instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2023-34561.
CVE ID: CVE-2023-34561 Date Updated: 2024-08-02T16:10:07.297Z Date Published: 2023-07-11T00:00:00 Description: A buffer overflow in the level parsing code of RobTop Games AB Geometry Dash v2.113 allows attackers to execute arbitrary code via entering a Geometry Dash level. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.youtube.com/watch?v=DMxucOWfLPc - https://www.youtube.com/watch?v=kAeJvY6BBps - https://www.youtube.com/watch?v=ev0VXbiduuQ - https://www.youtube.com/watch?v=u7eXBr4HkKQ - https://www.youtube.com/watch?v=RGMeWPchScg - https://github.com/meltah/gd-rce No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38788.
CVE ID: CVE-2024-38788 Date Updated: 2024-08-02T04:19:20.557Z Date Published: 2024-07-22T10:06:00.992Z Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Bởi Admin 2020 UiPress lite allows SQL Injection.This issue affects UiPress lite: from n/a through 3.4.06. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/uipress-lite/wordpress-uipress-lite-plugin-3-4-06-sql-injection-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32232.
CVE ID: CVE-2023-32232 Date Updated: 2024-08-02T15:10:24.252Z Date Published: 2023-07-25T00:00:00 Description: An issue was discovered in Vasion PrinterLogic Client for Windows before 25.0.0.836. During client installation and repair, a PrinterLogic binary is called by the installer to configure the device. This window is not hidden, and is running with elevated privileges. A standard user can break out of this window, obtaining a full SYSTEM command prompt window. This results in complete compromise via arbitrary SYSTEM code execution (elevation of privileges). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.printercloud.com/1-Printerlogic/Release_Notes/Client_Release_Notes.htm - https://www.vasion.com/press-releases/printerlogic-rebrands - https://docs.printercloud.com/1-Printerlogic/Release_Notes/Security_Bulletin_CVE.htm No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38560.
CVE ID: CVE-2023-38560 Date Updated: 2024-08-20T15:10:27.770Z Date Published: 2023-08-01T16:49:48.327Z Description: An integer overflow flaw was found in pcl/pl/plfont.c:418 in pl_glyph_name in ghostscript. This issue may allow a local attacker to cause a denial of service via transforming a crafted PCL file to PDF format. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/security/cve/CVE-2023-38560 - https://bugs.ghostscript.com/show_bug.cgi?id=706898 - https://bugzilla.redhat.com/show_bug.cgi?id=2224368 - https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=b7eb1d0174c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41616.
CVE ID: CVE-2021-41616 Date Updated: 2024-08-04T03:15:29.111Z Date Published: 2021-09-30T07:55:11 Description: Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper class was insecure and used ObjectInputStream.readObject without validating that the input data was safe to deserialize. Please note that DdlUtils is no longer being actively developed. To address the insecurity of the BinaryObjectHelper class, the following changes to DdlUtils have been made: (1) BinaryObjectsHelper.java has been deleted from the DdlUtils source repository and the DdlUtils feature of propagating data of SQL binary types is therefore no longer present in DdlUtils; (2) The ddlutils-1.0 release has been removed from the Apache Release Distribution Infrastructure; (3) The DdlUtils web site has been updated to indicate that DdlUtils is now available only as source code, not as a packaged release. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread.html/r3d7a8303a820144f5e2d1fd0b067e18d419421b58346b53b58d3fa72%40%3Cannounce.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5045.
CVE ID: CVE-2024-5045 Date Updated: 2024-08-01T21:03:10.644Z Date Published: 2024-05-17T12:31:03.558Z Description: A vulnerability was found in SourceCodester Online Birth Certificate Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin. The manipulation leads to files or directories accessible. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264742 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.264742 - https://vuldb.com/?ctiid.264742 - https://vuldb.com/?submit.335384 - https://github.com/HuoMingZ/aoligei/blob/main/yuzu.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19227.
CVE ID: CVE-2019-19227 Date Updated: 2024-08-05T02:09:39.618Z Date Published: 2019-11-22T13:39:40 Description: In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1 - http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html - https://security.netapp.com/advisory/ntap-20200103-0001/ - https://seclists.org/bugtraq/2020/Jan/10 - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html - https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html - https://usn.ubuntu.com/4254-1/ - https://usn.ubuntu.com/4254-2/ - https://usn.ubuntu.com/4258-1/ - https://usn.ubuntu.com/4287-1/ - https://usn.ubuntu.com/4287-2/ - https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-40057.
CVE ID: CVE-2021-40057 Date Updated: 2024-08-04T02:27:31.783Z Date Published: 2022-03-07T13:50:03 Description: There is a heap-based and stack-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2022/3/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0870.
CVE ID: CVE-2010-0870 Date Updated: 2024-08-07T01:06:51.756Z Date Published: 2010-04-13T22:00:00 Description: Unspecified vulnerability in the Change Data Capture component in Oracle Database 9.2.0.8 and 9.2.0.8DV allows remote authenticated users to affect confidentiality and integrity, related to SYS.DBMS_CDC_PUBLISH. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.us-cert.gov/cas/techalerts/TA10-103B.html - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html - http://secunia.com/advisories/39438 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35262.
CVE ID: CVE-2022-35262 Date Updated: 2024-09-17T00:35:29.515Z Date Published: 2022-10-25T16:34:03.185603Z Description: A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_xml_file/` API. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3050.
CVE ID: CVE-2010-3050 Date Updated: 2024-08-07T02:55:46.559Z Date Published: 2017-09-25T17:00:00 Description: Cisco IOS before 12.2(33)SXI allows remote authenticated users to cause a denial of service (device reboot). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/release/notes/ol_14271/caveats_SXI_rebuilds.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12403.
CVE ID: CVE-2018-12403 Date Updated: 2024-08-05T08:38:04.796Z Date Published: 2019-02-28T18:00:00 Description: If a site is loaded over a HTTPS connection but loads a favicon resource over HTTP, the mixed content warning is not displayed to users. This vulnerability affects Firefox < 63. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2018-26/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1484753 - http://www.securityfocus.com/bid/105721 - https://usn.ubuntu.com/3801-1/ - http://www.securitytracker.com/id/1041944 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3421.
CVE ID: CVE-2013-3421 Date Updated: 2024-08-06T16:07:38.020Z Date Published: 2013-07-12T21:00:00 Description: Cross-site scripting (XSS) vulnerability in the Help index page in Cisco Secure Access Control System (ACS) allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCud75170. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3421 - https://exchange.xforce.ibmcloud.com/vulnerabilities/85622 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-16144.
CVE ID: CVE-2018-16144 Date Updated: 2024-08-05T10:17:37.656Z Date Published: 2018-09-05T21:00:00 Description: The test connection functionality in the NetAudit section of Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 is vulnerable to command injection due to improper sanitization of the rancid_password parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://knowledge.opsview.com/v5.4/docs/whats-new - https://seclists.org/fulldisclosure/2018/Sep/3 - https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities - https://knowledge.opsview.com/v5.3/docs/whats-new No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5204.
CVE ID: CVE-2017-5204 Date Updated: 2024-08-05T14:55:35.470Z Date Published: 2017-01-28T01:33:00 Description: The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print(). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1037755 - http://www.debian.org/security/2017/dsa-3775 - https://access.redhat.com/errata/RHSA-2017:1871 - https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1494526.html - http://www.securityfocus.com/bid/95852 - https://security.gentoo.org/glsa/201702-30 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5375.
CVE ID: CVE-2013-5375 Date Updated: 2024-08-06T17:06:52.400Z Date Published: 2013-11-24T18:00:00 Description: Unspecified vulnerability in IBM Java SDK 7.0.0 before SR6, 6.0.1 before SR7, 6.0.0 before SR15, and 5.0.0 before SR16 FP4 allows remote attackers to access restricted classes via unspecified vectors related to XML and XSL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg1IV51090 - https://exchange.xforce.ibmcloud.com/vulnerabilities/86901 - http://www-01.ibm.com/support/docview.wss?uid=swg21655202 - http://rhn.redhat.com/errata/RHSA-2013-1508.html - http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html - http://www-01.ibm.com/support/docview.wss?uid=swg21655201 - https://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2013 - http://rhn.redhat.com/errata/RHSA-2013-1793.html - http://rhn.redhat.com/errata/RHSA-2013-1509.html - http://rhn.redhat.com/errata/RHSA-2013-1507.html - http://secunia.com/advisories/56338 - http://www-01.ibm.com/support/docview.wss?uid=swg1IV51089 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6834.
CVE ID: CVE-2024-6834 Date Updated: 2024-08-13T21:00:07.595Z Date Published: 2024-07-17T14:44:06.283Z Description: A vulnerability in APIML Spring Cloud Gateway which leverages user privileges by unexpected signing proxied request by Zowe's client certificate. This allows access to a user to the endpoints requiring an internal client certificate without any credentials. It could lead to managing components in there and allow an attacker to handle the whole communication including user credentials. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/zowe/api-layer No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4263.
CVE ID: CVE-2011-4263 Date Updated: 2024-09-17T00:26:37.773Z Date Published: 2011-12-07T19:00:00Z Description: Cross-site scripting (XSS) vulnerability in Schneider Electric PowerChute Business Edition before 8.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jvndb.jvn.jp/jvndb/JVNDB-2011-000100 - http://jvn.jp/en/jp/JVN61695284/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-38255.
CVE ID: CVE-2022-38255 Date Updated: 2024-08-03T10:45:52.963Z Date Published: 2022-09-08T15:58:37 Description: Interview Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /interview/editQuestion.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Fright1Moch/bug_report/blob/main/vendors/janobe/interview-management-system/SQLi-1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26738.
CVE ID: CVE-2022-26738 Date Updated: 2024-08-03T05:11:44.239Z Date Published: 2022-05-26T19:01:56 Description: An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 15.5, macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. An application may be able to execute arbitrary code with kernel privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213258 - https://support.apple.com/en-us/HT213254 - https://support.apple.com/en-us/HT213257 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-44932.
CVE ID: CVE-2022-44932 Date Updated: 2024-08-03T14:01:31.343Z Date Published: 2022-12-08T00:00:00 Description: An access control issue in Tenda A18 v15.13.07.09 allows unauthenticated attackers to access the Telnet service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/TendaTelnet/readme.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41206.
CVE ID: CVE-2022-41206 Date Updated: 2024-08-03T12:35:49.562Z Date Published: 2022-10-11T00:00:00 Description: SAP BusinessObjects Business Intelligence platform (Analysis for OLAP) - versions 420, 430, allows an authenticated attacker to send user-controlled inputs when OLAP connections are created and edited in the Central Management Console. On successful exploitation, there could be a limited impact on confidentiality and integrity of the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - https://launchpad.support.sap.com/#/notes/3229425 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14840.
CVE ID: CVE-2017-14840 Date Updated: 2024-08-05T19:42:20.608Z Date Published: 2017-09-27T20:00:00 Description: TeamWork TicketPlus allows Arbitrary File Upload in updateProfile. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/42796/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-13269.
CVE ID: CVE-2017-13269 Date Updated: 2024-09-17T02:46:55.407Z Date Published: 2018-04-04T17:00:00Z Description: A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-68818034. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2018-03-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10619.
CVE ID: CVE-2017-10619 Date Updated: 2024-09-16T17:27:42.838Z Date Published: 2017-10-13T17:00:00Z Description: When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process to crash, halting or interrupting traffic from flowing through the device and triggering RG1+ (data-plane) fail-over to the secondary node. Repeated crashes of the flowd process may constitute an extended denial of service condition. This service is not enabled by default and is only supported in high-end SRX platforms. Affected releases are Juniper Networks Junos OS 12.3X48 prior to 12.3X48-D45, 15.1X49 prior to 15.1X49-D80 on SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.juniper.net/JSA10821 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1202
The MITRE ATT&CK technique T1202: Indirect Command Execution is related to the vulnerability CVE-CVE-2019-1270. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as exploitation_technique.
Provide detailed information about CVE-2018-18351.
CVE ID: CVE-2018-18351 Date Updated: 2024-08-05T11:08:21.656Z Date Published: 2018-12-11T15:00:00 Description: Lack of proper validation of ancestor frames site when sending lax cookies in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass SameSite cookie policy via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://crbug.com/833847 - https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html - https://access.redhat.com/errata/RHSA-2018:3803 - https://www.debian.org/security/2018/dsa-4352 - http://www.securityfocus.com/bid/106084 - https://security.gentoo.org/glsa/201908-18 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-17385.
CVE ID: CVE-2018-17385 Date Updated: 2024-08-05T10:47:04.318Z Date Published: 2018-09-28T00:00:00 Description: SQL Injection exists in the Social Factory 3.8.3 component for Joomla! via the radius[lat], radius[lng], or radius[radius] parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/149525/Joomla-Social-Factory-3.8.3-SQL-Injection.html - https://www.exploit-db.com/exploits/45470/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0299.
CVE ID: CVE-2018-0299 Date Updated: 2024-08-05T03:21:15.467Z Date Published: 2018-06-21T11:00:00 Description: A vulnerability in the Simple Network Management Protocol (SNMP) feature of Cisco NX-OS on the Cisco Nexus 4000 Series Switch could allow an authenticated, remote attacker to cause the device to unexpectedly reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete validation of an SNMP poll request for a specific MIB. An attacker could exploit this vulnerability by sending a specific SNMP poll request to the targeted device. An exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvg10442. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-n4k-snmp-dos - http://www.securitytracker.com/id/1041169 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6584.
CVE ID: CVE-2008-6584 Date Updated: 2024-08-07T11:34:47.118Z Date Published: 2009-04-03T18:00:00 Description: html/index.php in TorrentFlux 2.3 allows remote authenticated users to execute arbitrary code via a URL with a file containing an executable extension in the url_upload parameter, which is downloaded by TorrentFlux and can be accessed via a direct request in a html/downloads/ user directory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/44645 - http://secunia.com/advisories/29935 - https://exchange.xforce.ibmcloud.com/vulnerabilities/41925 - http://www.securityfocus.com/archive/1/491066/100/0/threaded - http://www.securityfocus.com/bid/28846 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4735.
CVE ID: CVE-2015-4735 Date Updated: 2024-08-06T06:25:21.771Z Date Published: 2015-07-16T10:00:00 Description: Unspecified vulnerability in the Enterprise Manager for Oracle Database component in Oracle Enterprise Manager Grid Control EM Base Platform 11.1.0.1, and EM DB Control 11.2.0.3 and 11.2.0.4, allows remote attackers to affect confidentiality via vectors related to RAC Management. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html - http://www.securitytracker.com/id/1032918 - http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00003.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5124.
CVE ID: CVE-2016-5124 Date Updated: 2024-08-06T00:53:48.275Z Date Published: 2016-12-15T06:31:00 Description: An issue was discovered in Open-Xchange OX App Suite before 7.8.1-rev14. Adding images from external sources to HTML editors by drag&drop can potentially lead to script code execution in the context of the active user. To exploit this, a user needs to be tricked to use an image from a specially crafted website and add it to HTML editor areas of OX App Suite, for example E-Mail Compose or OX Text. This specific attack circumvents typical XSS filters and detection mechanisms since the code is not loaded from an external service but injected locally. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.). To exploit this vulnerability, a attacker needs to convince a user to follow specific steps (social-engineering). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/137894/Open-Xchange-App-Suite-7.8.1-Cross-Site-Scripting.html - http://www.securityfocus.com/archive/1/538892/100/0/threaded - http://www.securitytracker.com/id/1036296 - http://www.securityfocus.com/bid/91775 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3796.
CVE ID: CVE-2012-3796 Date Updated: 2024-08-06T20:21:02.957Z Date Published: 2012-06-25T17:00:00 Description: Pro-face WinGP PC Runtime 3.1.00 and earlier, and ProServr.exe in Pro-face Pro-Server EX 1.30.000 and earlier, allows remote attackers to obtain sensitive information from daemon memory via a crafted packet with a certain opcode. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.hmisource.com/otasuke/news/2012/0606.html - https://www.hmisource.com/otasuke/download/update/server_ex/server_ex/Readme_E.txt - http://aluigi.org/adv/proservrex_1-adv.txt - http://ics-cert.us-cert.gov/advisories/ICSA-12-179-01 - http://www.securityfocus.com/bid/53499 - http://secunia.com/advisories/49172 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8743.
CVE ID: CVE-2020-8743 Date Updated: 2024-08-04T10:12:09.512Z Date Published: 2020-08-13T02:14:49 Description: Improper permissions in the installer for the Intel(R) Mailbox Interface driver, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00394.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41760.
CVE ID: CVE-2022-41760 Date Updated: 2024-08-03T12:49:44.007Z Date Published: 2023-12-25T00:00:00 Description: An issue was discovered in NOKIA NFM-T R19.9. Relative Path Traversal can occur under /oms1350/data/cpb/log of the Network Element Manager via the filename parameter, allowing a remote authenticated attacker to read arbitrary files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.gruppotim.it/it/footer/red-team.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-3245.
CVE ID: CVE-2017-3245 Date Updated: 2024-08-05T14:23:32.848Z Date Published: 2017-01-27T22:01:00 Description: Vulnerability in the Oracle FLEXCUBE Direct Banking component of Oracle Financial Services Applications (subcomponent: Pre-Login). Supported versions that are affected are 12.0.2 and 12.0.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Direct Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Direct Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Direct Banking accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/95606 - http://www.securitytracker.com/id/1037636 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2582.
CVE ID: CVE-2017-2582 Date Updated: 2024-08-05T13:55:06.197Z Date Published: 2018-07-26T17:00:00 Description: It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2017:3220 - https://access.redhat.com/errata/RHSA-2017:3216 - https://access.redhat.com/errata/RHSA-2017:2809 - https://access.redhat.com/errata/RHSA-2018:2740 - https://access.redhat.com/errata/RHSA-2017:3218 - https://access.redhat.com/errata/RHSA-2017:2810 - https://access.redhat.com/errata/RHSA-2018:2741 - https://access.redhat.com/errata/RHSA-2018:2742 - https://access.redhat.com/errata/RHSA-2017:2808 - https://access.redhat.com/errata/RHSA-2019:0137 - https://access.redhat.com/errata/RHSA-2017:3219 - https://access.redhat.com/errata/RHSA-2019:0139 - https://github.com/keycloak/keycloak/pull/3715/commits/0cb5ba0f6e83162d221681f47b470c3042eef237 - http://www.securitytracker.com/id/1041707 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2582 - https://access.redhat.com/errata/RHSA-2019:0136 - https://access.redhat.com/errata/RHSA-2018:2743 - https://access.redhat.com/errata/RHSA-2017:3217 - https://access.redhat.com/errata/RHSA-2017:2811 - http://www.securityfocus.com/bid/101046 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2750.
CVE ID: CVE-2022-2750 Date Updated: 2024-08-03T00:46:04.109Z Date Published: 2022-08-11T04:57:07 Description: A vulnerability, which was classified as critical, was found in SourceCodester Company Website CMS. Affected is an unknown function of the file /dashboard/add-service.php of the component Add Service Handler. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. VDB-206022 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.206022 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32802.
CVE ID: CVE-2022-32802 Date Updated: 2024-08-03T07:54:01.866Z Date Published: 2022-09-20T20:19:09 Description: A logic issue was addressed with improved checks. This issue is fixed in iOS 15.6 and iPadOS 15.6, tvOS 15.6, macOS Monterey 12.5. Processing a maliciously crafted file may lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213345 - https://support.apple.com/en-us/HT213342 - https://support.apple.com/en-us/HT213346 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-5313.
CVE ID: CVE-2020-5313 Date Updated: 2024-08-04T08:22:09.137Z Date Published: 2020-01-03T00:52:23 Description: libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html - https://github.com/python-pillow/Pillow/commit/a09acd0decd8a87ccce939d5ff65dab59e7d365b - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/ - https://usn.ubuntu.com/4272-1/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/ - https://www.debian.org/security/2020/dsa-4631 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-43858.
CVE ID: CVE-2024-43858 Date Updated: 2024-09-15T17:54:24.764Z Date Published: 2024-08-17T09:24:27.976Z Description: In the Linux kernel, the following vulnerability has been resolved: jfs: Fix array-index-out-of-bounds in diFree No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/55b732c8b09b41148eaab2fa8e31b0af47671e00 - https://git.kernel.org/stable/c/9b3a4345957f5372041bc4f59de322f62653e862 - https://git.kernel.org/stable/c/538a27c8048f081a5ddd286f886eb986fbbc7f80 - https://git.kernel.org/stable/c/63f7fdf733add82f126ea00e2e48f6eba15ac4b9 - https://git.kernel.org/stable/c/8d8f9a477de0d7962342eedf2a599215b7c63d28 - https://git.kernel.org/stable/c/ff14eadc278663cac69d57d3ca7fb2f394e1f8a7 - https://git.kernel.org/stable/c/6aa6892a90a5a7fabffe5692ab9f06a7a46c6e42 - https://git.kernel.org/stable/c/f73f969b2eb39ad8056f6c7f3a295fa2f85e313a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3870.
CVE ID: CVE-2010-3870 Date Updated: 2024-08-07T03:26:11.478Z Date Published: 2010-11-12T20:00:00 Description: The utf8_decode function in PHP before 5.3.4 does not properly handle non-shortest form UTF-8 encoding and ill-formed subsequences in UTF-8 data, which makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2010/11/02/11 - http://www.vupen.com/english/advisories/2011/0077 - http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html - http://secunia.com/advisories/42812 - http://marc.info/?l=bugtraq&m=133469208622507&w=2 - http://www.openwall.com/lists/oss-security/2010/11/02/2 - http://www.redhat.com/support/errata/RHSA-2011-0195.html - http://www.openwall.com/lists/oss-security/2010/11/02/4 - http://www.securitytracker.com/id?1024797 - http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html - http://bugs.php.net/bug.php?id=49687 - http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf - http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html - http://www.ubuntu.com/usn/USN-1042-1 - http://www.openwall.com/lists/oss-security/2010/11/02/6 - http://www.redhat.com/support/errata/RHSA-2010-0919.html - http://bugs.php.net/bug.php?id=48230 - http://www.vupen.com/english/advisories/2011/0021 - http://www.php.net/ChangeLog-5.php - http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html - http://marc.info/?l=bugtraq&m=133469208622507&w=2 - http://www.openwall.com/lists/oss-security/2010/11/02/1 - http://secunia.com/advisories/42410 - http://www.mandriva.com/en/security/advisories?name=MDVSA-2010:224 - http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html - http://www.openwall.com/lists/oss-security/2010/11/03/1 - http://svn.php.net/viewvc?view=revision&revision=304959 - http://www.vupen.com/english/advisories/2011/0020 - http://www.openwall.com/lists/oss-security/2010/11/02/8 - http://www.securityfocus.com/bid/44605 - http://us2.php.net/manual/en/function.utf8-decode.php#83935 - http://www.acunetix.com/blog/web-security-articles/security-risks-associated-with-utf8_decode/ - http://www.vupen.com/english/advisories/2010/3081 - http://support.apple.com/kb/HT4581 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6478.
CVE ID: CVE-2008-6478 Date Updated: 2024-08-07T11:34:46.341Z Date Published: 2009-03-16T19:00:00 Description: Cross-site request forgery (CSRF) vulnerability in the file manager in the VZPP web interface for Parallels Virtuozzo 365.6.swsoft (build 4.0.0-365.6.swsoft) and 25.4.swsoft (build 3.0.0-25.4.swsoft) allows remote attackers to create and delete arbitrary files as the administrator via a link or IMG tag to (1) create-file and (2) list-control in vz/cp/vzdir/infrman/envs/files/; or modify system configuration via the path parameter to vz/cp/vzdir/infrman/envs/files/index. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/44395 - http://www.securityfocus.com/archive/1/490409/100/0/threaded - http://px.dynalias.org/files/virtuozzo_overwrite.html.txt - http://secunia.com/advisories/29675 - https://exchange.xforce.ibmcloud.com/vulnerabilities/41640 - http://www.securityfocus.com/bid/28589 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30877.
CVE ID: CVE-2023-30877 Date Updated: 2024-09-25T16:43:15.569Z Date Published: 2023-08-17T08:30:23.774Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Maxim Glazunov XML for Google Merchant Center plugin <= 3.0.1 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/xml-for-google-merchant-center/wordpress-xml-for-google-merchant-center-plugin-3-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4467.
CVE ID: CVE-2014-4467 Date Updated: 2024-08-06T11:20:26.194Z Date Published: 2015-01-30T11:00:00 Description: WebKit, as used in Apple iOS before 8.1.3, does not properly determine scrollbar boundaries during the rendering of FRAME elements, which allows remote attackers to spoof the UI via a crafted web site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/HT204245 - http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28663.
CVE ID: CVE-2023-28663 Date Updated: 2024-08-02T13:43:23.665Z Date Published: 2023-03-22T00:00:00 Description: The Formidable PRO2PDF WordPress Plugin, version < 3.11, is affected by an authenticated SQL injection vulnerability in the ‘fieldmap’ parameter in the fpropdf_export_file action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2023-2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-9541.
CVE ID: CVE-2015-9541 Date Updated: 2024-08-06T08:51:05.319Z Date Published: 2020-01-24T21:53:41 Description: Qt through 5.14 allows an exponential XML entity expansion attack via a crafted SVG document that is mishandled in QXmlStreamReader, a related issue to CVE-2003-1564. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugreports.qt.io/browse/QTBUG-47417 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2PT6327C64Q4RBFRWUSBKCG7SVGBWU5W/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZMMF4OEJAZRVKVXNO7IZWLEZVQGJN6G/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-20087.
CVE ID: CVE-2024-20087 Date Updated: 2024-09-03T14:18:57.075Z Date Published: 2024-09-02T02:07:34.765Z Description: In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08932916; Issue ID: MSV-1550. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/September-2024 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-9301.
CVE ID: CVE-2024-9301 Date Updated: 2024-09-27T18:59:31.078Z Date Published: 2024-09-27T17:41:49.445Z Description: A path traversal issue in E2Nest prior to commit 8a41948e553c89c56b14410c6ed395e9cfb9250a No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2024-004.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8573.
CVE ID: CVE-2018-8573 Date Updated: 2024-08-05T07:02:25.938Z Date Published: 2018-11-14T01:00:00 Description: A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Microsoft Word, Office 365 ProPlus, Microsoft Office. This CVE ID is unique from CVE-2018-8539. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/105836 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8573 - http://www.securitytracker.com/id/1042114 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-31432.
CVE ID: CVE-2023-31432 Date Updated: 2024-08-02T14:53:30.665Z Date Published: 2023-08-01T23:58:59.015Z Description: Through manipulation of passwords or other variables, using commands such as portcfgupload, configupload, license, myid, a non-privileged user could obtain root privileges in Brocade Fabric OS versions before Brocade Fabric OS v9.1.1c and v9.2.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.broadcom.com/external/content/SecurityAdvisories/0/22385 - https://security.netapp.com/advisory/ntap-20230908-0007/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-29021.
CVE ID: CVE-2024-29021 Date Updated: 2024-08-02T01:03:51.554Z Date Published: 2024-04-18T14:43:33.770Z Description: Judge0 is an open-source online code execution system. The default configuration of Judge0 leaves the service vulnerable to a sandbox escape via Server Side Request Forgery (SSRF). This allows an attacker with sufficient access to the Judge0 API to obtain unsandboxed code execution as root on the target machine. This vulnerability is fixed in 1.13.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/judge0/judge0/security/advisories/GHSA-q7vg-26pg-v5hr - https://github.com/judge0/judge0/blob/ad66f77b131dbbebf2b9ff8083dca9a68680b3e5/app/jobs/isolate_job.rb#L203-L230 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2738.
CVE ID: CVE-2011-2738 Date Updated: 2024-08-06T23:08:23.911Z Date Published: 2011-09-17T10:00:00 Description: Multiple unspecified vulnerabilities in Cisco Unified Service Monitor before 8.6, as used in Unified Operations Manager before 8.6 and CiscoWorks LAN Management Solution 3.x and 4.x before 4.1; and multiple EMC Ionix products including Application Connectivity Monitor (Ionix ACM) 2.3 and earlier, Adapter for Alcatel-Lucent 5620 SAM EMS (Ionix ASAM) 3.2.0.2 and earlier, IP Management Suite (Ionix IP) 8.1.1.1 and earlier, and other Ionix products; allow remote attackers to execute arbitrary code via crafted packets to TCP port 9002, aka Bug IDs CSCtn42961 and CSCtn64922, related to a buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/46052 - http://www.securitytracker.com/id?1026048 - http://secunia.com/advisories/46053 - http://secunia.com/advisories/45979 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b9351f.shtml - http://www.osvdb.org/75442 - https://exchange.xforce.ibmcloud.com/vulnerabilities/69828 - http://secunia.com/advisories/46016 - http://www.securityfocus.com/bid/49627 - http://www.securityfocus.com/bid/49644 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b9351e.shtml - http://www.securitytracker.com/id?1026059 - http://www.securitytracker.com/id?1026047 - http://www.securitytracker.com/id?1026046 - http://www.securityfocus.com/archive/1/519646/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39251.
CVE ID: CVE-2023-39251 Date Updated: 2024-08-02T18:02:06.678Z Date Published: 2023-12-22T17:55:18.705Z Description: Dell BIOS contains an Improper Input Validation vulnerability. A local malicious user with high privileges could potentially exploit this vulnerability in order to corrupt memory on the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000217707/dsa-2023-342 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38768.
CVE ID: CVE-2024-38768 Date Updated: 2024-08-07T14:42:59.755Z Date Published: 2024-08-01T20:58:29.114Z Description: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Webangon The Pack Elementor addons allows PHP Local File Inclusion, Path Traversal.This issue affects The Pack Elementor addons: from n/a through 2.0.8.6. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/the-pack-addon/wordpress-the-pack-elementor-addons-plugin-2-0-8-6-local-file-inclusion-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31580.
CVE ID: CVE-2021-31580 Date Updated: 2024-08-03T23:03:33.574Z Date Published: 2021-07-22T18:27:18 Description: The restricted shell provided by Akkadian Provisioning Manager Engine (PME) can be bypassed by switching the OpenSSH channel from `shell` to `exec` and providing the ssh client a single execution parameter. This issue was resolved in Akkadian OVA appliance version 3.0 (and later), Akkadian Provisioning Manager 5.0.2 (and later), and Akkadian Appliance Manager 3.3.0.314-4a349e0 (and later). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.rapid7.com/blog/post/2021/06/08/akkadian-provisioning-manager-multiple-vulnerabilities-disclosure/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-40042.
CVE ID: CVE-2021-40042 Date Updated: 2024-08-04T02:27:31.377Z Date Published: 2022-01-31T15:57:35 Description: There is a release of invalid pointer vulnerability in some Huawei products, successful exploit may cause the process and service abnormal. Affected product versions include: CloudEngine 12800 V200R019C10SPC800, V200R019C10SPC900; CloudEngine 5800 V200R019C10SPC800, V200R020C00SPC600; CloudEngine 6800 versions V200R019C10SPC800, V200R019C10SPC900, V200R020C00SPC600, V300R020C00SPC200; CloudEngine 7800 V200R019C10SPC800. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220112-01-invalid-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4660.
CVE ID: CVE-2008-4660 Date Updated: 2024-08-07T10:24:20.570Z Date Published: 2008-10-21T22:00:00 Description: SQL injection vulnerability in the M1 Intern (m1_intern) 1.0.0 extension for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/45999 - http://www.vupen.com/english/advisories/2008/2870 - http://typo3.org/teams/security/security-bulletins/typo3-20081020-1/ - http://www.securityfocus.com/bid/31845 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8862.
CVE ID: CVE-2016-8862 Date Updated: 2024-08-06T02:35:01.451Z Date Published: 2017-02-15T19:00:00 Description: The AcquireMagickMemory function in MagickCore/memory.c in ImageMagick before 7.0.3.3 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2016/10/20/3 - https://blogs.gentoo.org/ago/2016/10/17/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c/ - https://bugzilla.redhat.com/show_bug.cgi?id=1387135 - https://github.com/ImageMagick/ImageMagick/issues/271 - http://www.securityfocus.com/bid/93794 - http://www.openwall.com/lists/oss-security/2016/10/20/2 - http://www.debian.org/security/2016/dsa-3726 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5162.
CVE ID: CVE-2017-5162 Date Updated: 2024-08-05T14:55:35.398Z Date Published: 2017-02-13T21:00:00 Description: An issue was discovered in BINOM3 Universal Multifunctional Electric Power Quality Meter. Lack of authentication for remote service gives access to application set up and configuration. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-17-031-01A - http://www.securityfocus.com/bid/93028 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3949.
CVE ID: CVE-2018-3949 Date Updated: 2024-09-17T01:01:34.084Z Date Published: 2018-12-01T03:00:00Z Description: An exploitable information disclosure vulnerability exists in the HTTP server functionality of the TP-Link TL-R600VPN. A specially crafted URL can cause a directory traversal, resulting in the disclosure of sensitive system files. An attacker can send either an unauthenticated or an authenticated web request to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0618 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-25231.
CVE ID: CVE-2021-25231 Date Updated: 2024-08-03T19:56:11.054Z Date Published: 2021-02-04T19:36:40 Description: An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about a specific hotfix history file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://success.trendmicro.com/solution/000284202 - https://success.trendmicro.com/solution/000284205 - https://success.trendmicro.com/solution/000284206 - https://www.zerodayinitiative.com/advisories/ZDI-21-106/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34055.
CVE ID: CVE-2024-34055 Date Updated: 2024-08-02T02:42:59.878Z Date Published: 2024-06-05T00:00:00 Description: Cyrus IMAP before 3.8.3 and 3.10.x before 3.10.0-rc1 allows authenticated attackers to cause unbounded memory allocation by sending many LITERALs in a single command. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/cyrusimap/cyrus-imapd/commit/ef9e4e8314d6a06f2269af0ccf606894cc3fe489 - https://www.cyrusimap.org/imap/download/release-notes/3.8/x/3.8.3.html - https://www.cyrusimap.org/dev/imap/download/release-notes/3.10/x/3.10.0-rc1.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJZQAE3XC2GBCE5KSTWJ5A6QYANFWGFB/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVZHUZDU4MGTTZJRNACTMSKXLNMMRLJ6/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-25097.
CVE ID: CVE-2019-25097 Date Updated: 2024-08-05T03:00:19.235Z Date Published: 2023-01-05T07:58:53.396Z Description: A vulnerability was found in soerennb eXtplorer up to 2.1.12 and classified as critical. Affected by this issue is some unknown functionality of the component Directory Content Handler. The manipulation leads to path traversal. Upgrading to version 2.1.13 is able to address this issue. The name of the patch is b8fcb888f4ff5e171c16797a4b075c6c6f50bf46. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217436. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.217436 - https://vuldb.com/?ctiid.217436 - https://github.com/soerennb/extplorer/commit/b8fcb888f4ff5e171c16797a4b075c6c6f50bf46 - https://github.com/soerennb/extplorer/releases/tag/v2.1.13 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3600.
CVE ID: CVE-2018-3600 Date Updated: 2024-08-05T04:50:30.229Z Date Published: 2018-02-09T22:00:00 Description: A external entity processing information disclosure (XXE) vulnerability in Trend Micro Control Manager 6.0 could allow a remote attacker to disclose sensitive information on vulnerable installations. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-18-111/ - https://success.trendmicro.com/solution/1119158 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0346.
CVE ID: CVE-2023-0346 Date Updated: 2024-08-02T05:10:55.156Z Date Published: 2023-03-13T20:28:00.701Z Description: Akuvox E11 cloud login is performed through an unencrypted HTTP connection. An attacker could gain access to the Akuvox cloud and device if the MAC address of a device if known. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4751.
CVE ID: CVE-2023-4751 Date Updated: 2024-08-02T07:38:00.594Z Date Published: 2023-09-03T18:54:47.173Z Description: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1331. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/db7be8d6-6cb7-4ae5-9c4e-805423afa378 - https://github.com/vim/vim/commit/e1121b139480f53d1b06f84f3e4574048108fa0b - https://support.apple.com/kb/HT213984 - http://seclists.org/fulldisclosure/2023/Oct/24 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10625.
CVE ID: CVE-2019-10625 Date Updated: 2024-08-04T22:32:00.696Z Date Published: 2020-04-16T10:46:07 Description: Out of bound access in diag services when DCI command buffer reallocation is not done properly with required capacity in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, QCS605, Rennell, SC8180X, SDM429W, SDM710, SDX55, SM7150, SM8150 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5056.
CVE ID: CVE-2012-5056 Date Updated: 2024-08-06T20:50:18.408Z Date Published: 2014-06-04T14:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in ownCloud Server before 4.0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) readyCallback parameter to apps/files_odfviewer/src/webodf/webodf/flashput/PUT.swf, the (2) root parameter to apps/gallery/templates/index.php, or a (3) malformed query to lib/db.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://owncloud.org/about/security/advisories/CVE-2012-5056/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17435.
CVE ID: CVE-2017-17435 Date Updated: 2024-08-05T20:51:31.399Z Date Published: 2017-12-07T00:00:00 Description: An issue was discovered in the software on Vaultek Gun Safe VT20i products, aka BlueSteal. An attacker can remotely unlock any safe in this product line without a valid PIN code. Even though the phone application requires it and there is a field to supply the PIN code in an authorization request, the safe does not check the PIN code, so an attacker can obtain authorization using any value. Once an attacker sees the Bluetooth Low Energy (BLE) advertisement for the safe, they need only to write a BLE characteristic to enable notifications, and send a crafted getAuthor packet that returns a temporary key, and an unlock packet including that temporary key. The safe then opens after the unlock packet is processed, with no verification of PIN or other credentials. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vaulteksafe.com/index.php/cve-2017-17435/ - https://www.twosixlabs.com/bluesteal-popping-gatt-safes/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0853.
CVE ID: CVE-2015-0853 Date Updated: 2024-08-06T04:26:11.028Z Date Published: 2017-09-06T21:00:00 Description: svn-workbench 1.6.2 and earlier on a system with xeyes installed allows local users to execute arbitrary commands by using the "Command Shell" menu item while in the directory trunk/$(xeyes). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://pysvn.tigris.org/issues/show_bug.cgi?id=202 - https://bugs.launchpad.net/ubuntu/+source/svn-workbench/+bug/1495268 - https://bugzilla.redhat.com/show_bug.cgi?id=1262928 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798863 - http://www.openwall.com/lists/oss-security/2015/09/13/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43167.
CVE ID: CVE-2022-43167 Date Updated: 2024-08-03T13:26:02.747Z Date Published: 2022-10-28T00:00:00 Description: A stored cross-site scripting (XSS) vulnerability in the Users Alerts feature (/index.php?module=users_alerts/users_alerts) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking "Add". No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/anhdq201/rukovoditel/issues/7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6576.
CVE ID: CVE-2015-6576 Date Updated: 2024-08-06T07:22:22.274Z Date Published: 2017-10-02T18:00:00 Description: Bamboo 2.2 before 5.8.5 and 5.9.x before 5.9.7 allows remote attackers with access to the Bamboo web interface to execute arbitrary Java code via an unspecified resource. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/536747/100/0/threaded - https://confluence.atlassian.com/x/Hw7RLg - https://jira.atlassian.com/browse/BAM-16439 - http://packetstormsecurity.com/files/134065/Bamboo-Java-Code-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50829.
CVE ID: CVE-2023-50829 Date Updated: 2024-09-13T14:56:35.022Z Date Published: 2023-12-21T17:10:51.231Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aerin Loan Repayment Calculator and Application Form allows Stored XSS.This issue affects Loan Repayment Calculator and Application Form: from n/a through 2.9.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/quick-interest-slider/wordpress-loan-repayment-calculator-and-application-form-plugin-2-9-3-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4203.
CVE ID: CVE-2017-4203 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4966.
CVE ID: CVE-2018-4966 Date Updated: 2024-08-05T05:18:27.085Z Date Published: 2018-07-09T19:00:00 Description: Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/104172 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html - http://www.securitytracker.com/id/1040920 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13350.
CVE ID: CVE-2018-13350 Date Updated: 2024-08-05T09:00:35.078Z Date Published: 2018-11-27T21:00:00 Description: SQL injection in logtable.php in TerraMaster TOS version 3.1.03 allows attackers to execute SQL queries via the "Event" parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.securityevaluators.com/vulnerabilities-in-terramaster-tos-3-1-03-fb99cf88b86a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0845.
CVE ID: CVE-2013-0845 Date Updated: 2024-08-06T14:41:47.316Z Date Published: 2013-12-07T21:00:00 Description: libavcodec/alsdec.c in FFmpeg before 1.0.4 allows remote attackers to have an unspecified impact via a crafted block length, which triggers an out-of-bounds write. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=0ceca269b66ec12a23bf0907bd2c220513cdbf16 - http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=6df0d3e2916c223dbe4262bf1b876dff1cb3f980 - http://www.debian.org/security/2014/dsa-2855 - http://www.ffmpeg.org/security.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29430.
CVE ID: CVE-2021-29430 Date Updated: 2024-08-03T22:02:51.883Z Date Published: 2021-04-15T20:35:19 Description: Sydent is a reference Matrix identity server. Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to memory exhaustion and denial of service. Sydent also does not limit response size for requests it makes to remote Matrix homeservers. A malicious homeserver could return a very large response, again leading to memory exhaustion and denial of service. This affects any server which accepts registration requests from untrusted clients. This issue has been patched by releases 89071a1, 0523511, f56eee3. As a workaround request sizes can be limited in an HTTP reverse-proxy. There are no known workarounds for the problem with overlarge responses. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pypi.org/project/matrix-sydent/ - https://github.com/matrix-org/sydent/security/advisories/GHSA-wmg4-8cp2-hpg9 - https://github.com/matrix-org/sydent/commit/89071a1a754c69a50deac89e6bb74002d4cda19d - https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7 - https://github.com/matrix-org/sydent/commit/f56eee315b6c44fdd9f6aa785cc2ec744a594428 - https://github.com/matrix-org/sydent/releases/tag/v2.3.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0785.
CVE ID: CVE-2019-0785 Date Updated: 2024-08-04T17:58:59.210Z Date Published: 2019-07-15T18:34:31 Description: A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP failover server, aka 'Windows DHCP Server Remote Code Execution Vulnerability'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0785 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-4028.
CVE ID: CVE-2009-4028 Date Updated: 2024-08-07T06:45:50.954Z Date Published: 2009-11-30T17:00:00 Description: The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510 - http://www.redhat.com/support/errata/RHSA-2010-0109.html - http://www.vupen.com/english/advisories/2010/1107 - http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html - http://www.openwall.com/lists/oss-security/2009/11/19/3 - http://lists.mysql.com/commits/87446 - http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html - http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html - http://marc.info/?l=oss-security&m=125881733826437&w=2 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940 - http://bugs.mysql.com/47320 - http://www.openwall.com/lists/oss-security/2009/11/23/16 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5507.
CVE ID: CVE-2023-5507 Date Updated: 2024-08-02T07:59:44.739Z Date Published: 2023-11-07T11:01:45.640Z Description: The ImageMapper plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'imagemap' shortcode in versions up to, and including, 1.2.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/a6e687e9-6ffe-4457-8d57-3c03f657eb74?source=cve - https://plugins.trac.wordpress.org/browser/imagemapper/tags/1.2.6/imagemapper.php#L402 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1864.
CVE ID: CVE-2020-1864 Date Updated: 2024-08-04T06:53:59.881Z Date Published: 2020-03-20T14:58:57 Description: Some Huawei products have a security vulnerability due to improper authentication. A remote attacker needs to obtain some information and forge the peer device to send specific packets to the affected device. Due to the improper implementation of the authentication function, attackers can exploit the vulnerability to connect to affected devices and execute a series of commands.Affected product versions include:Secospace AntiDDoS8000 versions V500R001C00,V500R001C20,V500R001C60,V500R005C00. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200318-01-authentication-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14184.
CVE ID: CVE-2017-14184 Date Updated: 2024-09-16T16:43:11.051Z Date Published: 2017-12-15T21:00:00Z Description: An Information Disclosure vulnerability in Fortinet FortiClient for Windows 5.6.0 and below versions, FortiClient for Mac OSX 5.6.0 and below versions and FortiClient SSLVPN Client for Linux 4.4.2334 and below versions allows regular users to see each other's VPN authentication credentials due to improperly secured storage locations. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/advisory/FG-IR-17-214 - http://www.securityfocus.com/bid/102123 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7575.
CVE ID: CVE-2018-7575 Date Updated: 2024-08-05T06:31:04.547Z Date Published: 2019-04-24T20:44:16 Description: Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The type of exploitation is context-dependent. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-004.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1548.
CVE ID: CVE-2017-1548 Date Updated: 2024-09-17T03:38:40.460Z Date Published: 2017-12-11T21:00:00Z Description: IBM Sterling File Gateway 2.2 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 131288. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/131288 - http://www.ibm.com/support/docview.wss?uid=swg22010738 - http://www.securityfocus.com/bid/102187 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21887.
CVE ID: CVE-2021-21887 Date Updated: 2024-08-03T18:30:22.641Z Date Published: 2021-12-22T18:06:36 Description: A stack-based buffer overflow vulnerability exists in the Web Manager SslGenerateCSR functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1331 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43068.
CVE ID: CVE-2021-43068 Date Updated: 2024-08-04T03:47:13.493Z Date Published: 2021-12-09T09:38:37 Description: A improper authentication in Fortinet FortiAuthenticator version 6.4.0 allows user to bypass the second factor of authentication via a RADIUS login portal. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/advisory/FG-IR-21-212 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-9327.
CVE ID: CVE-2018-9327 Date Updated: 2024-08-05T07:17:51.827Z Date Published: 2018-04-07T21:00:00 Description: Etherpad 1.5.x and 1.6.x before 1.6.4 allows an attacker to execute arbitrary code on the server. The instance has to be configured to use a document database (DirtyDB, CouchDB, MongoDB, or RethinkDB). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://blog.etherpad.org/2018/04/07/important-release-1-6-4/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8954.
CVE ID: CVE-2014-8954 Date Updated: 2024-08-06T13:33:12.786Z Date Published: 2014-11-17T16:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in phpSound 1.0.5 allow remote attackers to inject arbitrary web script or HTML via the (1) Title or (2) Description fields in a playlist or the (3) filter parameter in an explore action to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/71172 - http://www.exploit-db.com/exploits/35198 - http://packetstormsecurity.com/files/129104/phpSound-Music-Sharing-Platform-1.0.5-Cross-Site-Scripting.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-3647.
CVE ID: CVE-2017-3647 Date Updated: 2024-08-05T14:30:58.964Z Date Published: 2017-08-08T15:00:00 Description: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2017:2787 - http://www.securitytracker.com/id/1038928 - https://access.redhat.com/errata/RHSA-2017:2886 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html - http://www.securityfocus.com/bid/99796 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4609.
CVE ID: CVE-2012-4609 Date Updated: 2024-09-16T20:28:03.176Z Date Published: 2012-12-05T11:00:00Z Description: The web interface in EMC RSA NetWitness Informer before 2.0.5.6 allows remote attackers to conduct clickjacking attacks via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://archives.neohapsis.com/archives/bugtraq/2012-12/0002.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0161.
CVE ID: CVE-2019-0161 Date Updated: 2024-08-04T17:44:14.759Z Date Published: 2019-03-27T19:23:44 Description: Stack overflow in XHCI for EDK II may allow an unauthenticated user to potentially enable denial of service via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://edk2-docs.gitbooks.io/security-advisory/content/xhci-stack-local-stack-overflow.html - http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00019.html - http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00046.html - https://access.redhat.com/errata/RHSA-2019:2125 - https://access.redhat.com/errata/RHSA-2019:2437 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/ - https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2651.
CVE ID: CVE-2024-2651 Date Updated: 2024-10-03T06:23:18.818Z Date Published: 2024-05-09T01:38:31.730Z Description: An issue has been discovered in GitLab CE/EE affecting all versions before 16.9.7, all versions starting from 16.10 before 16.10.5, all versions starting from 16.11 before 16.11.2. It was possible for an attacker to cause a denial of service using maliciously crafted markdown content. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab/-/issues/450830 - https://hackerone.com/reports/2408619 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7552.
CVE ID: CVE-2020-7552 Date Updated: 2024-08-04T09:33:19.511Z Date Published: 2020-11-19T21:07:16 Description: A CWE-787: Out-of-bounds Write vulnerability exists in IGSS Definition (Def.exe) version 14.0.0.20247, that could cause Remote Code Execution when malicious CGF (Configuration Group File) file is imported to IGSS Definition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.se.com/ww/en/download/document/SEVD-2020-315-03/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-9126.
CVE ID: CVE-2015-9126 Date Updated: 2024-09-16T22:40:46.330Z Date Published: 2018-04-18T14:00:00Z Description: In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 835, SD 845, SD 850, and SDX20, possible buffer overflow when processing 1X circuit service message. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2018-04-01 - http://www.securityfocus.com/bid/103671 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46306.
CVE ID: CVE-2023-46306 Date Updated: 2024-09-12T18:22:55.873Z Date Published: 2023-10-22T00:00:00 Description: The web administration interface in NetModule Router Software (NRSW) 4.6 before 4.6.0.106 and 4.8 before 4.8.0.101 executes an OS command constructed with unsanitized user input: shell metacharacters in the /admin/gnssAutoAlign.php device_id parameter. This occurs because another thread can be started before the trap that triggers the cleanup function. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. NOTE: this is different from CVE-2023-0861 and CVE-2023-0862, which were fixed in version 4.6.0.105. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://share.netmodule.com/public/system-software/4.8/4.8.0.101/NRSW-RN-4.8.0.101.pdf - https://share.netmodule.com/public/system-software/4.6/4.6.0.106/NRSW-RN-4.6.0.106.pdf - https://pentest.blog/advisory-netmodule-router-software-race-condition-leads-to-remote-code-execution/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3913.
CVE ID: CVE-2018-3913 Date Updated: 2024-08-05T04:57:24.429Z Date Published: 2018-09-21T15:00:00 Description: An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 32 bytes. An attacker can send an arbitrarily long "accessKey" value in order to exploit this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19921.
CVE ID: CVE-2019-19921 Date Updated: 2024-08-05T02:32:09.419Z Date Published: 2020-02-12T00:00:00 Description: runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/opencontainers/runc/releases - https://security-tracker.debian.org/tracker/CVE-2019-19921 - https://github.com/opencontainers/runc/issues/2197 - https://github.com/opencontainers/runc/pull/2190 - http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00018.html - https://access.redhat.com/errata/RHSA-2020:0688 - https://access.redhat.com/errata/RHSA-2020:0695 - https://security.gentoo.org/glsa/202003-21 - https://usn.ubuntu.com/4297-1/ - https://lists.debian.org/debian-lts-announce/2023/03/msg00023.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DHGVGGMKGZSJ7YO67TGGPFEHBYMS63VF/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FYVE3GB4OG3BNT5DLQHYO4M5SXX33AQ5/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6BF24VCZRFTYBTT3T7HDZUOTKOTNPLZ/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ANUGDBJ7NBUMSUFZUSKU3ZMQYZ2Z3STN/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNB2UEDIIJCRQW4WJLZOPQJZXCVSXMLD/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8434.
CVE ID: CVE-2015-8434 Date Updated: 2024-08-06T08:20:41.907Z Date Published: 2015-12-10T02:00:00 Description: Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 - https://helpx.adobe.com/security/products/flash-player/apsb15-32.html - http://www.securityfocus.com/bid/78715 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - https://www.exploit-db.com/exploits/39072/ - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html - http://www.securitytracker.com/id/1034318 - https://security.gentoo.org/glsa/201601-03 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.