 2018-03-05T17:00:00Z Description: QNAP Qfinder Pro 6.1.0.0317 and earlier may expose sensitive information contained in NAS devices. If exploited, this may allow attackers to further compromise the device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qnap.com/zh-tw/security-advisory/nas-201802-27 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1189
The MITRE ATT&CK technique T1189: Drive-by Compromise is related to the vulnerability CVE-CVE-2015-1641. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2018-3672.
CVE ID: CVE-2018-3672 Date Updated: 2024-09-17T01:01:35.495Z Date Published: 2018-08-01T15:00:00Z Description: Driver module in Intel Smart Sound Technology before version 9.21.00.3541 potentially allows a local attacker to execute arbitrary code as administrator via a system calls. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00163.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-31680.
CVE ID: CVE-2022-31680 Date Updated: 2024-08-03T07:26:01.110Z Date Published: 2022-10-07T00:00:00 Description: The vCenter Server contains an unsafe deserialisation vulnerability in the PSC (Platform services controller). A malicious actor with admin access on vCenter server may exploit this issue to execute arbitrary code on the underlying operating system that hosts the vCenter Server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vmware.com/security/advisories/VMSA-2022-0025.html - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1587 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-19465.
CVE ID: CVE-2018-19465 Date Updated: 2024-08-05T11:37:11.357Z Date Published: 2019-06-07T16:40:51 Description: Maccms through 8.0 allows XSS via the site_keywords field to index.php?m=system-config because of tpl/module/system.php and tpl/html/system_config.html, related to template/paody/html/vod_index.html. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.maccms.com/down.html - https://github.com/holychang/maccms8/blob/master/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7180.
CVE ID: CVE-2016-7180 Date Updated: 2024-08-06T01:50:47.580Z Date Published: 2016-09-09T10:00:00 Description: epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark 2.x before 2.0.6 does not properly consider whether a string is constant, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wireshark.org/security/wnpa-sec-2016-55.html - http://www.securitytracker.com/id/1036760 - http://www.debian.org/security/2016/dsa-3671 - https://code.wireshark.org/review/17289 - https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5213496250aceff086404c568e3718ebc0060934 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12782 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1599.
CVE ID: CVE-2008-1599 Date Updated: 2024-08-07T08:24:42.888Z Date Published: 2008-03-31T23:00:00 Description: The nddstat programs on IBM AIX 5.2, 5.3, and 6.1 do not properly handle environment variables, which allows local users to gain privileges by invoking (1) atmstat, (2) entstat, (3) fddistat, (4) hdlcstat, or (5) tokstat. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4157 - http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4156 - http://www.ibm.com/support/docview.wss?uid=isg1IZ16975 - http://securitytracker.com/id?1019604 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5468 - http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=4158 - http://www.ibm.com/support/docview.wss?uid=isg1IZ17058 - http://www.ibm.com/support/docview.wss?uid=isg1IZ17059 - http://www.ibm.com/support/docview.wss?uid=isg1IZ16991 - http://www.vupen.com/english/advisories/2008/0865 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2846.
CVE ID: CVE-2008-2846 Date Updated: 2024-08-07T09:14:14.863Z Date Published: 2008-06-25T10:00:00 Description: SQL injection vulnerability in index.php in BoatScripts Classifieds allows remote attackers to execute arbitrary SQL commands via the type parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/43182 - http://secunia.com/advisories/30743 - http://www.securityfocus.com/bid/29801 - https://www.exploit-db.com/exploits/5858 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1105.
CVE ID: CVE-2011-1105 Date Updated: 2024-08-06T22:14:27.615Z Date Published: 2011-02-28T16:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Mutare EVM allow remote attackers to inject arbitrary web script or HTML via (1) a delivery address and possibly (2) a PIN. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/136612 - https://exchange.xforce.ibmcloud.com/vulnerabilities/65768 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8630.
CVE ID: CVE-2015-8630 Date Updated: 2024-08-06T08:20:43.695Z Date Published: 2016-02-13T02:00:00 Description: The (1) kadm5_create_principal_3 and (2) kadm5_modify_principal functions in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by specifying KADM5_POLICY with a NULL policy name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2016/dsa-3466 - http://krbdev.mit.edu/rt/Ticket/Display.html?id=8342 - http://www.securitytracker.com/id/1034915 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html - http://rhn.redhat.com/errata/RHSA-2016-0532.html - http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html - https://github.com/krb5/krb5/commit/b863de7fbf080b15e347a736fdda0a82d42f4f6b No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2618.
CVE ID: CVE-2008-2618 Date Updated: 2024-08-07T09:05:30.297Z Date Published: 2008-07-15T23:00:00 Description: Unspecified vulnerability in the PeopleSoft PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.17 and 8.49.11 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2615, CVE-2008-2616, CVE-2008-2617, CVE-2008-2620, CVE-2008-2621, and CVE-2008-2622. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html - http://www.vupen.com/english/advisories/2008/2115 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43820 - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143 - http://www.securitytracker.com/id?1020497 - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143 - http://www.vupen.com/english/advisories/2008/2109/references - http://secunia.com/advisories/31087 - http://secunia.com/advisories/31113 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-36966.
CVE ID: CVE-2021-36966 Date Updated: 2024-08-04T01:09:07.487Z Date Published: 2021-09-15T11:23:41 Description: Windows Subsystem for Linux Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36966 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9431.
CVE ID: CVE-2016-9431 Date Updated: 2024-08-06T02:50:38.353Z Date Published: 2016-12-12T02:00:00 Description: An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201701-08 - https://github.com/tats/w3m/blob/master/ChangeLog - https://github.com/tats/w3m/issues/10 - http://www.securityfocus.com/bid/94407 - http://www.openwall.com/lists/oss-security/2016/11/18/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7541.
CVE ID: CVE-2014-7541 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21586.
CVE ID: CVE-2021-21586 Date Updated: 2024-09-17T01:31:36.108Z Date Published: 2021-07-15T16:15:12.894335Z Description: Wyse Management Suite versions 3.2 and earlier contain an absolute path traversal vulnerability. A remote authenticated malicious user could exploit this vulnerability in order to read arbitrary files on the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/000189363 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14268.
CVE ID: CVE-2017-14268 Date Updated: 2024-08-05T19:20:41.326Z Date Published: 2017-09-11T09:00:00 Description: EE 4GEE WiFi MBB (before EE60_00_05.00_31) devices have XSS in the sms_content parameter in a getSMSlist request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2017/Sep/13 - https://blog.jameshemmings.co.uk/2017/08/24/ee-4gee-mobile-wifi-router-multiple-security-vulnerabilities-writeup No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33662.
CVE ID: CVE-2021-33662 Date Updated: 2024-08-03T23:58:22.965Z Date Published: 2021-06-09T13:32:05 Description: Under certain conditions, the installation of SAP Business One, version - 10.0, discloses sensitive information on the file system allowing an attacker to access information which would otherwise be restricted. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999 - https://launchpad.support.sap.com/#/notes/3058382 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4419.
CVE ID: CVE-2010-4419 Date Updated: 2024-08-07T03:43:14.635Z Date Published: 2011-01-19T15:00:00 Description: Unspecified vulnerability in the PeopleSoft Enterprise CRM component in Oracle PeopleSoft and JDEdwards Suite 9.0 Bundle #31 and 9.1 Bundle #6 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Order Capture. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2011/0147 - http://www.securityfocus.com/bid/45879 - https://exchange.xforce.ibmcloud.com/vulnerabilities/64792 - http://www.securitytracker.com/id?1024978 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html - http://secunia.com/advisories/42981 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43310.
CVE ID: CVE-2021-43310 Date Updated: 2024-08-04T03:55:28.423Z Date Published: 2022-09-21T18:23:41 Description: A vulnerability in Keylime before 6.3.0 allows an attacker to craft a request to the agent that resets the U and V keys as if the agent were being re-added to a verifier. This could lead to a remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://seclists.org/oss-sec/2022/q1/101 - https://github.com/keylime/keylime/security/advisories/GHSA-2m39-75g9-ff5r No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-4895.
CVE ID: CVE-2009-4895 Date Updated: 2024-08-07T07:17:26.064Z Date Published: 2010-09-08T19:00:00 Description: Race condition in the tty_fasync function in drivers/char/tty_io.c in the Linux kernel before 2.6.32.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via unknown vectors, related to the put_tty_queue and __f_setown functions. NOTE: the vulnerability was addressed in a different way in 2.6.32.9. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2010/06/15/5 - http://www.ubuntu.com/usn/USN-1000-1 - https://bugzilla.kernel.org/show_bug.cgi?id=14605 - http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.6 - http://www.openwall.com/lists/oss-security/2010/06/15/2 - http://www.openwall.com/lists/oss-security/2010/06/15/3 - http://www.openwall.com/lists/oss-security/2010/06/15/4 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=703625118069f9f8960d356676662d3db5a9d116 - https://bugzilla.redhat.com/show_bug.cgi?id=559100 - http://www.debian.org/security/2010/dsa-2094 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1799.
CVE ID: CVE-2010-1799 Date Updated: 2024-08-07T01:35:53.717Z Date Published: 2010-08-16T18:25:00 Description: Stack-based buffer overflow in the error-logging functionality in Apple QuickTime before 7.6.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/kb/HT4290 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11800 - http://lists.apple.com/archives/security-announce/2010//Aug/msg00002.html - http://www.securityfocus.com/bid/41962 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3424.
CVE ID: CVE-2022-3424 Date Updated: 2024-08-03T01:07:06.561Z Date Published: 2023-03-06T00:00:00 Description: A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=2132640 - https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc - https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/ - https://www.spinics.net/lists/kernel/msg4518970.html - https://security.netapp.com/advisory/ntap-20230406-0005/ - https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html - https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3266.
CVE ID: CVE-2015-3266 Date Updated: 2022-07-08T17:36:52 Date Published: 2022-07-08T17:36:52 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6433.
CVE ID: CVE-2013-6433 Date Updated: 2024-08-06T17:39:01.310Z Date Published: 2014-06-02T15:00:00 Description: The default configuration in the Red Hat openstack-neutron package before 2013.2.3-7 does not properly set a configuration file for rootwrap, which allows remote attackers to gain privileges via a crafted configuration file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/59533 - http://www.ubuntu.com/usn/USN-2255-1 - http://rhn.redhat.com/errata/RHSA-2014-0516.html - https://bugzilla.redhat.com/show_bug.cgi?id=1039812 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14113.
CVE ID: CVE-2017-14113 Date Updated: 2017-09-14T14:57:01 Date Published: 2017-09-14T15:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4833.
CVE ID: CVE-2018-4833 Date Updated: 2024-08-05T05:18:26.432Z Date Published: 2018-06-14T16:00:00 Description: A vulnerability has been identified in RFID 181EIP (All versions), RUGGEDCOM Win (V4.4, V4.5, V5.0, and V5.1), SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.6), SCALANCE X-300 switch family (incl. SIPLUS NET variants) (All versions < V4.1.3), SCALANCE X408 (All versions < V4.1.3), SCALANCE X414 (All versions), SIMATIC RF182C (All versions). Unprivileged remote attackers located in the same local network segment (OSI Layer 2) could gain remote code execution on the affected products by sending a specially crafted DHCP response to a client's DHCP request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-181018.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-18430.
CVE ID: CVE-2020-18430 Date Updated: 2024-08-04T14:00:49.289Z Date Published: 2021-07-26T21:36:03 Description: tinyexr 0.9.5 was discovered to contain an array index error in the tinyexr::DecodeEXRImage component, which can lead to a denial of service (DOS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ChijinZ/security_advisories/tree/master/tinyexr_65f9859 - https://github.com/syoyo/tinyexr/issues/108 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7895.
CVE ID: CVE-2019-7895 Date Updated: 2024-08-04T21:02:18.963Z Date Published: 2019-08-02T21:23:27 Description: A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with admin privileges to layouts can execute arbitrary code through a crafted XML layout update. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25344.
CVE ID: CVE-2024-25344 Date Updated: 2024-08-02T18:25:20.180Z Date Published: 2024-02-26T00:00:00 Description: Cross Site Scripting vulnerability in ITFlow.org before commit v.432488eca3998c5be6b6b9e8f8ba01f54bc12378 allows a remtoe attacker to execute arbitrary code and obtain sensitive information via the settings.php, settings+company.php, settings_defaults.php,settings_integrations.php, settings_invoice.php, settings_localization.php, settings_mail.php components. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://itflow.org/ - https://github.com/itflow-org/itflow/commit/432488eca3998c5be6b6b9e8f8ba01f54bc12378 - https://github.com/itflow-org/itflow/commit/8068cb6081e4760860a634c1066b2c64d0ee2d46 - https://packetstormsecurity.com/files/177224/ITFlow-Cross-Site-Request-Forgery.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23898.
CVE ID: CVE-2024-23898 Date Updated: 2024-08-01T23:13:08.509Z Date Published: 2024-01-24T17:52:23.492Z Description: Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3315 - https://www.sonarsource.com/blog/excessive-expansion-uncovering-critical-security-vulnerabilities-in-jenkins/ - http://www.openwall.com/lists/oss-security/2024/01/24/6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-13856.
CVE ID: CVE-2017-13856 Date Updated: 2024-08-05T19:13:40.960Z Date Published: 2017-12-25T21:00:00 Description: An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/102181 - http://www.securitytracker.com/id/1040013 - https://support.apple.com/HT208327 - http://www.securitytracker.com/id/1040012 - https://support.apple.com/HT208334 - https://support.apple.com/HT208324 - https://support.apple.com/HT208326 - https://security.gentoo.org/glsa/201801-09 - https://support.apple.com/HT208328 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4858.
CVE ID: CVE-2022-4858 Date Updated: 2024-08-28T20:02:15.797Z Date Published: 2022-12-30T11:24:35.870Z Description: Insertion of Sensitive Information into Log Files in M-Files Server before 22.10.11846.0 could allow to obtain sensitive tokens from logs, if specific configurations were set. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.m-files.com/about/trust-center/security-advisories/cve-2022-4858/ - https://product.m-files.com/security-advisories/cve-2022-4858/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47550.
CVE ID: CVE-2021-47550 Date Updated: 2024-08-04T05:39:59.851Z Date Published: 2024-05-24T15:09:53.949Z Description: In the Linux kernel, the following vulnerability has been resolved: drm/amd/amdgpu: fix potential memleak In function amdgpu_get_xgmi_hive, when kobject_init_and_add failed There is a potential memleak if not call kobject_put. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/c746945fb6bcbe3863c9ea6369c7ef376e38e5eb - https://git.kernel.org/stable/c/75752ada77e0726327adf68018b9f50ae091baeb - https://git.kernel.org/stable/c/27dfaedc0d321b4ea4e10c53e4679d6911ab17aa No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20644.
CVE ID: CVE-2022-20644 Date Updated: 2024-09-16T19:51:35.502Z Date Published: 2022-01-14T05:00:55.382808Z Description: Multiple vulnerabilities in the web-based management interface of Cisco Security Manager could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csm-mult-xss-7hmOKQTt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11188.
CVE ID: CVE-2018-11188 Date Updated: 2024-08-05T08:01:52.031Z Date Published: 2018-06-01T21:00:00 Description: Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 46 of 46). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2018/May/71 - http://packetstormsecurity.com/files/148003/Quest-DR-Series-Disk-Backup-Software-4.0.3-Code-Execution.html - https://www.coresecurity.com/advisories/quest-dr-series-disk-backup-multiple-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-3606.
CVE ID: CVE-2019-3606 Date Updated: 2024-08-04T19:12:09.668Z Date Published: 2019-03-26T17:23:48 Description: Data Leakage Attacks vulnerability in the web portal component when in an MDR pair in McAfee Network Security Management (NSM) 9.1 < 9.1.7.75 (Update 4) and 9.2 < 9.2.7.31 Update2 allows administrators to view configuration information in plain text format via the GUI or GUI terminal commands. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kc.mcafee.com/corporate/index?page=content&id=SB10274 - http://www.securityfocus.com/bid/107613 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1508.
CVE ID: CVE-2011-1508 Date Updated: 2024-08-06T22:28:41.917Z Date Published: 2011-12-14T00:00:00 Description: Microsoft Publisher 2003 SP3, and 2007 SP2 and SP3, does not properly manage memory allocations for function pointers, which allows user-assisted remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Function Pointer Overwrite Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14816 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-091 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34410.
CVE ID: CVE-2022-34410 Date Updated: 2024-08-03T09:07:16.247Z Date Published: 2023-03-16T11:29:24.037Z Description: Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1565
The MITRE ATT&CK technique T1565: Data Manipulation is related to the vulnerability CVE-CVE-2018-17877. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2023-46522.
CVE ID: CVE-2023-46522 Date Updated: 2024-09-11T15:26:34.444Z Date Published: 2023-10-25T00:00:00 Description: TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function deviceInfoRegister. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165 - https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/2/1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13716.
CVE ID: CVE-2018-13716 Date Updated: 2024-08-05T09:14:46.834Z Date Published: 2018-07-09T06:00:00 Description: The mintToken function of a smart contract implementation for sexhdsolo, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md - https://github.com/BlockChainsSecurity/EtherTokens/tree/master/sexhdsolo No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0468.
CVE ID: CVE-2017-0468 Date Updated: 2024-08-05T13:11:05.529Z Date Published: 2017-03-08T01:00:00 Description: A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33351708. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-03-01 - http://www.securitytracker.com/id/1037968 - http://www.securityfocus.com/bid/96717 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12340.
CVE ID: CVE-2020-12340 Date Updated: 2023-03-22T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-45181.
CVE ID: CVE-2024-45181 Date Updated: 2024-09-12T19:49:11.501Z Date Published: 2024-09-12T00:00:00 Description: An issue was discovered in WibuKey64.sys in WIBU-SYSTEMS WibuKey before v6.70 and fixed in v.6.70. An improper bounds check allows crafted packets to cause an arbitrary address write, resulting in kernel memory corruption. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wibu.com - https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-94453.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36236.
CVE ID: CVE-2024-36236 Date Updated: 2024-08-02T03:30:13.217Z Date Published: 2024-06-13T07:53:50.347Z Description: Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a specially crafted link. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-3619.
CVE ID: CVE-2017-3619 Date Updated: 2024-08-05T14:30:58.940Z Date Published: 2017-04-24T19:00:00 Description: Vulnerability in the Automatic Service Request (ASR) component of Oracle Support Tools (subcomponent: ASR Manager). The supported version that is affected is Prior to 5.7. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Automatic Service Request (ASR) executes to compromise Automatic Service Request (ASR). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Automatic Service Request (ASR) accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html - http://www.securityfocus.com/bid/97771 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-6183.
CVE ID: CVE-2020-6183 Date Updated: 2024-08-04T08:55:22.286Z Date Published: 2020-02-12T19:46:34 Description: SAP Host Agent, version 7.21, allows an unprivileged user to read the shared memory or write to the shared memory by sending request to the main SAPOSCOL process and receive responses that may contain data read with user root privileges e.g. size of any directory, system hardware and OS details, leading to Missing Authorization Check vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812 - https://launchpad.support.sap.com/#/notes/2836445 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8596.
CVE ID: CVE-2014-8596 Date Updated: 2024-08-06T13:26:00.832Z Date Published: 2014-11-17T16:00:00 Description: Multiple SQL injection vulnerabilities in PHP-Fusion 7.02.07 allow remote authenticated users to execute arbitrary SQL commands via the (1) submit_id parameter in a 2 action to files/administration/submissions.php or (2) status parameter to files/administration/members.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/98583 - http://packetstormsecurity.com/files/133869/PHP-Fusion-7.02.07-Blind-SQL-Injection.html - http://osvdb.org/show/osvdb/112419 - http://www.exploit-db.com/exploits/35206 - http://www.securityfocus.com/bid/71053 - https://www.xlabs.com.br/blog/?p=282 - http://packetstormsecurity.com/files/129053/PHP-Fusion-7.02.07-SQL-Injection.html - http://seclists.org/fulldisclosure/2015/Oct/23 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12250.
CVE ID: CVE-2018-12250 Date Updated: 2024-08-05T08:30:59.596Z Date Published: 2019-07-03T16:57:05 Description: An issue was discovered in Elite CMS Pro 2.01. In /admin/add_sidebar.php, the ?page= parameter is vulnerable to SQL injection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://elitecms.net/download.php - https://cxsecurity.com/issue/WLB-2018060157 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40831.
CVE ID: CVE-2022-40831 Date Updated: 2024-08-03T12:28:42.882Z Date Published: 2022-10-07T00:00:00 Description: B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php like() function. Note: Multiple third parties have disputed this as not a valid vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/726232111/CodeIgniter3.1.13-SQL-Inject/blob/main/README.md - https://github.com/bcit-ci/CodeIgniter/issues/6161 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-45966.
CVE ID: CVE-2023-45966 Date Updated: 2024-09-12T15:16:41.605Z Date Published: 2023-10-23T00:00:00 Description: umputun remark42 version 1.12.1 and before has a Blind Server-Side Request Forgery (SSRF) vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/umputun/remark42/issues/1677 - https://github.com/jet-pentest/CVE-2023-45966 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11077.
CVE ID: CVE-2019-11077 Date Updated: 2024-08-04T22:40:16.186Z Date Published: 2019-04-11T01:10:56 Description: FastAdmin V1.0.0.20190111_beta has a CSRF vulnerability to add a new admin user via the admin/auth/admin/add?dialog=1 URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.iwantacve.cn/index.php/archives/191/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0803.
CVE ID: CVE-2015-0803 Date Updated: 2024-08-06T04:26:10.179Z Date Published: 2015-04-01T10:00:00 Description: The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1031996 - https://security.gentoo.org/glsa/201512-10 - http://www.mozilla.org/security/announce/2015/mfsa2015-39.html - https://bugzilla.mozilla.org/show_bug.cgi?id=1134561 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - http://www.ubuntu.com/usn/USN-2550-1 - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7643.
CVE ID: CVE-2017-7643 Date Updated: 2024-08-05T16:12:27.929Z Date Published: 2017-04-14T14:00:00 Description: Proxifier for Mac before 2.19 allows local users to gain privileges via the first parameter to the KLoader setuid program. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://m4.rkw.io/blog/cve20177643-local-root-privesc-in-proxifier-for-mac--218.html - http://seclists.org/fulldisclosure/2017/Apr/54 - https://www.exploit-db.com/exploits/41854/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-16476.
CVE ID: CVE-2018-16476 Date Updated: 2024-08-05T10:24:32.802Z Date Published: 2018-11-30T19:00:00 Description: A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have. This vulnerability has been fixed in versions 4.2.11, 5.0.7.1, 5.1.6.1, and 5.2.1.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://groups.google.com/d/msg/rubyonrails-security/FL4dSdzr2zw/zjKVhF4qBAAJ - https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/ - https://access.redhat.com/errata/RHSA-2019:0600 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11080.
CVE ID: CVE-2018-11080 Date Updated: 2024-09-17T02:52:05.343Z Date Published: 2018-10-18T22:00:00Z Description: Dell EMC Secure Remote Services, versions prior to 3.32.00.08, contains Improper File Permission Vulnerabilities. The application contains multiple configuration files with world-readable permissions that could allow an authenticated malicious user to utilize the file contents to potentially elevate their privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://seclists.org/fulldisclosure/2018/Oct/35 - http://www.securityfocus.com/bid/105694 - http://www.securitytracker.com/id/1041877 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6327.
CVE ID: CVE-2012-6327 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40196.
CVE ID: CVE-2023-40196 Date Updated: 2024-09-24T18:50:57.414Z Date Published: 2023-09-04T11:15:46.316Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ImageRecycle ImageRecycle pdf & image compression plugin <= 3.1.11 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/imagerecycle-pdf-image-compression/wordpress-imagerecycle-pdf-image-compression-plugin-3-1-11-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.