instruction stringlengths 49 63 ⌀ | input stringlengths 0 69 | output stringlengths 221 18.7k |
|---|---|---|
Provide detailed information about CVE-2016-3088. | CVE ID: CVE-2016-3088
Date Updated: 2024-08-05T23:40:15.630Z
Date Published: 2016-06-01T20:00:00
Description:
The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.zerodayinitiative.com/advisories/ZDI-16-356
- https://www.exploit-db.com/exploits/42283/
- http://www.zerodayinitiative.com/advisories/ZDI-16-357
- http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt
- http://rhn.redhat.com/errata/RHSA-2016-2036.html
- http://www.securitytracker.com/id/1035951
- https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/f956ea38e4da2e2c1e7131e6f91e41754852f5a4861d1a14ca5ca78a%40%3Cusers.activemq.apache.org%3E
- https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-25234. | CVE ID: CVE-2020-25234
Date Updated: 2024-08-04T15:33:05.332Z
Date Published: 2020-12-14T21:05:19
Description:
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3), LOGO! Soft Comfort (All versions < V8.3). The LOGO! program files generated and used by the affected components offer the possibility to save user-defined functions (UDF) in a password protected way. This protection is implemented in the software that displays the information. An attacker could reverse engineer the UDFs directly from stored program files.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cert-portal.siemens.com/productcert/pdf/ssa-480824.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-4706. | CVE ID: CVE-2008-4706
Date Updated: 2024-08-07T10:24:20.552Z
Date Published: 2008-10-23T17:00:00
Description:
SQL injection vulnerability in VBGooglemap Hotspot Edition 1.0.3, a vBulletin module, allows remote attackers to execute arbitrary SQL commands via the mapid parameter in a showdetails action to (1) vbgooglemaphse.php and (2) mapa.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/32054
- https://www.exploit-db.com/exploits/6593
- http://securityreason.com/securityalert/4480
- http://www.securityfocus.com/bid/31453
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-20019. | CVE ID: CVE-2023-20019
Date Updated: 2024-08-02T08:57:35.601Z
Date Published: 2023-01-19T01:38:00.417Z
Description:
A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform, Cisco BroadWorks Application Server, and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-xss-EzqDXqG4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-3924. | CVE ID: CVE-2021-3924
Date Updated: 2024-08-03T17:09:09.660Z
Date Published: 2021-11-05T14:50:20
Description:
grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.dev/bounties/7ca13522-d0c9-4eff-a7dd-6fd1a7f205a2
- https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-0446. | CVE ID: CVE-2010-0446
Date Updated: 2024-08-07T00:52:19.127Z
Date Published: 2010-02-12T19:00:00
Description:
Unspecified vulnerability on the HP DreamScreen 100 and 130 with firmware before 1.6.0.0, when using a web-connected configuration, allows remote attackers to obtain sensitive information via unknown vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://securitytracker.com/id?1023581
- http://marc.info/?l=bugtraq&m=126592424225647&w=2
- http://marc.info/?l=bugtraq&m=126592424225647&w=2
- http://www.securityfocus.com/bid/38190
- http://secunia.com/advisories/38536
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-11633. | CVE ID: CVE-2017-11633
Date Updated: 2024-08-05T18:12:40.668Z
Date Published: 2018-02-26T22:00:00
Description:
An issue was discovered on Wireless IP Camera 360 devices. Remote attackers can discover RTSP credentials by connecting to TCP port 9527 and reading the InsertConnect field.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/eloygn/IT_Security_Research_WirelessIP_camera_family
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-31652. | CVE ID: CVE-2024-31652
Date Updated: 2024-08-02T01:59:49.250Z
Date Published: 2024-04-15T00:00:00
Description:
A cross-site scripting (XSS) in Cosmetics and Beauty Product Online Store v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31652.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-47048. | CVE ID: CVE-2024-47048
Date Updated: 2024-09-24T19:08:45.482Z
Date Published: 2024-09-24T00:00:00
Description:
Rocket.Chat 6.12.0, 6.11.2, 6.10.5, 6.9.6, 6.8.6, 6.7.8, and earlier allows stored XSS in the description and release notes of the marketplace and private apps.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/RocketChat/Rocket.Chat/pull/33246
- https://docs.rocket.chat/docs/rocketchat-security-fixes-updates-and-advisories
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-3979. | CVE ID: CVE-2011-3979
Date Updated: 2024-08-06T23:53:32.592Z
Date Published: 2011-10-04T10:00:00
Description:
Cross-site scripting (XSS) vulnerability in ztemp/view_compiled/Theme/theme_admin_setasdefault.php in the theme module in Zikula Application Framework 1.3.0 build 3168, 1.2.7, and probably other versions allows remote attackers to inject arbitrary web script or HTML via the themename parameter in the setasdefault action to index.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://community.zikula.org/index.php?module=News&func=display&sid=3075
- https://www.htbridge.ch/advisory/xss_in_zikula.html
- http://www.securityfocus.com/archive/1/519565/100/0/threaded
- http://securityreason.com/securityalert/8409
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69644
- http://secunia.com/advisories/45884
- http://www.securityfocus.com/bid/49491
- http://osvdb.org/75226
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-1811. | CVE ID: CVE-2015-1811
Date Updated: 2024-08-06T04:54:16.333Z
Date Published: 2020-01-15T18:05:34
Description:
XML external entity (XXE) vulnerability in CloudBees Jenkins before 1.600 and LTS before 1.596.1 allows remote attackers to read arbitrary XML files via a crafted XML document.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1205632
- https://jenkins.io/security/advisory/2015-02-27/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-9221. | CVE ID: CVE-2017-9221
Date Updated: 2024-08-05T17:02:43.977Z
Date Published: 2017-06-27T12:00:00
Description:
The mp4ff_read_mdhd function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted mp4 file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://seclists.org/fulldisclosure/2017/Jun/32
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-35645. | CVE ID: CVE-2024-35645
Date Updated: 2024-08-02T03:14:53.503Z
Date Published: 2024-06-01T23:24:31.642Z
Description:
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in vinoth06 Random Banner allows Stored XSS.This issue affects Random Banner: from n/a through 4.2.8.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/random-banner/wordpress-random-banner-plugin-4-2-8-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-6389. | CVE ID: CVE-2024-6389
Date Updated: 2024-09-13T14:17:35.852Z
Date Published: 2024-09-12T16:56:48.267Z
Description:
An issue was discovered in GitLab-CE/EE affecting all versions starting with 17.0 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. An attacker as a guest user was able to access commit information via the release Atom endpoint, contrary to permissions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gitlab.com/gitlab-org/gitlab/-/issues/469367
- https://hackerone.com/reports/2573397
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-14300. | CVE ID: CVE-2017-14300
Date Updated: 2024-08-05T19:20:41.409Z
Date Published: 2017-09-11T18:00:00
Description:
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllGetClassObject+0x0000000000004479."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-14300
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-3258. | CVE ID: CVE-2009-3258
Date Updated: 2024-09-17T01:21:10.084Z
Date Published: 2009-09-18T21:00:00Z
Description:
vtiger CRM before 5.1.0 allows remote authenticated users, with certain View privileges, to delete (1) attachments, (2) reports, (3) filters, (4) views, and (5) tickets; insert (6) attachments, (7) reports, (8) filters, (9) views, and (10) tickets; and edit (11) reports, (12) filters, (13) views, and (14) tickets via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://forums.vtiger.com/viewtopic.php?t=16756
- http://trac.vtiger.com/cgi-bin/trac.cgi/ticket/5249
- http://forums.vtiger.com/viewtopic.php?t=15094
- http://secunia.com/advisories/36309
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-0156. | CVE ID: CVE-2009-0156
Date Updated: 2024-08-07T04:24:18.134Z
Date Published: 2009-05-13T15:14:00
Description:
Launch Services in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 allows remote attackers to cause a denial of service (persistent Finder crash) via a crafted Mach-O executable that triggers an out-of-bounds memory read.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://support.apple.com/kb/HT3549
- http://secunia.com/advisories/35074
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50490
- http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
- http://www.securityfocus.com/bid/34932
- http://www.securityfocus.com/bid/34926
- http://www.us-cert.gov/cas/techalerts/TA09-133A.html
- http://www.securitytracker.com/id?1022215
- http://www.vupen.com/english/advisories/2009/1297
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-28476. | CVE ID: CVE-2023-28476
Date Updated: 2024-08-02T12:38:25.462Z
Date Published: 2023-04-28T00:00:00
Description:
Concrete CMS (previously concrete5) in versions 9.0 through 9.1.3 is vulnerable to Stored XSS on Tags on uploaded files.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://concretecms.com
- https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20
- https://www.concretecms.org/about/project-news/security/2023-12-05-concrete-cms-new-cves-and-cve-updates
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-28026. | CVE ID: CVE-2023-28026
Date Updated: 2024-08-02T12:23:30.812Z
Date Published: 2023-06-23T10:23:05.908Z
Description:
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-42149. | CVE ID: CVE-2024-42149
Date Updated: 2024-09-11T17:34:34.789Z
Date Published: 2024-07-30T07:46:42.133Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
fs: don't misleadingly warn during thaw operations
The block device may have been frozen before it was claimed by a
filesystem. Concurrently another process might try to mount that
frozen block device and has temporarily claimed the block device for
that purpose causing a concurrent fs_bdev_thaw() to end up here. The
mounter is already about to abort mounting because they still saw an
elevanted bdev->bd_fsfreeze_count so get_bdev_super() will return
NULL in that case.
For example, P1 calls dm_suspend() which calls into bdev_freeze() before
the block device has been claimed by the filesystem. This brings
bdev->bd_fsfreeze_count to 1 and no call into fs_bdev_freeze() is
required.
Now P2 tries to mount that frozen block device. It claims it and checks
bdev->bd_fsfreeze_count. As it's elevated it aborts mounting.
In the meantime P3 called dm_resume(). P3 sees that the block device is
already claimed by a filesystem and calls into fs_bdev_thaw().
P3 takes a passive reference and realizes that the filesystem isn't
ready yet. P3 puts itself to sleep to wait for the filesystem to become
ready.
P2 now puts the last active reference to the filesystem and marks it as
dying. P3 gets woken, sees that the filesystem is dying and
get_bdev_super() fails.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/25b1e3906e050d452427bc51620bb7f0a591373a
- https://git.kernel.org/stable/c/2ae4db5647d807efb6a87c09efaa6d1db9c905d7
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-18717. | CVE ID: CVE-2017-18717
Date Updated: 2024-08-05T21:37:42.800Z
Date Published: 2020-04-24T13:29:50
Description:
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6200 before 1.1.00.24, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.netgear.com/000052280/Security-Advisory-for-Pre-Authentication-Stack-Overflow-on-Routers-PSV-2017-2153
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-2315. | CVE ID: CVE-2022-2315
Date Updated: 2024-09-16T20:47:19.074Z
Date Published: 2022-09-21T07:50:09.721004Z
Description:
Database Software Accreditation Tracking/Presentation Module product before version 2 has an unauthenticated SQL Injection vulnerability. This is fixed in version 2.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.usom.gov.tr/bildirim/tr-22-0634
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-32759. | CVE ID: CVE-2023-32759
Date Updated: 2024-08-02T15:25:37.016Z
Date Published: 2023-07-14T00:00:00
Description:
An issue in Archer Platform before v.6.13 and fixed in 6.12.0.6 and 6.13.0 allows an authenticated attacker to obtain sensitive information via a crafted URL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.archerirm.community/t5/product-advisories/archer-announces-availability-of-archer-release-6-13/ta-p/697821
- https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/702362
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-3830. | CVE ID: CVE-2021-3830
Date Updated: 2024-08-03T17:09:09.611Z
Date Published: 2021-09-26T08:15:14
Description:
btcpayserver is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/btcpayserver/btcpayserver/commit/fc4e47cec608cc3dba24b19d0145ac69320b975e
- https://huntr.dev/bounties/0fcdee5f-1f07-47ce-b650-ea8b4a7d35d8
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-1352. | CVE ID: CVE-2010-1352
Date Updated: 2024-08-07T01:21:19.031Z
Date Published: 2010-04-12T18:00:00
Description:
Directory traversal vulnerability in the JOOFORGE Jutebox (com_jukebox) component 1.0 and 1.7 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/39357
- http://www.securityfocus.com/bid/39248
- http://www.exploit-db.com/exploits/12084
- http://packetstormsecurity.org/1004-exploits/joomlajukebox-lfi.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-36393. | CVE ID: CVE-2021-36393
Date Updated: 2024-08-04T00:54:51.494Z
Date Published: 2023-03-06T00:00:00
Description:
In Moodle, an SQL injection risk was identified in the library fetching a user's recent courses.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://moodle.org/mod/forum/discuss.php?d=424798
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-4934. | CVE ID: CVE-2020-4934
Date Updated: 2024-09-16T19:14:54.390Z
Date Published: 2021-02-02T14:35:13.498344Z
Description:
IBM Content Navigator 3.0.CD could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 191752.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/6410504
- https://exchange.xforce.ibmcloud.com/vulnerabilities/191752
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-26914. | CVE ID: CVE-2021-26914
Date Updated: 2024-08-03T20:33:41.417Z
Date Published: 2021-02-08T21:04:19
Description:
NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in MvcUtil valueStringToObject.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://ssd-disclosure.com/?p=4676
- https://www.netmotionsoftware.com/security-advisories/security-vulnerability-in-mobility-web-server-november-19-2020
- https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/
- http://packetstormsecurity.com/files/162617/NetMotion-Mobility-Server-MvcUtil-Java-Deserialization.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-11805. | CVE ID: CVE-2017-11805
Date Updated: 2024-09-17T00:25:45.763Z
Date Published: 2017-10-13T13:00:00Z
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11805
- http://www.securitytracker.com/id/1039529
- http://www.securityfocus.com/bid/101132
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-2772. | CVE ID: CVE-2018-2772
Date Updated: 2024-10-03T20:20:35.862Z
Date Published: 2018-04-19T02:00:00
Description:
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Rich Text Editor). Supported versions that are affected are 8.54, 8.55 and 8.56. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in takeover of PeopleSoft Enterprise PeopleTools. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040701
- http://www.securityfocus.com/bid/103891
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-2392. | CVE ID: CVE-2021-2392
Date Updated: 2024-09-26T14:00:36.406Z
Date Published: 2021-07-20T22:44:06
Description:
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: BI Publisher Security). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in takeover of Oracle BI Publisher. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpujul2021.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-25620. | CVE ID: CVE-2023-25620
Date Updated: 2024-08-02T11:25:19.224Z
Date Published: 2023-04-19T08:17:57.240Z
Description:
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that
could cause denial of service of the controller when a malicious project file is loaded onto the
controller by an authenticated user.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-05.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-2241. | CVE ID: CVE-2009-2241
Date Updated: 2024-08-07T05:44:55.902Z
Date Published: 2009-06-27T18:00:00
Description:
Cross-site scripting (XSS) vulnerability in search.asp in ASP Inline Corporate Calendar allows remote attackers to inject arbitrary web script or HTML via the keyword parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/35054
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50666
- http://www.exploit-db.com/exploits/8756
- http://secunia.com/advisories/35187
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-3728. | CVE ID: CVE-2023-3728
Date Updated: 2024-08-02T07:01:57.525Z
Date Published: 2023-08-01T22:39:16.671Z
Description:
Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
- https://crbug.com/1457421
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
- https://security.gentoo.org/glsa/202401-34
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-40871. | CVE ID: CVE-2021-40871
Date Updated: 2024-08-04T02:51:07.780Z
Date Published: 2021-11-10T22:43:26
Description:
An issue was discovered in Softing Industrial Automation OPC UA C++ SDK before 5.66. Remote attackers to cause a denial of service (DoS) by sending crafted messages to a OPC/UA client. The client process may crash unexpectedly because of a wrong type cast, and must be restarted.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://industrial.softing.com/
- https://industrial.softing.com/fileadmin/sof-files/pdf/ia/support/Security_Bulletin-CVE-2021-40871.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-20767. | CVE ID: CVE-2019-20767
Date Updated: 2024-08-05T02:53:08.913Z
Date Published: 2020-04-15T13:42:05
Description:
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.60, D3600 before 1.0.0.75, D6000 before 1.0.0.75, R9000 before 1.0.4.26, R8900 before 1.0.4.26, R7800 before 1.0.2.52, WNDR4500v3 before 1.0.0.58, WNDR4300v2 before 1.0.0.58, WNDR4300 before 1.0.2.104, WNDR3700v4 before 1.0.2.102, and WNR2000v5 before 1.0.0.66.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.netgear.com/000060632/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Modem-Routers-PSV-2018-0116
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-13731. | CVE ID: CVE-2018-13731
Date Updated: 2024-08-05T09:14:46.712Z
Date Published: 2018-07-09T06:00:00
Description:
The mintToken function of a smart contract implementation for TokenMACHU, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/BlockChainsSecurity/EtherTokens/tree/master/TokenMACHU
- https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-15659. | CVE ID: CVE-2018-15659
Date Updated: 2024-08-05T10:01:54.537Z
Date Published: 2019-02-05T03:00:00
Description:
An issue was discovered in 42Gears SureMDM before 2018-11-27, related to the access policy for Silverlight applications. Cross-origin access is possible.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://research.digitalinterruption.com/2019/01/31/multiple-vulnerabilities-found-in-mobile-device-management-software/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-4563. | CVE ID: CVE-2009-4563
Date Updated: 2024-08-07T07:08:37.993Z
Date Published: 2010-01-04T21:00:00
Description:
Cross-site request forgery (CSRF) vulnerability in zp-core/admin-options.php in Zenphoto 1.2.5 allows remote attackers to hijack the authentication of administrators for requests that change the administrative password via the 0-adminpass and 0-adminpass_2 parameters in a saveoptions action.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51782
- http://osvdb.org/55921
- http://secunia.com/advisories/35863
- http://www.exploit-db.com/exploits/9166
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-28105. | CVE ID: CVE-2024-28105
Date Updated: 2024-08-13T14:20:12.592Z
Date Published: 2024-03-25T18:35:05.202Z
Description:
phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The category image upload function in phpmyfaq is vulnerable to manipulation of the `Content-type` and `lang` parameters, allowing attackers to upload malicious files with a .php extension, potentially leading to remote code execution (RCE) on the system. This vulnerability is fixed in 3.2.6.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-pwh2-fpfr-x5gf
- https://github.com/thorsten/phpMyFAQ/commit/9136883776af67dfdb0e8cf14f5e0ca22bf4f2e7
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-34939. | CVE ID: CVE-2021-34939
Date Updated: 2024-08-04T00:26:55.682Z
Date Published: 2022-01-13T21:44:22
Description:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14996.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005
- https://www.zerodayinitiative.com/advisories/ZDI-21-1527/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-2160. | CVE ID: CVE-2010-2160
Date Updated: 2024-08-07T02:25:07.358Z
Date Published: 2010-06-15T17:48:00
Description:
Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an invalid offset in an unspecified undocumented opcode in ActionScript Virtual Machine 2, related to getouterscope, a different vulnerability than CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, CVE-2010-2187, and CVE-2010-2188.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2011/0192
- http://www.vupen.com/english/advisories/2010/1421
- http://support.apple.com/kb/HT4435
- http://secunia.com/advisories/40545
- http://www.zerodayinitiative.com/advisories/ZDI-10-114
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7508
- http://www.redhat.com/support/errata/RHSA-2010-0464.html
- http://www.vupen.com/english/advisories/2010/1793
- http://secunia.com/advisories/43026
- http://www.vupen.com/english/advisories/2010/1432
- http://security.gentoo.org/glsa/glsa-201101-09.xml
- http://www.us-cert.gov/cas/techalerts/TA10-162A.html
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
- http://www.securityfocus.com/bid/40759
- http://securitytracker.com/id?1024085
- http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
- http://securitytracker.com/id?1024086
- http://www.vupen.com/english/advisories/2010/1434
- http://www.securityfocus.com/archive/1/512020/100/0/threaded
- http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
- http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html
- http://www.securityfocus.com/bid/40779
- http://www.adobe.com/support/security/bulletins/apsb10-14.html
- http://secunia.com/advisories/40144
- http://www.redhat.com/support/errata/RHSA-2010-0470.html
- http://www.vupen.com/english/advisories/2010/1482
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16083
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
- http://www.vupen.com/english/advisories/2010/1522
- http://www.vupen.com/english/advisories/2010/1453
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-48484. | CVE ID: CVE-2023-48484
Date Updated: 2024-08-02T21:30:35.438Z
Date Published: 2023-12-15T10:15:34.109Z
Description:
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-44720. | CVE ID: CVE-2024-44720
Date Updated: 2024-09-09T17:03:31.718Z
Date Published: 2024-09-09T00:00:00
Description:
SeaCMS v13.1 was discovered to an arbitrary file read vulnerability via the component admin_safe.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/seacms-net/CMS/issues/22
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-6621. | CVE ID: CVE-2014-6621
Date Updated: 2024-08-06T12:24:35.666Z
Date Published: 2014-11-19T18:00:00
Description:
Aruba Networks ClearPass before 6.3.6 and 6.4.x before 6.4.1 does not disable the troubleshooting and diagnostics page in production systems, which allows remote attackers to obtain version numbers, module configuration, and other sensitive information by reading the page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/61916
- http://www.arubanetworks.com/support/alerts/aid-10282014.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-5461. | CVE ID: CVE-2023-5461
Date Updated: 2024-09-19T18:33:57.954Z
Date Published: 2023-10-09T20:00:06.688Z
Description:
A vulnerability was found in Delta Electronics WPLSoft 2.51. It has been classified as problematic. Affected is an unknown function of the component Modbus Handler. The manipulation leads to cleartext transmission of sensitive information. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241584. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.241584
- https://vuldb.com/?ctiid.241584
- https://drive.google.com/drive/folders/17nBJt3tejqipE_L-lMEhYXeGhG0eii-_
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-1910. | CVE ID: CVE-2011-1910
Date Updated: 2024-08-06T22:46:00.521Z
Date Published: 2011-05-31T20:00:00
Description:
Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/795694
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:104
- https://bugzilla.redhat.com/show_bug.cgi?id=708301
- http://secunia.com/advisories/44677
- http://www.securityfocus.com/bid/48007
- http://marc.info/?l=bugtraq&m=142180687100892&w=2
- http://secunia.com/advisories/44929
- http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.685026
- https://hermes.opensuse.org/messages/8699912
- http://secunia.com/advisories/44783
- http://secunia.com/advisories/44719
- http://www.debian.org/security/2011/dsa-2244
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061405.html
- http://osvdb.org/72540
- http://secunia.com/advisories/44741
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
- http://security.freebsd.org/advisories/FreeBSD-SA-11:02.bind.asc
- http://www.redhat.com/support/errata/RHSA-2011-0845.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061401.html
- http://secunia.com/advisories/44744
- https://www.isc.org/software/bind/advisories/cve-2011-1910
- http://support.apple.com/kb/HT5002
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061082.html
- http://marc.info/?l=bugtraq&m=142180687100892&w=2
- http://secunia.com/advisories/44762
- http://secunia.com/advisories/44758
- http://www.securitytracker.com/id?1025572
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-7247. | CVE ID: CVE-2013-7247
Date Updated: 2024-08-06T18:01:19.818Z
Date Published: 2014-01-26T01:00:00
Description:
cgi-bin/tsaws.cgi in Franklin Fueling Systems TS-550 evo with firmware 2.0.0.6833 and other versions before 2.4.0 allows remote attackers to discover sensitive information (user names and password hashes) via the cmdWebGetConfiguration action in a TSA_REQUEST.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.trustwave.com/spiderlabs/advisories/TWSL2014-001.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-25646. | CVE ID: CVE-2024-25646
Date Updated: 2024-09-28T22:25:36.576Z
Date Published: 2024-04-09T00:47:43.364Z
Description:
Due to improper validation, SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://me.sap.com/notes/3421384
- https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-2616. | CVE ID: CVE-2017-2616
Date Updated: 2024-08-05T14:02:06.892Z
Date Published: 2018-07-27T19:00:00
Description:
A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616
- http://www.securityfocus.com/bid/96404
- https://access.redhat.com/errata/RHSA-2017:0907
- http://rhn.redhat.com/errata/RHSA-2017-0654.html
- https://security.gentoo.org/glsa/201706-02
- https://www.debian.org/security/2017/dsa-3793
- https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891
- http://www.securitytracker.com/id/1038271
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-2095. | CVE ID: CVE-2018-2095
Date Updated: 2019-01-22T17:57:02
Date Published: 2019-01-22T20:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-1073. | CVE ID: CVE-2013-1073
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-43799. | CVE ID: CVE-2024-43799
Date Updated: 2024-09-10T19:34:18.557Z
Date Published: 2024-09-10T14:45:06.761Z
Description:
Send is a library for streaming files from the file system as a http response. Send passes untrusted user input to SendStream.redirect() which executes untrusted code. This issue is patched in send 0.19.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/pillarjs/send/security/advisories/GHSA-m6fv-jmcg-4jfg
- https://github.com/pillarjs/send/commit/ae4f2989491b392ae2ef3b0015a019770ae65d35
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-8896. | CVE ID: CVE-2014-8896
Date Updated: 2024-08-06T13:33:11.941Z
Date Published: 2014-12-22T16:00:00
Description:
The Collaboration Server in IBM InfoSphere Master Data Management Server for Product Information Management 9.x through 9.1 and InfoSphere Master Data Management - Collaborative Edition 10.x through 10.1, 11.0 before FP7, and 11.3 and 11.4 before 11.4 FP1 allows remote authenticated users to modify the administrator's credentials and consequently gain privileges via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg21692176
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99049
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-33010. | CVE ID: CVE-2024-33010
Date Updated: 2024-08-05T15:38:42.755Z
Date Published: 2024-08-05T14:21:30.704Z
Description:
Transient DOS while parsing fragments of MBSSID IE from beacon frame.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-0262. | CVE ID: CVE-2017-0262
Date Updated: 2024-08-05T12:55:19.336Z
Date Published: 2017-05-12T14:00:00
Description:
Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0261 and CVE-2017-0281.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/98279
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0262
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-6471. | CVE ID: CVE-2014-6471
Date Updated: 2024-08-06T12:17:24.010Z
Date Published: 2014-10-15T15:15:00
Description:
Unspecified vulnerability in the Oracle Applications Manager component in Oracle E-Business Suite 12.0.6, 12.1.3, 12.2.2, 12.2.3, and 12.2.4 allows remote attackers to affect integrity via vectors related to OAM Diagnostics.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/70447
- http://secunia.com/advisories/61781
- http://www.securitytracker.com/id/1031042
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-1588. | CVE ID: CVE-2024-1588
Date Updated: 2024-08-01T18:40:21.438Z
Date Published: 2024-04-08T05:00:01.486Z
Description:
The SendPress Newsletters WordPress plugin through 1.23.11.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/2772c921-d977-4150-b207-ae5ba5e2a6db/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-36261. | CVE ID: CVE-2020-36261
Date Updated: 2022-08-22T15:02:18
Date Published: 2022-08-22T15:02:18
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-25576. | CVE ID: CVE-2024-25576
Date Updated: 2024-08-14T15:47:09.041Z
Date Published: 2024-08-14T13:45:31.056Z
Description:
improper access control in firmware for some Intel(R) FPGA products before version 24.1 may allow a privileged user to enable escalation of privilege via local access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01087.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-11252. | CVE ID: CVE-2019-11252
Date Updated: 2024-09-17T04:24:20.027Z
Date Published: 2020-07-23T14:47:38.187100Z
Description:
The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/kubernetes/kubernetes/pull/88684
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-22237. | CVE ID: CVE-2024-22237
Date Updated: 2024-08-01T22:43:33.655Z
Date Published: 2024-02-06T19:36:09.748Z
Description:
Aria Operations for Networks contains a local privilege escalation vulnerability. A console user with access to Aria Operations for Networks may exploit this vulnerability to escalate privileges to gain root access to the system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.vmware.com/security/advisories/VMSA-2024-0002.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-43797. | CVE ID: CVE-2023-43797
Date Updated: 2024-09-05T20:20:01.467Z
Date Published: 2023-10-30T22:18:11.821Z
Description:
BigBlueButton is an open-source virtual classroom. Prior to versions 2.6.11 and 2.7.0-beta.3, Guest Lobby was vulnerable to cross-site scripting when users wait to enter the meeting due to inserting unsanitized messages to the element using unsafe innerHTML. Text sanitizing was added for lobby messages starting in versions 2.6.11 and 2.7.0-beta.3. There are no known workarounds.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/bigbluebutton/bigbluebutton/security/advisories/GHSA-v6wg-q866-h73x
- https://github.com/bigbluebutton/bigbluebutton/pull/18392
- https://github.com/bigbluebutton/bigbluebutton/commit/304bc851a00558f99a908880f4ac44234a074c9d
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-0771. | CVE ID: CVE-2018-0771
Date Updated: 2024-09-17T00:30:57.144Z
Date Published: 2018-02-15T02:00:00Z
Description:
Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows a security feature bypass, due to how Edge handles different-origin requests, aka "Microsoft Edge Security Feature Bypass".
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/102857
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0771
- http://www.securitytracker.com/id/1040372
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-3222. | CVE ID: CVE-2015-3222
Date Updated: 2024-08-06T05:39:32.023Z
Date Published: 2017-09-07T20:00:00
Description:
syscheck/seechanges.c in OSSEC 2.7 through 2.8.1 on NIX systems allows local users to execute arbitrary code as root.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.com/files/132281/OSSEC-2.8.1-Local-Root-Escalation.html
- http://www.openwall.com/lists/oss-security/2015/06/11/1
- https://github.com/ossec/ossec-hids/releases/tag/2.8.2
- http://www.securityfocus.com/bid/75148
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-44424. | CVE ID: CVE-2023-44424
Date Updated: 2024-08-02T20:07:33.356Z
Date Published: 2024-05-03T02:13:52.257Z
Description:
D-Link DIR-X3260 SetSysEmailSettings EmailTo Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-X3260 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within prog.cgi, which handles HNAP requests made to the lighttpd webserver listening on TCP ports 80 and 443. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21158.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-23-1522/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-40991. | CVE ID: CVE-2022-40991
Date Updated: 2024-08-03T12:28:42.948Z
Date Published: 2023-01-26T21:24:38.107Z
Description:
Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'firmwall domain WORD description (WORD|null)' command template.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-20475. | CVE ID: CVE-2022-20475
Date Updated: 2024-08-03T02:10:44.937Z
Date Published: 2022-12-13T00:00:00
Description:
In test of ResetTargetTaskHelper.java, there is a possible hijacking of any app which sets allowTaskReparenting="true" due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-240663194
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/2022-12-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-49974. | CVE ID: CVE-2023-49974
Date Updated: 2024-08-15T20:35:26.810Z
Date Published: 2024-03-06T00:00:00
Description:
A cross-site scripting (XSS) vulnerability in Customer Support System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the contact parameter at /customer_support/index.php?page=customer_list.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html
- https://github.com/geraldoalcantara/CVE-2023-49974
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-5758. | CVE ID: CVE-2014-5758
Date Updated: 2024-08-06T11:55:49.792Z
Date Published: 2014-09-09T10:00:00
Description:
The Yellow Pages Local Search (aka com.yellowbook.android2) application 11.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/815521
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-0399. | CVE ID: CVE-2014-0399
Date Updated: 2024-08-06T09:13:10.602Z
Date Published: 2014-01-15T01:33:00
Description:
Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.2, 6.3, 6.3.1, and 6.3.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Data, Domain & Function Security.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://osvdb.org/102085
- http://www.securitytracker.com/id/1029620
- http://www.securityfocus.com/bid/64861
- http://www.securityfocus.com/bid/64758
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-3023. | CVE ID: CVE-2009-3023
Date Updated: 2024-08-07T06:14:55.348Z
Date Published: 2009-08-31T20:00:00
Description:
Buffer overflow in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 6.0 allows remote authenticated users to execute arbitrary code via a crafted NLST (NAME LIST) command that uses wildcards, leading to memory corruption, aka "IIS FTP Service RCE and DoS Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ975191
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6080
- http://www.securityfocus.com/bid/36189
- http://www.exploit-db.com/exploits/9541
- http://www.us-cert.gov/cas/techalerts/TA09-286A.html
- http://www.vupen.com/english/advisories/2009/2481
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-053
- http://www.exploit-db.com/exploits/9559
- http://www.kb.cert.org/vuls/id/276653
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-4517. | CVE ID: CVE-2008-4517
Date Updated: 2024-08-07T10:17:09.826Z
Date Published: 2008-10-09T18:00:00
Description:
SQL injection vulnerability in leggi.php in geccBBlite 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45682
- http://securityreason.com/securityalert/4382
- http://www.securityfocus.com/bid/31585
- https://www.exploit-db.com/exploits/6677
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-35162. | CVE ID: CVE-2023-35162
Date Updated: 2024-08-02T16:23:59.521Z
Date Published: 2023-06-23T18:52:19.725Z
Description:
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the previewactions template to perform a XSS, e.g. by using URL such as: > <hostname>/xwiki/bin/get/FlamingoThemes/Cerulean xpage=xpart&vm=previewactions.vm&xcontinue=javascript:alert(document.domain). This vulnerability exists since XWiki 6.1-rc-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-q9hg-9qj2-mxf9
- https://github.com/xwiki/xwiki-platform/commit/9f01166b1a8ee9639666099eb5040302df067e4d
- https://jira.xwiki.org/browse/XWIKI-20342
- https://jira.xwiki.org/browse/XWIKI-20583
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-32890. | CVE ID: CVE-2021-32890
Date Updated: 2022-12-02T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-25796. | CVE ID: CVE-2023-25796
Date Updated: 2024-08-02T11:32:11.850Z
Date Published: 2023-05-03T11:08:14.427Z
Description:
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Include WP BaiDu Submit plugin <= 1.2.1 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/wp-baidu-submit/wordpress-wp-baidu-submit-plugin-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-3386. | CVE ID: CVE-2014-3386
Date Updated: 2024-08-06T10:43:05.506Z
Date Published: 2014-10-10T10:00:00
Description:
The GPRS Tunneling Protocol (GTP) inspection engine in Cisco ASA Software 8.2 before 8.2(5.51), 8.4 before 8.4(7.15), 8.7 before 8.7(1.13), 9.0 before 9.0(4.8), and 9.1 before 9.1(5.1) allows remote attackers to cause a denial of service (device reload) via a crafted series of GTP packets, aka Bug ID CSCum56399.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-6495. | CVE ID: CVE-2014-6495
Date Updated: 2024-08-06T12:17:24.316Z
Date Published: 2014-10-15T22:03:00
Description:
Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.securityfocus.com/bid/70496
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-29569. | CVE ID: CVE-2021-29569
Date Updated: 2024-08-03T22:11:05.766Z
Date Published: 2021-05-14T19:16:36
Description:
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs. The implementation(https://github.com/tensorflow/tensorflow/blob/ac328eaa3870491ababc147822cd04e91a790643/tensorflow/core/kernels/requantization_range_op.cc#L49-L50) assumes that the `input_min` and `input_max` tensors have at least one element, as it accesses the first element in two arrays. If the tensors are empty, `.flat<T>()` is an empty object, backed by an empty array. Hence, accesing even the 0th element is a read outside the bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3h8m-483j-7xxm
- https://github.com/tensorflow/tensorflow/commit/ef0c008ee84bad91ec6725ddc42091e19a30cf0e
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-13715. | CVE ID: CVE-2020-13715
Date Updated: 2022-01-14T17:27:21
Date Published: 2022-01-14T17:27:21
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-2529. | CVE ID: CVE-2008-2529
Date Updated: 2024-08-07T09:05:29.836Z
Date Published: 2008-06-03T15:00:00
Description:
SQL injection vulnerability in read.php in Advanced Links Management (ALM) 1.5.2 allows remote attackers to execute arbitrary SQL commands via the catId parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/5581
- http://www.securityfocus.com/bid/29137
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42320
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-26785. | CVE ID: CVE-2022-26785
Date Updated: 2024-08-03T05:11:44.483Z
Date Published: 2022-04-15T19:04:20
Description:
Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26785
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-1156. | CVE ID: CVE-2017-1156
Date Updated: 2024-08-05T13:25:17.256Z
Date Published: 2017-05-05T19:00:00
Description:
IBM WebSphere Portal 8.5 and 9.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force. ID: 122592
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.ibm.com/support/docview.wss?uid=swg22000153
- http://www.securitytracker.com/id/1038390
- http://www.securityfocus.com/bid/98340
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-15955. | CVE ID: CVE-2019-15955
Date Updated: 2024-08-05T01:03:32.432Z
Date Published: 2019-09-05T18:31:34
Description:
An issue was discovered in Total.js CMS 12.0.0. A low privilege user can perform a simple transformation of a cookie to obtain the random values inside it. If an attacker can discover a session cookie owned by an admin, then it is possible to brute force it with O(n)=2n instead of O(n)=n^x complexity, and steal the admin password.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/beerpwn/CVE/blob/master/Totaljs_disclosure_report/report_final.pdf
- https://seclists.org/fulldisclosure/2019/Sep/3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-39643. | CVE ID: CVE-2023-39643
Date Updated: 2024-09-25T19:39:00.234Z
Date Published: 2023-09-15T00:00:00
Description:
Bl Modules xmlfeeds before v3.9.8 was discovered to contain a SQL injection vulnerability via the component SearchApiXml::Xmlfeeds().
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://addons.prestashop.com/en/data-import-export/5732-xml-feeds-pro.html
- https://security.friendsofpresta.org/modules/2023/08/29/xmlfeeds.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-0162. | CVE ID: CVE-2016-0162
Date Updated: 2024-08-05T22:08:13.278Z
Date Published: 2016-04-12T23:00:00
Description:
Microsoft Internet Explorer 9 through 11 allows remote attackers to determine the existence of files via crafted JavaScript code, aka "Internet Explorer Information Disclosure Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1035521
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-037
- http://www.securityfocus.com/bid/85939
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-48870. | CVE ID: CVE-2022-48870
Date Updated: 2024-09-12T17:32:54.375Z
Date Published: 2024-08-21T06:10:00.678Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
tty: fix possible null-ptr-defer in spk_ttyio_release
Run the following tests on the qemu platform:
syzkaller:~# modprobe speakup_audptr
input: Speakup as /devices/virtual/input/input4
initialized device: /dev/synth, node (MAJOR 10, MINOR 125)
speakup 3.1.6: initialized
synth name on entry is: (null)
synth probe
spk_ttyio_initialise_ldisc failed because tty_kopen_exclusive returned
failed (errno -16), then remove the module, we will get a null-ptr-defer
problem, as follow:
syzkaller:~# modprobe -r speakup_audptr
releasing synth audptr
BUG: kernel NULL pointer dereference, address: 0000000000000080
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 2 PID: 204 Comm: modprobe Not tainted 6.1.0-rc6-dirty #1
RIP: 0010:mutex_lock+0x14/0x30
Call Trace:
<TASK>
spk_ttyio_release+0x19/0x70 [speakup]
synth_release.part.6+0xac/0xc0 [speakup]
synth_remove+0x56/0x60 [speakup]
__x64_sys_delete_module+0x156/0x250
? fpregs_assert_state_consistent+0x1d/0x50
do_syscall_64+0x37/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcd
</TASK>
Modules linked in: speakup_audptr(-) speakup
Dumping ftrace buffer:
in_synth->dev was not initialized during modprobe, so we add check
for in_synth->dev to fix this bug.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/2da67bff29ab49caafb0766e8b8383b735ff796f
- https://git.kernel.org/stable/c/64152e05a4de3ebf59f1740a0985a6d5fba0c77b
- https://git.kernel.org/stable/c/5abbeebd8296c2301023b8dc4b5a6c0d5229b4f5
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-2826. | CVE ID: CVE-2022-2826
Date Updated: 2024-08-03T00:52:59.016Z
Date Published: 2022-10-28T00:00:00
Description:
An issue has been discovered in GitLab affecting all versions starting from 10.0 before 12.9.8, all versions starting from 12.10 before 12.10.7, all versions starting from 13.0 before 13.0.1. TODO
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gitlab.com/gitlab-org/gitlab/-/issues/370790
- https://hackerone.com/reports/1646633
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2826.json
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-1206. | CVE ID: CVE-2022-1206
Date Updated: 2024-09-13T12:48:11.308Z
Date Published: 2024-08-20T03:21:11.012Z
Description:
The AdRotate Banner Manager – The only ad manager you'll need plugin for WordPress is vulnerable to arbitrary file uploads due to missing file extension sanitization in the adrotate_insert_media() function in all versions up to, and including, 5.13.2. This makes it possible for authenticated attackers, with administrator-level access and above, to upload arbitrary files with double extensions on the affected site's server which may make remote code execution possible. This is only exploitable on select instances where the configuration will execute the first extension present.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9f92219a-e07e-422d-a9f2-dbe4fbcd5f55?source=cve
- https://plugins.trac.wordpress.org/browser/adrotate/trunk/adrotate-admin-manage.php#L418
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-46964. | CVE ID: CVE-2021-46964
Date Updated: 2024-09-11T17:33:46.679Z
Date Published: 2024-02-27T18:47:02.404Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Reserve extra IRQ vectors
Commit a6dcfe08487e ("scsi: qla2xxx: Limit interrupt vectors to number of
CPUs") lowers the number of allocated MSI-X vectors to the number of CPUs.
That breaks vector allocation assumptions in qla83xx_iospace_config(),
qla24xx_enable_msix() and qla2x00_iospace_config(). Either of the functions
computes maximum number of qpairs as:
ha->max_qpairs = ha->msix_count - 1 (MB interrupt) - 1 (default
response queue) - 1 (ATIO, in dual or pure target mode)
max_qpairs is set to zero in case of two CPUs and initiator mode. The
number is then used to allocate ha->queue_pair_map inside
qla2x00_alloc_queues(). No allocation happens and ha->queue_pair_map is
left NULL but the driver thinks there are queue pairs available.
qla2xxx_queuecommand() tries to find a qpair in the map and crashes:
if (ha->mqenable) {
uint32_t tag;
uint16_t hwq;
struct qla_qpair *qpair = NULL;
tag = blk_mq_unique_tag(cmd->request);
hwq = blk_mq_unique_tag_to_hwq(tag);
qpair = ha->queue_pair_map[hwq]; # <- HERE
if (qpair)
return qla2xxx_mqueuecommand(host, cmd, qpair);
}
BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: 0000 [#1] SMP PTI
CPU: 0 PID: 72 Comm: kworker/u4:3 Tainted: G W 5.10.0-rc1+ #25
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.0.0-prebuilt.qemu-project.org 04/01/2014
Workqueue: scsi_wq_7 fc_scsi_scan_rport [scsi_transport_fc]
RIP: 0010:qla2xxx_queuecommand+0x16b/0x3f0 [qla2xxx]
Call Trace:
scsi_queue_rq+0x58c/0xa60
blk_mq_dispatch_rq_list+0x2b7/0x6f0
? __sbitmap_get_word+0x2a/0x80
__blk_mq_sched_dispatch_requests+0xb8/0x170
blk_mq_sched_dispatch_requests+0x2b/0x50
__blk_mq_run_hw_queue+0x49/0xb0
__blk_mq_delay_run_hw_queue+0xfb/0x150
blk_mq_sched_insert_request+0xbe/0x110
blk_execute_rq+0x45/0x70
__scsi_execute+0x10e/0x250
scsi_probe_and_add_lun+0x228/0xda0
__scsi_scan_target+0xf4/0x620
? __pm_runtime_resume+0x4f/0x70
scsi_scan_target+0x100/0x110
fc_scsi_scan_rport+0xa1/0xb0 [scsi_transport_fc]
process_one_work+0x1ea/0x3b0
worker_thread+0x28/0x3b0
? process_one_work+0x3b0/0x3b0
kthread+0x112/0x130
? kthread_park+0x80/0x80
ret_from_fork+0x22/0x30
The driver should allocate enough vectors to provide every CPU it's own HW
queue and still handle reserved (MB, RSP, ATIO) interrupts.
The change fixes the crash on dual core VM and prevents unbalanced QP
allocation where nr_hw_queues is two less than the number of CPUs.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/4ecd42dec858b6632c5f024fe13e9ad6c30f2734
- https://git.kernel.org/stable/c/0f86d66b38501e3ac66cf2d9f9f8ad6838bad0e6
- https://git.kernel.org/stable/c/f02d4086a8f36a0e1aaebf559b54cf24a177a486
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-15707. | CVE ID: CVE-2017-15707
Date Updated: 2024-09-16T22:01:58.959Z
Date Published: 2017-12-01T16:00:00Z
Description:
In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cwiki.apache.org/confluence/display/WW/S2-054
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securitytracker.com/id/1039946
- http://www.securityfocus.com/bid/102021
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- https://security.netapp.com/advisory/ntap-20171214-0001/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-5257. | CVE ID: CVE-2013-5257
Date Updated: 2023-09-14T18:40:42.050Z
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-46555. | CVE ID: CVE-2023-46555
Date Updated: 2024-09-11T15:18:37.446Z
Date Published: 2023-10-25T00:00:00
Description:
TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formPortFw.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36
- https://github.com/XYIYM/Digging/blob/main/TOTOLINK/X2000R/3/1.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-1829. | CVE ID: CVE-2008-1829
Date Updated: 2024-08-07T08:40:58.039Z
Date Published: 2008-04-16T10:00:00
Description:
Unspecified vulnerability in the PeopleSoft HCM Recruiting component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.8 SP1 has unknown impact and remote attack vectors, aka PSE02.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42066
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41858
- http://www.vupen.com/english/advisories/2008/1267/references
- http://www.vupen.com/english/advisories/2008/1233/references
- http://www.securitytracker.com/id?1019855
- http://secunia.com/advisories/29829
- http://www.securityfocus.com/archive/1/491024/100/0/threaded
- http://www.oracle.com/technetwork/topics/security/cpuapr2008-082075.html
- http://secunia.com/advisories/29874
- http://www.securityfocus.com/archive/1/491024/100/0/threaded
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-45302. | CVE ID: CVE-2024-45302
Date Updated: 2024-08-30T14:55:34.162Z
Date Published: 2024-08-29T21:18:43.261Z
Description:
RestSharp is a Simple REST and HTTP API Client for .NET. The second argument to `RestRequest.AddHeader` (the header value) is vulnerable to CRLF injection. The same applies to `RestRequest.AddOrUpdateHeader` and `RestClient.AddDefaultHeader`. The way HTTP headers are added to a request is via the `HttpHeaders.TryAddWithoutValidation` method which does not check for CRLF characters in the header value. This means that any headers from a `RestSharp.RequestHeaders` object are added to the request in such a way that they are vulnerable to CRLF-injection. In general, CRLF-injection into a HTTP header (when using HTTP/1.1) means that one can inject additional HTTP headers or smuggle whole HTTP requests. If an application using the RestSharp library passes a user-controllable value through to a header, then that application becomes vulnerable to CRLF-injection. This is not necessarily a security issue for a command line application like the one above, but if such code were present in a web application then it becomes vulnerable to request splitting (as shown in the PoC) and thus Server Side Request Forgery. Strictly speaking this is a potential vulnerability in applications using RestSharp, not in RestSharp itself, but I would argue that at the very least there needs to be a warning about this behaviour in the RestSharp documentation. RestSharp has addressed this issue in version 112.0.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/restsharp/RestSharp/security/advisories/GHSA-4rr6-2v9v-wcpc
- https://github.com/restsharp/RestSharp/commit/0fba5e727d241b1867bd71efc912594075c2934b
- https://github.com/restsharp/RestSharp/blob/777bf194ec2d14271e7807cc704e73ec18fcaf7e/src/RestSharp/Request/HttpRequestMessageExtensions.cs#L32
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-3104. | CVE ID: CVE-2014-3104
Date Updated: 2024-08-06T10:35:55.935Z
Date Published: 2014-09-23T21:00:00
Description:
IBM Rational ClearQuest 7.1 before 7.1.2.15, 8.0.0 before 8.0.0.12, and 8.0.1 before 8.0.1.5 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg21682942
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94311
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-28712. | CVE ID: CVE-2022-28712
Date Updated: 2024-09-16T16:47:40.117Z
Date Published: 2022-08-22T18:22:51.697373Z
Description:
A cross-site scripting (xss) vulnerability exists in the videoAddNew functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/WWBN/AVideo/blob/e04b1cd7062e16564157a82bae389eedd39fa088/updatedb/updateDb.v12.0.sql
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1540
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-38442. | CVE ID: CVE-2021-38442
Date Updated: 2024-09-16T22:55:38.055Z
Date Published: 2021-10-18T12:38:40.737727Z
Description:
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a heap-corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-4050. | CVE ID: CVE-2015-4050
Date Updated: 2024-08-06T06:04:03.032Z
Date Published: 2015-06-02T14:00:00
Description:
FragmentListener in the HttpKernel component in Symfony 2.3.19 through 2.3.28, 2.4.9 through 2.4.10, 2.5.4 through 2.5.11, and 2.6.0 through 2.6.7, when ESI or SSI support enabled, does not check if the _controller attribute is set, which allows remote attackers to bypass URL signing and security rules by including (1) no hash or (2) an invalid hash in a request to /_fragment.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://symfony.com/blog/cve-2015-4050-esi-unauthorized-access
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159610.html
- http://www.debian.org/security/2015/dsa-3276
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159603.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159513.html
- http://www.securityfocus.com/bid/74928
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-28492. | CVE ID: CVE-2020-28492
Date Updated: 2021-01-26T22:20:16
Date Published: 2021-01-26T16:15:14
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.