instruction stringlengths 49 63 ⌀ | input stringlengths 0 69 | output stringlengths 221 18.7k |
|---|---|---|
Provide detailed information about CVE-2020-1229. | CVE ID: CVE-2020-1229
Date Updated: 2024-08-04T06:31:59.949Z
Date Published: 2020-06-09T19:43:31
Description:
A security feature bypass vulnerability exists in Microsoft Outlook when Office fails to enforce security settings configured on a system, aka 'Microsoft Outlook Security Feature Bypass Vulnerability'.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1229
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-6497. | CVE ID: CVE-2024-6497
Date Updated: 2024-08-09T18:47:36.343Z
Date Published: 2024-07-20T08:38:23.965Z
Description:
The SEO Plugin by Squirrly SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 12.3.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/bb3aa613-8f34-4d96-8ddf-41fcdcf65c59?source=cve
- https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Api.php#L267
- https://wordpress.org/plugins/squirrly-seo/#developers
- https://plugins.trac.wordpress.org/changeset/3121853/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-19433. | CVE ID: CVE-2018-19433
Date Updated: 2024-08-05T11:37:11.213Z
Date Published: 2018-11-22T05:00:00
Description:
ShowDoc 2.4.1 has XSS via the lang parameter because install/database.php mishandles the $cur_lang value.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/star7th/showdoc/issues/392
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-14081. | CVE ID: CVE-2019-14081
Date Updated: 2024-08-05T00:12:42.399Z
Date Published: 2020-03-05T08:56:17
Description:
Buffer Over-read when WLAN module gets a WMI message for SAR limits with invalid number of limits to be enforced in Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in APQ8098, IPQ8074, MSM8998, QCA8081, QCN7605, QCS605, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SM8150, SXR1130
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-16999. | CVE ID: CVE-2018-16999
Date Updated: 2024-08-05T10:39:59.391Z
Date Published: 2018-09-13T16:00:00
Description:
Netwide Assembler (NASM) 2.14rc15 has an invalid memory write (segmentation fault) in expand_smacro in preproc.c, which allows attackers to cause a denial of service via a crafted input file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.nasm.us/show_bug.cgi?id=3392508
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-4537. | CVE ID: CVE-2017-4537
Date Updated: 2018-03-16T13:57:01
Date Published: 2018-03-16T14:04:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-14040. | CVE ID: CVE-2020-14040
Date Updated: 2024-08-04T12:32:14.681Z
Date Published: 2020-06-17T19:22:31
Description:
The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://groups.google.com/forum/#%21topic/golang-announce/bXVeAmGOqz0
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-1025. | CVE ID: CVE-2008-1025
Date Updated: 2024-08-07T08:08:57.167Z
Date Published: 2008-04-17T17:00:00
Description:
Cross-site scripting (XSS) vulnerability in Apple WebKit, as used in Safari before 3.1.1, allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a colon in the hostname portion.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://support.apple.com/kb/HT1467
- http://secunia.com/advisories/29846
- http://www.kb.cert.org/vuls/id/705529
- http://lists.apple.com/archives/security-announce/2008/Apr/msg00001.html
- http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
- http://www.vupen.com/english/advisories/2008/2094/references
- http://www.vupen.com/english/advisories/2008/1250/references
- http://www.securityfocus.com/bid/28814
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41862
- http://www.securitytracker.com/id?1019869
- http://secunia.com/advisories/31074
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-3010. | CVE ID: CVE-2024-3010
Date Updated: 2024-08-23T18:30:19.870Z
Date Published: 2024-03-27T23:31:05.075Z
Description:
A vulnerability was found in Tenda FH1205 2.0.0.7(775) and classified as critical. Affected by this issue is the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258296. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.258296
- https://vuldb.com/?ctiid.258296
- https://vuldb.com/?submit.301489
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formSetCfm.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-44732. | CVE ID: CVE-2021-44732
Date Updated: 2024-08-04T04:32:12.280Z
Date Published: 2021-12-20T00:00:00
Description:
Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/ARMmbed/mbedtls/releases
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2021-12
- https://bugs.gentoo.org/829660
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.12
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.28.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v3.1.0
- https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-34706. | CVE ID: CVE-2024-34706
Date Updated: 2024-08-02T02:59:21.978Z
Date Published: 2024-05-13T16:02:28.694Z
Description:
Valtimo is an open source business process and case management platform. When opening a form in Valtimo, the access token (JWT) of the user is exposed to `api.form.io` via the the `x-jwt-token` header. An attacker can retrieve personal information from this token, or use it to execute requests to the Valtimo REST API on behalf of the logged-in user. This issue is caused by a misconfiguration of the Form.io component.
The following conditions have to be met in order to perform this attack: An attacker needs to have access to the network traffic on the `api.form.io` domain; the content of the `x-jwt-token` header is logged or otherwise available to the attacker; an attacker needs to have network access to the Valtimo API; and an attacker needs to act within the time-to-live of the access token. The default TTL in Keycloak is 5 minutes.
Versions 10.8.4, 11.1.6 and 11.2.2 have been patched.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/valtimo-platform/valtimo-frontend-libraries/security/advisories/GHSA-xcp4-62vj-cq3r
- https://github.com/valtimo-platform/valtimo-frontend-libraries/commit/1aaba5ef5750dafebbc7476fb08bf2375a25f19e
- https://github.com/valtimo-platform/valtimo-frontend-libraries/commit/8c2dbf2a41180d2b0358d878290e4d37168f0fb6
- https://github.com/valtimo-platform/valtimo-frontend-libraries/commit/d65e05fd2784bd4a628778b34a5b79ce2f0cef8c
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-13948. | CVE ID: CVE-2017-13948
Date Updated: 2023-09-14T18:41:18.538Z
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-16430. | CVE ID: CVE-2018-16430
Date Updated: 2024-08-05T10:24:32.039Z
Date Published: 2018-09-04T00:00:00
Description:
GNU Libextractor through 1.7 has an out-of-bounds read vulnerability in EXTRACTOR_zip_extract_method() in zip_extractor.c.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.debian.org/security/2018/dsa-4290
- http://www.securityfocus.com/bid/105254
- https://lists.debian.org/debian-lts-announce/2018/09/msg00011.html
- https://gnunet.org/bugs/view.php?id=5405
- https://gnunet.org/git/libextractor.git/commit/?id=24c8d489797499c0331f4d1039e357ece1ae98a7
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-11565. | CVE ID: CVE-2020-11565
Date Updated: 2024-08-04T11:35:13.515Z
Date Published: 2020-04-06T00:08:41
Description:
An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa. NOTE: Someone in the security community disagrees that this is a vulnerability because the issue “is a bug in parsing mount options which can only be specified by a privileged user, so triggering the bug does not grant any powers not already held.”
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/torvalds/linux/commit/aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd
- https://www.debian.org/security/2020/dsa-4667
- https://usn.ubuntu.com/4364-1/
- https://usn.ubuntu.com/4367-1/
- https://usn.ubuntu.com/4368-1/
- https://usn.ubuntu.com/4363-1/
- https://usn.ubuntu.com/4369-1/
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://www.debian.org/security/2020/dsa-4698
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-30965. | CVE ID: CVE-2024-30965
Date Updated: 2024-09-04T15:50:27.273Z
Date Published: 2024-04-02T00:00:00
Description:
DedeCMS v5.7 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /src/dede/member_scores.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/Fishkey1/cms/tree/main
- https://github.com/Fishkey1/cms/commit/e9d294951ab2dd85709f1d12ad4747f25d326b1b
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-43740. | CVE ID: CVE-2022-43740
Date Updated: 2024-09-16T20:04:37.403Z
Date Published: 2023-10-14T15:13:27.562Z
Description:
IBM Security Verify Access OIDC Provider could allow a remote user to cause a denial of service due to uncontrolled resource consumption. IBM X-Force ID: 238921.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/7028513
- https://exchange.xforce.ibmcloud.com/vulnerabilities/238921
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-5173. | CVE ID: CVE-2018-5173
Date Updated: 2024-08-05T05:26:46.982Z
Date Published: 2018-06-11T21:00:00
Description:
The filename appearing in the "Downloads" panel improperly renders some Unicode characters, allowing for the file name to be spoofed. This can be used to obscure the file extension of potentially executable files from user view in the panel. Note: the dialog to open the file will show the full, correct filename and whether it is executable or not. This vulnerability affects Firefox < 60.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- http://www.securitytracker.com/id/1040896
- https://usn.ubuntu.com/3645-1/
- http://www.securityfocus.com/bid/104139
- https://bugzilla.mozilla.org/show_bug.cgi?id=1438025
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-9633. | CVE ID: CVE-2014-9633
Date Updated: 2024-08-06T13:47:41.799Z
Date Published: 2015-02-03T16:00:00
Description:
The bdisk.sys driver in COMODO Backup before 4.4.1.23 allows remote attackers to gain privileges via a crafted device handle, which triggers a NULL pointer dereference.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.exploit-db.com/exploits/35905
- http://packetstormsecurity.com/files/130094/Comodo-Backup-4.4.0.0-NULL-Pointer-Dereference.html
- http://forums.comodo.com/news-announcements-feedback-cb/comodo-backup-44123-released-t107293.0.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-41898. | CVE ID: CVE-2022-41898
Date Updated: 2024-08-03T12:56:38.354Z
Date Published: 2022-11-18T00:00:00
Description:
TensorFlow is an open source platform for machine learning. If `SparseFillEmptyRowsGrad` is given empty inputs, TensorFlow will crash. We have patched the issue in GitHub commit af4a6a3c8b95022c351edae94560acc61253a1b8. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hq7g-wwwp-q46h
- https://github.com/tensorflow/tensorflow/commit/af4a6a3c8b95022c351edae94560acc61253a1b8
- https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/sparse_fill_empty_rows_op_gpu.cu.cc
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-30986. | CVE ID: CVE-2021-30986
Date Updated: 2024-08-03T22:48:14.260Z
Date Published: 2021-08-24T18:51:25
Description:
A device configuration issue was addressed with an updated configuration. This issue is fixed in macOS Monterey 12.1. A device may be passively tracked by its Bluetooth MAC address.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT212978
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-7356. | CVE ID: CVE-2020-7356
Date Updated: 2024-09-17T03:37:28.730Z
Date Published: 2020-08-06T15:45:28.016670Z
Description:
CAYIN xPost suffers from an unauthenticated SQL Injection vulnerability. Input passed via the GET parameter 'wayfinder_seqid' in wayfinder_meeting_input.jsp is not properly sanitized before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and execute SYSTEM commands.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5571.php
- https://github.com/rapid7/metasploit-framework/pull/13607
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-2637. | CVE ID: CVE-2014-2637
Date Updated: 2024-08-06T10:21:35.852Z
Date Published: 2014-10-10T01:00:00
Description:
Unspecified vulnerability in HP Sprinter 12.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2342.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04454636
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04454636
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-28228. | CVE ID: CVE-2022-28228
Date Updated: 2024-08-03T05:48:37.596Z
Date Published: 2022-12-23T00:00:00
Description:
Out-of-bounds read was discovered in YDB server. An attacker could construct a query with insert statement that would allow him to read sensitive information from other memory locations or cause a crash.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://ydb.tech/ru/docs/security-changelog#28-11-2022
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-6347. | CVE ID: CVE-2024-6347
Date Updated: 2024-08-15T15:32:49.639Z
Date Published: 2024-08-15T14:37:38.448Z
Description:
* Unprotected privileged mode access through UDS session in the Blind Spot Detection Sensor ECU firmware in Nissan Altima (2022) allows attackers to trigger denial-of-service (DoS) by unauthorized access to the ECU's programming session.
* No preconditions implemented for ECU management functionality through UDS session in the Blind Spot Detection Sensor ECU in Nissan Altima (2022) allows attackers to disrupt normal ECU operations by triggering a control command without authentication.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://asrg.io/security-advisories/CVE-2024-6347
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-21463. | CVE ID: CVE-2022-21463
Date Updated: 2024-09-24T20:09:05.158Z
Date Published: 2022-04-19T20:37:59
Description:
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Kernel). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpuapr2022.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-27792. | CVE ID: CVE-2021-27792
Date Updated: 2024-08-03T21:33:15.673Z
Date Published: 2021-08-12T14:24:27
Description:
The request handling functions in web management interface of Brocade Fabric OS versions before v9.0.1a, v8.2.3a, and v7.4.2h do not properly handle malformed user input, resulting in a service crash. An authenticated attacker could use this weakness to cause the FOS HTTP application handler to crash, requiring a reboot.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1490
- https://security.netapp.com/advisory/ntap-20210819-0002/
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1492
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-26299. | CVE ID: CVE-2023-26299
Date Updated: 2024-08-02T11:46:24.488Z
Date Published: 2023-06-30T15:40:10.380Z
Description:
A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in certain HP PC products using AMI UEFI Firmware (system BIOS), which might allow arbitrary code execution. AMI has released updates to mitigate the potential vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.hp.com/us-en/document/ish_8642715-8642746-16/hpsbhf03850
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-1837. | CVE ID: CVE-2021-1837
Date Updated: 2024-08-03T16:25:05.836Z
Date Published: 2021-09-08T14:44:06
Description:
A certificate validation issue was addressed. This issue is fixed in iOS 14.5 and iPadOS 14.5. An attacker in a privileged network position may be able to alter network traffic.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT212317
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-5813. | CVE ID: CVE-2017-5813
Date Updated: 2024-09-16T19:35:23.768Z
Date Published: 2018-02-15T22:00:00Z
Description:
A remote unauthenticated access vulnerability in HPE Network Automation version 9.1x, 9.2x, 10.0x, 10.1x and 10.2x were found.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03740en_us
- http://www.securityfocus.com/bid/98331
- http://www.securitytracker.com/id/1038407
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-15770. | CVE ID: CVE-2018-15770
Date Updated: 2019-03-05T19:57:01
Date Published: 2019-03-05T20:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-7221. | CVE ID: CVE-2019-7221
Date Updated: 2024-08-04T20:46:44.758Z
Date Published: 2019-03-17T18:26:10
Description:
The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.com/files/151713/KVM-VMX-Preemption-Timer-Use-After-Free.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDOXCX3QFVWYXH5CQMGDDE7H6MUG5XGG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y2HMABEMJDPA6LPCBE5WIEZXUKY7DLTN/
- https://github.com/torvalds/linux/commits/master/arch/x86/kvm
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html
- http://www.openwall.com/lists/oss-security/2019/02/18/2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecec76885bcfe3294685dc363fd1273df0d5d65f
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1760
- https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/3930-1/
- https://usn.ubuntu.com/3931-1/
- https://usn.ubuntu.com/3931-2/
- https://usn.ubuntu.com/3930-2/
- https://security.netapp.com/advisory/ntap-20190404-0002/
- https://access.redhat.com/errata/RHSA-2019:0833
- https://access.redhat.com/errata/RHSA-2019:0818
- https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
- https://access.redhat.com/errata/RHBA-2019:0959
- https://support.f5.com/csp/article/K08413011
- https://access.redhat.com/errata/RHSA-2019:3967
- https://access.redhat.com/errata/RHSA-2019:4058
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-1798. | CVE ID: CVE-2023-1798
Date Updated: 2024-08-02T06:05:26.058Z
Date Published: 2023-04-02T09:31:03.558Z
Description:
A vulnerability, which was classified as problematic, has been found in EyouCMS up to 1.5.4. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument typename leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224750 is the identifier assigned to this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.224750
- https://vuldb.com/?ctiid.224750
- https://gitee.com/wkstestete/cve/blob/master/xss/eyoucms%20xss.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-39087. | CVE ID: CVE-2022-39087
Date Updated: 2024-08-03T11:10:32.557Z
Date Published: 2023-01-04T00:00:00
Description:
In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-28035. | CVE ID: CVE-2020-28035
Date Updated: 2024-08-04T16:33:56.878Z
Date Published: 2020-10-31T00:58:32
Description:
WordPress before 5.5.2 allows attackers to gain privileges via XML-RPC.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
- https://lists.debian.org/debian-lts-announce/2020/11/msg00004.html
- https://www.debian.org/security/2020/dsa-4784
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VAVVYJKA2I6CRQUINECDPBGWMQDEG244/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUXVUAKL2HL4QYJEPHBNVQQWRMFMII2Y/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHVNK2WYAM3ZTCXTFSEIT56IKLVJHU3/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-5134. | CVE ID: CVE-2018-5134
Date Updated: 2024-08-05T05:26:46.963Z
Date Published: 2018-06-11T21:00:00
Description:
WebExtensions may use "view-source:" URLs to view local "file:" URL content, as well as content stored in "about:cache", bypassing restrictions that only allow WebExtensions to view specific content. This vulnerability affects Firefox < 59.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/103386
- https://bugzilla.mozilla.org/show_bug.cgi?id=1429379
- http://www.securitytracker.com/id/1040514
- https://usn.ubuntu.com/3596-1/
- https://www.mozilla.org/security/advisories/mfsa2018-06/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-0152. | CVE ID: CVE-2009-0152
Date Updated: 2024-08-07T04:24:17.761Z
Date Published: 2009-05-13T15:14:00
Description:
iChat in Apple Mac OS X 10.5 before 10.5.7 disables SSL for AOL Instant Messenger (AIM) communication in certain circumstances that are inconsistent with the Require SSL setting, which allows remote attackers to obtain sensitive information by sniffing the network.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://support.apple.com/kb/HT3549
- http://secunia.com/advisories/35074
- http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50487
- http://www.securityfocus.com/bid/34926
- http://www.securitytracker.com/id?1022212
- http://www.us-cert.gov/cas/techalerts/TA09-133A.html
- http://www.vupen.com/english/advisories/2009/1297
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-5190. | CVE ID: CVE-2015-5190
Date Updated: 2024-08-06T06:41:07.988Z
Date Published: 2015-09-03T14:00:00
Description:
The pcsd web UI in PCS 0.9.139 and earlier allows remote authenticated users to execute arbitrary commands via "escape characters" in a URL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1252813
- http://rhn.redhat.com/errata/RHSA-2015-1700.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-12471. | CVE ID: CVE-2019-12471
Date Updated: 2024-08-04T23:24:37.083Z
Date Published: 2019-07-10T15:49:21
Description:
Wikimedia MediaWiki 1.30.0 through 1.32.1 has XSS. Loading user JavaScript from a non-existent account allows anyone to create the account, and perform XSS on users loading that script. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.debian.org/security/2019/dsa-4460
- https://seclists.org/bugtraq/2019/Jun/12
- https://phabricator.wikimedia.org/T207603
- https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-42483. | CVE ID: CVE-2024-42483
Date Updated: 2024-09-12T16:46:16.388Z
Date Published: 2024-09-12T14:12:18.128Z
Description:
ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An replay attacks vulnerability was discovered in the implementation of the ESP-NOW because the caches is not differentiated by message types, it is a single, shared resource for all kinds of messages, whether they are broadcast or unicast, and regardless of whether they are ciphertext or plaintext. This can result an attacker to clear the cache of its legitimate entries, there by creating an opportunity to re-inject previously captured packets. This vulnerability is fixed in 2.5.2.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/espressif/esp-now/security/advisories/GHSA-wf6q-c2xr-77xj
- https://github.com/espressif/esp-now/commit/4e30db50d541b2909d278ef0db05de1a3d7190ef
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-35318. | CVE ID: CVE-2022-35318
Date Updated: 2022-07-11T19:30:40
Date Published: 2022-07-11T19:30:40
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-17169. | CVE ID: CVE-2017-17169
Date Updated: 2024-08-05T20:43:59.925Z
Date Published: 2018-03-09T17:00:00
Description:
The CIDAM Protocol on some Huawei Products has multiple input validation vulnerabilities due to insufficient validation of specific messages when the protocol is implemented. An authenticated remote attacker could send a malicious message to a target system. Successful exploit could allow the attacker to tamper with business and make the system abnormal. Affected Huawei Products are: DP300 versions V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00B012, V500R002C00B013, V500R002C00B014, V500R002C00B017, V500R002C00B018, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC400, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00; RP200 versions V500R002C00SPC200, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE30 versions V100R001C10SPC300, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700B010, V500R002C00SPC200, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE40 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE50 versions V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPCb00, V600R006C00, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; TE60 versions V100R001C10, V100R001C10B001, V100R001C10B002, V100R001C10B010, V100R001C10B011, V100R001C10B012, V100R001C10B013, V100R001C10B014, V100R001C10B016, V100R001C10B017, V100R001C10B018, V100R001C10B019, V100R001C10SPC400, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700, V100R001C10SPC800B011, V100R001C10SPC900, V500R002C00, V500R002C00B010, V500R002C00B011, V500R002C00SPC100, V500R002C00SPC200, V500R002C00SPC300, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC800, V500R002C00SPC900, V500R002C00SPCa00, V500R002C00SPCb00, V500R002C00SPCd00, V500R002C00SPCe00, V600R006C00, V600R006C00SPC100, V600R006C00SPC200, V600R006C00SPC300, V600R006C00SPC400, V600R006C00SPC500; eSpace U1981 version V200R003C20SPC900.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171220-02-cidam-en
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-26626. | CVE ID: CVE-2024-26626
Date Updated: 2024-09-11T17:33:30.184Z
Date Published: 2024-03-06T06:45:33.826Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
ipmr: fix kernel panic when forwarding mcast packets
The stacktrace was:
[ 86.305548] BUG: kernel NULL pointer dereference, address: 0000000000000092
[ 86.306815] #PF: supervisor read access in kernel mode
[ 86.307717] #PF: error_code(0x0000) - not-present page
[ 86.308624] PGD 0 P4D 0
[ 86.309091] Oops: 0000 [#1] PREEMPT SMP NOPTI
[ 86.309883] CPU: 2 PID: 3139 Comm: pimd Tainted: G U 6.8.0-6wind-knet #1
[ 86.311027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.11.1-0-g0551a4be2c-prebuilt.qemu-project.org 04/01/2014
[ 86.312728] RIP: 0010:ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985)
[ 86.313399] Code: f9 1f 0f 87 85 03 00 00 48 8d 04 5b 48 8d 04 83 49 8d 44 c5 00 48 8b 40 70 48 39 c2 0f 84 d9 00 00 00 49 8b 46 58 48 83 e0 fe <80> b8 92 00 00 00 00 0f 84 55 ff ff ff 49 83 47 38 01 45 85 e4 0f
[ 86.316565] RSP: 0018:ffffad21c0583ae0 EFLAGS: 00010246
[ 86.317497] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[ 86.318596] RDX: ffff9559cb46c000 RSI: 0000000000000000 RDI: 0000000000000000
[ 86.319627] RBP: ffffad21c0583b30 R08: 0000000000000000 R09: 0000000000000000
[ 86.320650] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001
[ 86.321672] R13: ffff9559c093a000 R14: ffff9559cc00b800 R15: ffff9559c09c1d80
[ 86.322873] FS: 00007f85db661980(0000) GS:ffff955a79d00000(0000) knlGS:0000000000000000
[ 86.324291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 86.325314] CR2: 0000000000000092 CR3: 000000002f13a000 CR4: 0000000000350ef0
[ 86.326589] Call Trace:
[ 86.327036] <TASK>
[ 86.327434] ? show_regs (/build/work/knet/arch/x86/kernel/dumpstack.c:479)
[ 86.328049] ? __die (/build/work/knet/arch/x86/kernel/dumpstack.c:421 /build/work/knet/arch/x86/kernel/dumpstack.c:434)
[ 86.328508] ? page_fault_oops (/build/work/knet/arch/x86/mm/fault.c:707)
[ 86.329107] ? do_user_addr_fault (/build/work/knet/arch/x86/mm/fault.c:1264)
[ 86.329756] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223)
[ 86.330350] ? __irq_work_queue_local (/build/work/knet/kernel/irq_work.c:111 (discriminator 1))
[ 86.331013] ? exc_page_fault (/build/work/knet/./arch/x86/include/asm/paravirt.h:693 /build/work/knet/arch/x86/mm/fault.c:1515 /build/work/knet/arch/x86/mm/fault.c:1563)
[ 86.331702] ? asm_exc_page_fault (/build/work/knet/./arch/x86/include/asm/idtentry.h:570)
[ 86.332468] ? ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985)
[ 86.333183] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223)
[ 86.333920] ipmr_mfc_add (/build/work/knet/./include/linux/rcupdate.h:782 /build/work/knet/net/ipv4/ipmr.c:1009 /build/work/knet/net/ipv4/ipmr.c:1273)
[ 86.334583] ? __pfx_ipmr_hash_cmp (/build/work/knet/net/ipv4/ipmr.c:363)
[ 86.335357] ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470)
[ 86.336135] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223)
[ 86.336854] ? ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470)
[ 86.337679] do_ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:944)
[ 86.338408] ? __pfx_unix_stream_read_actor (/build/work/knet/net/unix/af_unix.c:2862)
[ 86.339232] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223)
[ 86.339809] ? aa_sk_perm (/build/work/knet/security/apparmor/include/cred.h:153 /build/work/knet/security/apparmor/net.c:181)
[ 86.340342] ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:1415)
[ 86.340859] raw_setsockopt (/build/work/knet/net/ipv4/raw.c:836)
[ 86.341408] ? security_socket_setsockopt (/build/work/knet/security/security.c:4561 (discriminator 13))
[ 86.342116] sock_common_setsockopt (/build/work/knet/net/core/sock.c:3716)
[ 86.342747] do_sock_setsockopt (/build/work/knet/net/socket.c:2313)
[ 86.343363] __sys_setsockopt (/build/work/knet/./include/linux/file.h:32 /build/work/kn
---truncated---
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/d2f1b7fe74afd66298dbb3c7b39e7b62e4df1724
- https://git.kernel.org/stable/c/dcaafdba6c6162bb49f1192850bc3bbc3707738c
- https://git.kernel.org/stable/c/2e8c9ae40adda2be1ba41c05fd3cd1e61cce3207
- https://git.kernel.org/stable/c/e622502c310f1069fd9f41cd38210553115f610a
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-34326. | CVE ID: CVE-2021-34326
Date Updated: 2024-08-04T00:05:52.502Z
Date Published: 2021-07-13T11:03:42
Description:
A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (All Versions < SE2021MP5), Teamcenter Visualization (All versions < V13.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13422)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-173615.pdf
- https://www.zerodayinitiative.com/advisories/ZDI-21-864/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-3110. | CVE ID: CVE-2012-3110
Date Updated: 2024-08-06T19:57:48.784Z
Date Published: 2012-07-17T22:39:00
Description:
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.5 and 8.3.7 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2012-1766, CVE-2012-1767, CVE-2012-1769, CVE-2012-1770, CVE-2012-1771, CVE-2012-1772, CVE-2012-1773, CVE-2012-3106, CVE-2012-3107, and CVE-2012-3108.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/54506
- http://blogs.technet.com/b/srd/archive/2012/07/24/more-information-on-security-advisory-2737111.aspx
- http://www.securitytracker.com/id?1027264
- https://exchange.xforce.ibmcloud.com/vulnerabilities/77011
- http://www-01.ibm.com/support/docview.wss?uid=swg21660640
- http://www.kb.cert.org/vuls/id/118913
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-058
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15747
- http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-067
- http://osvdb.org/83911
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
- http://technet.microsoft.com/security/advisory/2737111
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-0205. | CVE ID: CVE-2011-0205
Date Updated: 2024-08-06T21:43:15.374Z
Date Published: 2011-06-24T20:00:00
Description:
Heap-based buffer overflow in ImageIO in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG2000 image.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://support.apple.com/kb/HT4723
- http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
- http://www.securityfocus.com/bid/48439
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-34902. | CVE ID: CVE-2022-34902
Date Updated: 2024-08-03T09:22:10.726Z
Date Published: 2022-07-18T14:17:56
Description:
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Access 6.5.4 (39316) Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Desktop Control Agent service. The service loads Qt plugins from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-15787.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.parallels.com/en/129010
- https://www.zerodayinitiative.com/advisories/ZDI-22-946/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-4611. | CVE ID: CVE-2017-4611
Date Updated: 2018-03-16T13:57:01
Date Published: 2018-03-16T14:04:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-2437. | CVE ID: CVE-2016-2437
Date Updated: 2024-08-05T23:24:49.362Z
Date Published: 2016-05-09T10:00:00
Description:
The NVIDIA video driver in Android before 2016-05-01 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 27436822.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://source.android.com/security/bulletin/2016-05-01.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-44101. | CVE ID: CVE-2023-44101
Date Updated: 2024-09-18T15:26:27.153Z
Date Published: 2023-10-11T11:48:56.203Z
Description:
The Bluetooth module has a vulnerability in permission control for broadcast notifications.Successful exploitation of this vulnerability may affect confidentiality.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-2180. | CVE ID: CVE-2009-2180
Date Updated: 2024-08-07T05:44:55.143Z
Date Published: 2009-06-23T21:21:00
Description:
Multiple directory traversal vulnerabilities in upfiles/index.php in Pc4 Uploader 10.0 and earlier allow remote attackers to read arbitrary files via (1) a .. (dot dot) or (2) absolute path in the file parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://osvdb.org/55314
- https://www.exploit-db.com/exploits/8988
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-39929. | CVE ID: CVE-2021-39929
Date Updated: 2024-08-04T02:20:34.245Z
Date Published: 2021-11-19T00:00:00
Description:
Uncontrolled Recursion in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wireshark.org/security/wnpa-sec-2021-07.html
- https://gitlab.com/wireshark/wireshark/-/issues/17651
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39929.json
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YEWTIRMC2MFQBZ2O5M4CJHJM4JPBHLXH/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6AJFIYIHS3TYDD2EBYBJ5KKE52X34BJ/
- https://www.debian.org/security/2021/dsa-5019
- https://lists.debian.org/debian-lts-announce/2021/12/msg00015.html
- https://security.gentoo.org/glsa/202210-04
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-6504. | CVE ID: CVE-2012-6504
Date Updated: 2024-09-17T00:21:10.086Z
Date Published: 2013-01-24T01:00:00Z
Description:
SQL injection vulnerability in mods/hours/data/get_hours.php in PHP Volunteer Management 1.0.2 allows remote attackers to execute arbitrary SQL commands via the id parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/48988
- http://www.securityfocus.com/bid/53261
- http://www.exploit-db.com/exploits/18788
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0206.html
- http://www.osvdb.org/81494
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-12878. | CVE ID: CVE-2020-12878
Date Updated: 2024-08-04T12:11:18.998Z
Date Published: 2021-02-17T23:07:11
Description:
Digi ConnectPort X2e before 3.2.30.6 allows an attacker to escalate privileges from the python user to root via a symlink attack that uses chown, related to /etc/init.d/S50dropbear.sh and the /WEB/python/.ssh directory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/fireeye/Vulnerability-Disclosures
- https://www.digi.com/support/productdetail?pid=5570
- https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2020-0020/FEYE-2020-0020.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-27240. | CVE ID: CVE-2020-27240
Date Updated: 2024-08-04T16:11:36.315Z
Date Published: 2021-04-19T20:33:33
Description:
An exploitable SQL injection vulnerability exists in ‘getAssets.jsp’ page of OpenClinic GA 5.173.3. The componentStatus parameter in the getAssets.jsp page is vulnerable to unauthenticated SQL injection An attacker can make an authenticated HTTP request to trigger this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1207
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-41354. | CVE ID: CVE-2024-41354
Date Updated: 2024-08-02T04:46:52.397Z
Date Published: 2024-07-26T00:00:00
Description:
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via /app/admin/widgets/edit.php
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/phpipam/phpipam/issues/4150
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-45071. | CVE ID: CVE-2022-45071
Date Updated: 2024-09-17T01:56:29.756Z
Date Published: 2022-11-17T21:58:30.968921Z
Description:
Cross-Site Request Forgery (CSRF) vulnerability in WPML Multilingual CMS premium plugin <= 4.5.13 on WordPress.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/sitepress-multilingual-cms/wordpress-wpml-multilingual-cms-premium-plugin-4-5-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-5414. | CVE ID: CVE-2018-5414
Date Updated: 2019-03-05T19:57:01
Date Published: 2019-03-05T20:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-11675. | CVE ID: CVE-2018-11675
Date Updated: 2020-03-02T16:04:12
Date Published: 2020-03-02T16:04:12
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-5118. | CVE ID: CVE-2015-5118
Date Updated: 2024-08-06T06:32:32.744Z
Date Published: 2015-07-09T16:00:00
Description:
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3135 and CVE-2015-4432.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/75592
- http://www.securitytracker.com/id/1032810
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2015-1214.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html
- https://security.gentoo.org/glsa/201507-13
- https://helpx.adobe.com/security/products/flash-player/apsb15-16.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-31866. | CVE ID: CVE-2024-31866
Date Updated: 2024-08-21T14:33:03.134Z
Date Published: 2024-04-09T16:09:12.117Z
Description:
Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin.
The attackers can execute shell scripts or malicious code by overriding configuration like ZEPPELIN_INTP_CLASSPATH_OVERRIDES.
This issue affects Apache Zeppelin: from 0.8.2 before 0.11.1.
Users are recommended to upgrade to version 0.11.1, which fixes the issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/apache/zeppelin/pull/4715
- https://lists.apache.org/thread/jpkbq3oktopt34x2n5wnhzc2r1410ddd
- http://www.openwall.com/lists/oss-security/2024/04/09/10
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-25744. | CVE ID: CVE-2023-25744
Date Updated: 2024-08-02T11:32:11.855Z
Date Published: 2023-06-02T00:00:00
Description:
Mmemory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 110 and Firefox ESR < 102.8.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1789449%2C1803628%2C1810536
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-6908. | CVE ID: CVE-2017-6908
Date Updated: 2024-08-05T15:41:17.814Z
Date Published: 2017-03-15T00:00:00
Description:
An issue was discovered in concrete5 <= 5.6.3.4. The vulnerability exists due to insufficient filtration of user-supplied data (fID) passed to the "concrete5-legacy-master/web/concrete/tools/files/selector_data.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/concrete5/concrete5-legacy/commit/62046f511fc02ad783ad170404c80db3c69f0408
- http://www.securityfocus.com/bid/96891
- https://github.com/concrete5/concrete5-legacy/issues/1948
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-5881. | CVE ID: CVE-2013-5881
Date Updated: 2024-08-06T17:22:31.473Z
Date Published: 2014-01-15T00:30:00
Description:
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2014-0431.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/56491
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90377
- http://www.securityfocus.com/bid/64885
- http://www.securityfocus.com/bid/64758
- http://osvdb.org/102066
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://security.gentoo.org/glsa/glsa-201409-04.xml
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-2603. | CVE ID: CVE-2012-2603
Date Updated: 2024-09-16T20:12:20.091Z
Date Published: 2012-06-08T16:00:00Z
Description:
The server in CollabNet ScrumWorks Pro before 6.0 allows remote authenticated users to gain privileges and obtain sensitive information via a modified desktop client.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/442595
- http://www.kb.cert.org/vuls/id/MAPG-8RJPJX
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-29187. | CVE ID: CVE-2024-29187
Date Updated: 2024-08-13T14:28:49.838Z
Date Published: 2024-03-24T19:38:38.140Z
Description:
WiX toolset lets developers create installers for Windows Installer, the Windows installation engine. When a bundle runs as SYSTEM user, Burn uses GetTempPathW which points to an insecure directory C:\Windows\Temp to drop and load multiple binaries. Standard users can hijack the binary before it's loaded in the application resulting in elevation of privileges. This vulnerability is fixed in 3.14.1 and 4.0.5.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/wixtoolset/issues/security/advisories/GHSA-rf39-3f98-xr7r
- https://github.com/wixtoolset/wix/commit/75a8c75d4e02ea219008dc5af7d03869291d61f7
- https://github.com/wixtoolset/wix3/commit/6d372e5169f1a334a395cdf496443bc0732098e9
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-3770. | CVE ID: CVE-2018-3770
Date Updated: 2024-09-16T16:42:35.385Z
Date Published: 2018-07-20T22:00:00Z
Description:
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://hackerone.com/reports/360727
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-12262. | CVE ID: CVE-2019-12262
Date Updated: 2024-08-04T23:17:39.465Z
Date Published: 2019-08-14T19:18:13
Description:
Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and 7 has Incorrect Access Control in the RARP client component. IPNET security vulnerability: Handling of unsolicited Reverse ARP replies (Logical Flaw).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12262
- https://support.f5.com/csp/article/K41190253
- https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-34467. | CVE ID: CVE-2024-34467
Date Updated: 2024-08-16T18:18:27.983Z
Date Published: 2024-05-04T00:00:00
Description:
ThinkPHP 8.0.3 allows remote attackers to exploit XSS due to inadequate filtering of function argument values in think_exception.tpl.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/top-think/framework/issues/2996
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-41168. | CVE ID: CVE-2021-41168
Date Updated: 2024-08-04T02:59:31.761Z
Date Published: 2021-10-21T20:10:12
Description:
Snudown is a reddit-specific fork of the Sundown Markdown parser used by GitHub, with Python integration added. In affected versions snudown was found to be vulnerable to denial of service attacks to its reference table implementation. References written in markdown ` [reference_name]: https://www.example.com` are inserted into a hash table which was found to have a weak hash function, meaning that an attacker can reliably generate a large number of collisions for it. This makes the hash table vulnerable to a hash-collision DoS attack, a type of algorithmic complexity attack. Further the hash table allowed for duplicate entries resulting in long retrieval times. Proofs of concept and further discussion of the hash collision issue are discussed on the snudown GHSA(https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6). Users are advised to update to version 1.7.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/reddit/snudown/security/advisories/GHSA-6gvv-9q92-w5f6
- https://github.com/reddit/snudown/commit/1ac2c130b210539ee1e5d67a7bac93f9d8007c0e
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-6148. | CVE ID: CVE-2015-6148
Date Updated: 2024-08-06T07:15:12.811Z
Date Published: 2015-12-09T11:00:00
Description:
Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6156.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.zerodayinitiative.com/advisories/ZDI-15-588
- http://www.securitytracker.com/id/1034315
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-124
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-125
- http://www.securitytracker.com/id/1034316
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-2474. | CVE ID: CVE-2019-2474
Date Updated: 2024-10-02T16:10:16.926Z
Date Published: 2019-01-16T19:00:00
Description:
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- http://www.securityfocus.com/bid/106569
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-22877. | CVE ID: CVE-2023-22877
Date Updated: 2024-09-16T18:54:12.017Z
Date Published: 2023-08-28T00:34:57.905Z
Description:
IBM InfoSphere Information Server 11.7 is potentially vulnerable to CSV Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 244368.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/6988623
- https://exchange.xforce.ibmcloud.com/vulnerabilities/244368
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-20798. | CVE ID: CVE-2024-20798
Date Updated: 2024-08-01T22:06:35.691Z
Date Published: 2024-04-11T08:19:44.054Z
Description:
Illustrator versions 28.3, 27.9.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/illustrator/apsb24-25.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-2049. | CVE ID: CVE-2015-2049
Date Updated: 2024-08-06T05:02:43.387Z
Date Published: 2015-02-23T17:00:00
Description:
Unrestricted file upload vulnerability in D-Link DCS-931L with firmware 1.04 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/39192/
- http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10049
- http://www.kb.cert.org/vuls/id/377348
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-35271. | CVE ID: CVE-2020-35271
Date Updated: 2024-08-04T17:02:07.467Z
Date Published: 2021-01-20T15:37:37
Description:
Employee Performance Evaluation System in PHP/MySQLi with Source Code 1.0 is affected by cross-site scripting (XSS) in the Employees, First Name and Last Name fields.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://riteshgohil-25.medium.com/employee-performance-evaluation-system-1-0-first-and-last-name-persistent-cross-site-scripting-7f319775e96f
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-14306. | CVE ID: CVE-2020-14306
Date Updated: 2024-08-04T12:39:36.236Z
Date Published: 2020-09-16T00:00:00
Description:
An incorrect access control flaw was found in the operator, openshift-service-mesh/istio-rhel8-operator all versions through 1.1.3. This flaw allows an attacker with a basic level of access to the cluster to deploy a custom gateway/pod to any namespace, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/maistra/istio-operator/pull/462
- https://bugzilla.redhat.com/show_bug.cgi?id=1850380
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-25361. | CVE ID: CVE-2022-25361
Date Updated: 2024-08-03T04:36:06.903Z
Date Published: 2022-06-07T13:26:39
Description:
WatchGuard Firebox and XTM appliances allow an unauthenticated remote attacker to delete arbitrary files from a limited set of directories on the system. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://watchguard.com
- https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2022-00004
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-12149. | CVE ID: CVE-2017-12149
Date Updated: 2024-08-05T18:28:16.644Z
Date Published: 2017-10-04T20:00:00Z
Description:
In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1486220
- https://access.redhat.com/errata/RHSA-2018:1608
- https://github.com/gottburgm/Exploits/tree/master/CVE-2017-12149
- http://www.securityfocus.com/bid/100591
- https://access.redhat.com/errata/RHSA-2018:1607
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-35774. | CVE ID: CVE-2020-35774
Date Updated: 2024-08-04T17:09:15.249Z
Date Published: 2020-12-29T17:54:04
Description:
server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c
- https://github.com/twitter/twitter-server/compare/twitter-server-20.10.0...twitter-server-20.12.0
- https://advisory.checkmarx.net/advisory/CX-2020-4287
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-11842. | CVE ID: CVE-2019-11842
Date Updated: 2024-08-04T23:03:32.882Z
Date Published: 2019-05-09T17:06:43
Description:
An issue was discovered in Matrix Sydent before 1.0.3 and Synapse before 0.99.3.1. Random number generation is mishandled, which makes it easier for attackers to predict a Sydent authentication token or a Synapse random ID.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://matrix.org/blog/2019/05/03/security-updates-sydent-1-0-3-synapse-0-99-3-1-and-riot-android-0-9-0-0-8-99-0-8-28-a/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-1387. | CVE ID: CVE-2008-1387
Date Updated: 2024-08-07T08:17:34.683Z
Date Published: 2008-04-16T16:00:00
Description:
ClamAV before 0.93 allows remote attackers to cause a denial of service (CPU consumption) via a crafted ARJ archive, as demonstrated by the PROTOS GENOME test suite for Archive Formats.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:088
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41822
- https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00249.html
- http://www.securityfocus.com/archive/1/490863/100/0/threaded
- http://security.gentoo.org/glsa/glsa-200805-19.xml
- http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html
- https://www.clamav.net/bugzilla/show_bug.cgi?id=897
- http://up2date.astaro.com/2008/08/up2date_asg_v7300_ga_released.html
- http://int21.de/cve/CVE-2008-1387-clamav.html
- http://secunia.com/advisories/29891
- http://www.us-cert.gov/cas/techalerts/TA08-260A.html
- http://www.securityfocus.com/bid/28784
- http://www.vupen.com/english/advisories/2008/2584
- http://secunia.com/advisories/31882
- http://secunia.com/advisories/29975
- http://www.cert.fi/haavoittuvuudet/joint-advisory-archive-formats.html
- http://secunia.com/advisories/29863
- http://secunia.com/advisories/30328
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00625.html
- http://www.securityfocus.com/bid/28782
- http://secunia.com/advisories/30253
- http://secunia.com/advisories/31576
- http://www.vupen.com/english/advisories/2008/1227/references
- http://www.ee.oulu.fi/research/ouspg/protos/testing/c10/archive/
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00009.html
- https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00576.html
- http://kolab.org/security/kolab-vendor-notice-20.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-43326. | CVE ID: CVE-2023-43326
Date Updated: 2024-09-24T15:59:07.388Z
Date Published: 2023-09-25T00:00:00
Description:
A reflected cross-site scripting (XSS) vulnerability exisits in multiple url of mooSocial v3.1.8 allows attackers to steal user's session cookies and impersonate their account via a crafted URL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://moosocial.com/
- https://github.com/ahrixia/CVE-2023-43326
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-23706. | CVE ID: CVE-2022-23706
Date Updated: 2024-08-03T03:51:46.063Z
Date Published: 2022-05-17T20:01:57
Description:
A remote cross-site scripting (xss) vulnerability was discovered in HPE OneView version(s): Prior to 7.0. HPE has provided a software update to resolve this vulnerability in HPE OneView.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04278en_us
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-22349. | CVE ID: CVE-2023-22349
Date Updated: 2024-08-02T10:07:06.106Z
Date Published: 2023-02-13T00:00:00
Description:
Out-of-bound read vulnerability exists in Screen Creator Advance 2 Ver.0.1.1.4 Build01 and earlier because the end of data cannot be verified when processing screen management information. Having a user of Screen Creator Advance 2 to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.electronics.jtekt.co.jp/en/topics/202302035233/
- https://www.electronics.jtekt.co.jp/jp/topics/2023020313454/
- https://jvn.jp/en/vu/JVNVU98917488/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-5247. | CVE ID: CVE-2020-5247
Date Updated: 2024-08-04T08:22:09.079Z
Date Published: 2020-02-28T16:55:15
Description:
In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v
- https://owasp.org/www-community/attacks/HTTP_Response_Splitting
- https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/
- https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-3299. | CVE ID: CVE-2016-3299
Date Updated: 2024-08-05T23:47:58.456Z
Date Published: 2016-08-09T21:00:00
Description:
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow remote attackers to hijack network traffic or bypass intended Enhanced Protected Mode (EPM) or application container protection mechanisms, and consequently render untrusted content in a browser, by leveraging how NetBIOS validates responses, aka "NetBIOS Spoofing Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-077
- http://www.securityfocus.com/bid/92387
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-23833. | CVE ID: CVE-2020-23833
Date Updated: 2024-08-04T15:05:11.325Z
Date Published: 2020-09-15T21:09:00
Description:
Projectworlds House Rental v1.0 suffers from an unauthenticated SQL Injection vulnerability, allowing remote attackers to execute arbitrary code on the hosting webserver via a malicious index.php POST request.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://projectworlds.in
- https://projectworlds.in/wp-content/uploads/2019/06/home-rental.zip
- https://packetstormsecurity.com/files/158811/House-Rental-1.0-SQL-Injection.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-0448. | CVE ID: CVE-2009-0448
Date Updated: 2024-08-07T04:31:26.390Z
Date Published: 2009-02-05T20:00:00
Description:
Directory traversal vulnerability in admin/modules/aa/preview.php in Syntax Desktop 2.7 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the synTarget parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/7977
- http://www.securityfocus.com/bid/33601
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48496
- http://www.vupen.com/english/advisories/2009/0319
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-5057. | CVE ID: CVE-2024-5057
Date Updated: 2024-08-29T14:27:46.777Z
Date Published: 2024-08-29T14:04:35.019Z
Description:
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Easy Digital Downloads allows SQL Injection.This issue affects Easy Digital Downloads: from n/a through 3.2.12.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/easy-digital-downloads/wordpress-easy-digital-downloads-plugin-3-2-12-sql-injection-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-31400. | CVE ID: CVE-2024-31400
Date Updated: 2024-08-02T01:52:56.946Z
Date Published: 2024-06-11T04:26:31.583Z
Description:
Insertion of sensitive information into sent data issue exists in Cybozu Garoon 5.0.0 to 5.15.0. If this vulnerability is exploited, unintended data may be left in forwarded mail.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cs.cybozu.co.jp/2024/007901.html
- https://jvn.jp/en/jp/JVN28869536/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-9062. | CVE ID: CVE-2017-9062
Date Updated: 2024-08-05T16:55:22.055Z
Date Published: 2017-05-18T14:00:00
Description:
In WordPress before 4.7.5, there is improper handling of post meta data values in the XML-RPC API.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1038520
- https://github.com/WordPress/WordPress/commit/3d95e3ae816f4d7c638f40d3e936a4be19724381
- https://wordpress.org/news/2017/05/wordpress-4-7-5/
- http://www.debian.org/security/2017/dsa-3870
- http://www.securityfocus.com/bid/98509
- https://wpvulndb.com/vulnerabilities/8816
- https://codex.wordpress.org/Version_4.7.5
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-14410. | CVE ID: CVE-2019-14410
Date Updated: 2024-08-05T00:19:40.841Z
Date Published: 2019-07-30T14:17:18
Description:
Maketext in cPanel before 78.0.2 allows format-string injection in the Email store_filter UAPI (SEC-472).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://documentation.cpanel.net/display/CL/78+Change+Log
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-0737. | CVE ID: CVE-2010-0737
Date Updated: 2024-08-07T00:59:39.003Z
Date Published: 2019-10-30T22:11:50
Description:
A missing permission check was found in The CLI in JBoss Operations Network before 2.3.1 does not properly check permissions, which allows JBoss ON users to perform management tasks and configuration changes with the privileges of the administrator user.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0737
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-5407. | CVE ID: CVE-2014-5407
Date Updated: 2024-08-06T11:41:49.181Z
Date Published: 2014-09-15T14:00:00
Description:
Multiple stack-based buffer overflows in Schneider Electric VAMPSET 2.2.136 and earlier allow local users to cause a denial of service (application halt) via a malformed (1) setting file or (2) disturbance recording file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://ics-cert.us-cert.gov/advisories/ICSA-14-254-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-0667. | CVE ID: CVE-2021-0667
Date Updated: 2024-08-03T15:47:28.300Z
Date Published: 2021-11-18T14:58:21
Description:
In apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05670581; Issue ID: ALPS05670581.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://corp.mediatek.com/product-security-bulletin/November-2021
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-25906. | CVE ID: CVE-2021-25906
Date Updated: 2024-08-03T20:11:28.447Z
Date Published: 2021-01-22T09:02:30
Description:
An issue was discovered in the basic_dsp_matrix crate before 0.9.2 for Rust. When a TransformContent panic occurs, a double drop can be performed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://rustsec.org/advisories/RUSTSEC-2021-0009.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-18151. | CVE ID: CVE-2020-18151
Date Updated: 2024-08-04T14:00:48.789Z
Date Published: 2021-07-14T18:18:38
Description:
Cross Site Request Forgery (CSRF) vulnerability in ThinkCMF v5.1.0, which can add an admin account.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/thinkcmf/thinkcmf/issues/580
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-32127. | CVE ID: CVE-2023-32127
Date Updated: 2024-08-02T15:03:29.206Z
Date Published: 2024-04-24T15:48:12.089Z
Description:
Missing Authorization vulnerability in Daniel Powney Multi Rating allows Functionality Misuse.This issue affects Multi Rating: from n/a through 5.0.6.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/multi-rating/wordpress-multi-rating-plugin-5-0-6-unauth-arbitrary-rating-value-change?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-6496. | CVE ID: CVE-2016-6496
Date Updated: 2024-08-06T01:29:20.272Z
Date Published: 2016-12-09T22:00:00
Description:
The LDAP directory connector in Atlassian Crowd before 2.8.8 and 2.9.x before 2.9.5 allows remote attackers to execute arbitrary code via an LDAP attribute with a crafted serialized Java object, aka LDAP entry poisoning.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://jira.atlassian.com/browse/CWD-4790
- http://www.securityfocus.com/archive/1/539655/100/0/threaded
- https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE-wp.pdf
- https://confluence.atlassian.com/crowd/crowd-security-advisory-2016-10-19-856697283.html
- http://www.securityfocus.com/bid/93826
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-3882. | CVE ID: CVE-2023-3882
Date Updated: 2024-08-02T07:08:50.672Z
Date Published: 2023-07-25T05:00:04.917Z
Description:
A vulnerability, which was classified as critical, has been found in Campcodes Beauty Salon Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/edit-accepted-appointment.php. The manipulation of the argument contactno leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235244.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.235244
- https://vuldb.com/?ctiid.235244
- https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2014.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.