instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2024-1794.
CVE ID: CVE-2024-1794 Date Updated: 2024-08-01T18:48:22.041Z Date Published: 2024-04-09T18:58:38.653Z Description: The Forminator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an uploaded file (e.g. 3gpp file) in all versions up to, and including, 1.29.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/23feb72c-7e6f-436b-b56e-dc6185302d31?source=cve - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3047085%40forminator&old=3028842%40forminator&sfp_email=&sfph_mail= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-35934.
CVE ID: CVE-2023-35934 Date Updated: 2024-08-02T16:37:40.060Z Date Published: 2023-07-06T19:39:49.656Z Description: yt-dlp is a command-line program to download videos from video sites. During file downloads, yt-dlp or the external downloaders that yt-dlp employs may leak cookies on HTTP redirects to a different host, or leak them when the host for download fragments differs from their parent manifest's host. This vulnerable behavior is present in yt-dlp prior to 2023.07.06 and nightly 2023.07.06.185519. All native and external downloaders are affected, except for `curl` and `httpie` (version 3.1.0 or later). At the file download stage, all cookies are passed by yt-dlp to the file downloader as a `Cookie` header, thereby losing their scope. This also occurs in yt-dlp's info JSON output, which may be used by external tools. As a result, the downloader or external tool may indiscriminately send cookies with requests to domains or paths for which the cookies are not scoped. yt-dlp version 2023.07.06 and nightly 2023.07.06.185519 fix this issue by removing the `Cookie` header upon HTTP redirects; having native downloaders calculate the `Cookie` header from the cookiejar, utilizing external downloaders' built-in support for cookies instead of passing them as header arguments, disabling HTTP redirectiong if the external downloader does not have proper cookie support, processing cookies passed as HTTP headers to limit their scope, and having a separate field for cookies in the info dict storing more information about scoping Some workarounds are available for those who are unable to upgrade. Avoid using cookies and user authentication methods. While extractors may set custom cookies, these usually do not contain sensitive information. Alternatively, avoid using `--load-info-json`. Or, if authentication is a must: verify the integrity of download links from unknown sources in browser (including redirects) before passing them to yt-dlp; use `curl` as external downloader, since it is not impacted; and/or avoid fragmented formats such as HLS/m3u8, DASH/mpd and ISM. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-v8mc-9377-rwjj - https://github.com/yt-dlp/yt-dlp/commit/1ceb657bdd254ad961489e5060f2ccc7d556b729 - https://github.com/yt-dlp/yt-dlp/commit/3121512228487c9c690d3d39bfd2579addf96e07 - https://github.com/yt-dlp/yt-dlp/commit/f8b4bcc0a791274223723488bfbfc23ea3276641 - https://github.com/yt-dlp/yt-dlp-nightly-builds/releases/tag/2023.07.06.185519 - https://github.com/yt-dlp/yt-dlp/releases/tag/2023.07.06 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IM44RJL2MR2WG3ZY354C5IUEEZUJGEVA/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5X6YT6AQE5FHM5VTQLKKJXSYBLLJF26W/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HEOKCGVONGHR2SYUIXU33A4MKXZBDP6L/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7E7CQ5S5KMZHAMCNU7V7KYNBVCPLBHG/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4007.
CVE ID: CVE-2014-4007 Date Updated: 2024-08-06T11:04:28.346Z Date Published: 2014-06-09T20:00:00 Description: The SAP Upgrade tools for ABAP has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/67920 - https://service.sap.com/sap/support/notes/1915873 - http://seclists.org/fulldisclosure/2014/Jun/36 - http://scn.sap.com/docs/DOC-8218 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6029.
CVE ID: CVE-2016-6029 Date Updated: 2024-09-16T22:56:01.377Z Date Published: 2017-08-14T22:00:00Z Description: IBM Emptoris Strategic Supply Management Platform 10.0 and 10.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 116881. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=swg22006799 - https://exchange.xforce.ibmcloud.com/vulnerabilities/116881 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6668.
CVE ID: CVE-2016-6668 Date Updated: 2024-08-06T01:36:29.463Z Date Published: 2017-01-23T21:00:00 Description: The Atlassian Hipchat Integration Plugin for Bitbucket Server 6.26.0 before 6.27.5, 6.28.0 before 7.3.7, and 7.4.0 before 7.8.17; Confluence HipChat plugin 6.26.0 before 7.8.17; and HipChat for JIRA plugin 6.26.0 before 7.8.17 allows remote attackers to obtain the secret key for communicating with HipChat instances by reading unspecified pages. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/539530/100/0/threaded - https://confluence.atlassian.com/bitbucketserver/bitbucket-server-security-advisory-2016-09-21-840698321.html - https://confluence.atlassian.com/doc/confluence-security-advisory-2016-09-21-849052104.html - http://www.securityfocus.com/bid/93159 - https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2016-09-21-849052099.html - http://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1565.001
The MITRE ATT&CK technique T1565.001: Stored Data Manipulation is related to the vulnerability CVE-CVE-2008-4996. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2021-33022.
CVE ID: CVE-2021-33022 Date Updated: 2024-08-03T23:42:19.159Z Date Published: 2022-04-01T22:17:20 Description: Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 - http://www.philips.com/productsecurity No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6459.
CVE ID: CVE-2008-6459 Date Updated: 2024-08-07T11:27:35.947Z Date Published: 2009-03-13T10:00:00 Description: SQL injection vulnerability in the auto BE User Registration (autobeuser) extension 0.0.2 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/45255 - http://osvdb.org/48272 - http://typo3.org/teams/security/security-bulletins/typo3-20080919-1/ - http://www.securityfocus.com/bid/31239 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-17797.
CVE ID: CVE-2018-17797 Date Updated: 2024-08-05T10:54:10.703Z Date Published: 2018-09-30T20:00:00 Description: An issue was discovered in zzcms 8.3. user/zssave.php allows remote attackers to delete arbitrary files via directory traversal sequences in the oldimg parameter in an action=modify request. This can be leveraged for database access by deleting install.lock. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/seedis/zzcms/blob/master/arbitrary_file_deletion1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1659.
CVE ID: CVE-2018-1659 Date Updated: 2024-09-16T23:45:40.107Z Date Published: 2018-09-25T16:00:00Z Description: IBM Rational Engineering Lifecycle Manager 5.0 through 5.02 and 6.0 through 6.0.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 144885. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/docview.wss?uid=ibm10731511 - https://exchange.xforce.ibmcloud.com/vulnerabilities/144885 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41942.
CVE ID: CVE-2023-41942 Date Updated: 2024-09-26T19:52:30.978Z Date Published: 2023-09-06T12:09:00.293Z Description: A cross-site request forgery (CSRF) vulnerability in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers to clear the SQS queue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3101%20(2) - http://www.openwall.com/lists/oss-security/2023/09/06/9 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15473.
CVE ID: CVE-2020-15473 Date Updated: 2024-08-04T13:15:20.783Z Date Published: 2020-07-01T10:54:17 Description: In nDPI through 3.2, the OpenVPN dissector is vulnerable to a heap-based buffer over-read in ndpi_search_openvpn in lib/protocols/openvpn.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ntop/nDPI/commit/8e7b1ea7a136cc4e4aa9880072ec2d69900a825e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-39919.
CVE ID: CVE-2022-39919 Date Updated: 2022-12-15T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2879.
CVE ID: CVE-2022-2879 Date Updated: 2024-08-03T00:52:59.498Z Date Published: 2022-10-14T00:00:00 Description: Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://go.dev/issue/54853 - https://go.dev/cl/439355 - https://groups.google.com/g/golang-announce/c/xtuG5faxtaU - https://pkg.go.dev/vuln/GO-2022-1037 - https://security.gentoo.org/glsa/202311-09 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-23727.
CVE ID: CVE-2020-23727 Date Updated: 2024-08-04T15:05:10.867Z Date Published: 2020-12-03T17:43:17 Description: There is a local denial of service vulnerability in the Antiy Zhijia Terminal Defense System 5.0.2.10121559 and an attacker can cause a computer crash (BSOD). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/y5s5k5/POCtemp3 - https://www.antiy.com - https://github.com/y5s5k5/CVE-2020-23727 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30661.
CVE ID: CVE-2023-30661 Date Updated: 2024-08-02T14:28:52.049Z Date Published: 2023-07-06T02:51:34.339Z Description: Exposure of Sensitive Information vulnerability in getChipInfos in UwbAospAdapterService prior to SMR Jul-2023 Release 1 allows local attackers to access the UWB chipset Identifier. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-0231.
CVE ID: CVE-2012-0231 Date Updated: 2024-08-06T18:16:19.834Z Date Published: 2012-03-15T18:00:00 Description: PRLicenseMgr.exe in the Proficy Server License Manager in GE Intelligent Platforms Proficy Plant Applications 5.0 and earlier allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted TCP session on port 12401. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/52434 - http://secunia.com/advisories/48415 - http://support.ge-ip.com/support/index?page=kbchannel&id=S:KB14766 - http://xforce.iss.net/xforce/xfdb/73957 - http://www.us-cert.gov/control_systems/pdf/ICSA-12-032-02.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18437.
CVE ID: CVE-2018-18437 Date Updated: 2024-08-05T11:08:21.836Z Date Published: 2018-10-23T21:00:00 Description: In AXIOS ITALIA Axioscloud Sissiweb Registro Elettronico 1.7.0, secret/relogoff.aspx has XSS via the Error_Desc parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.binaryworld.it/guidepoc.asp - https://www.exploit-db.com/exploits/45668/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3003.
CVE ID: CVE-2016-3003 Date Updated: 2024-08-05T23:40:14.504Z Date Published: 2016-09-26T01:00:00 Description: Cross-site scripting (XSS) vulnerability in the Web UI in IBM Connections 4.x through 4.5 CR5, 5.0 before CR4, and 5.5 before CR1 allows remote authenticated users to inject arbitrary web script or HTML via an embedded string, a different vulnerability than CVE-2016-3001 and CVE-2016-3006. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg1LO89962 - http://www.securityfocus.com/bid/93161 - https://www-01.ibm.com/support/docview.wss?uid=swg21989067 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40702.
CVE ID: CVE-2022-40702 Date Updated: 2024-08-03T12:21:46.639Z Date Published: 2024-01-17T16:51:05.932Z Description: Missing Authorization vulnerability in Zorem Advanced Local Pickup for WooCommerce.This issue affects Advanced Local Pickup for WooCommerce: from n/a through 1.5.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/advanced-local-pickup-for-woocommerce/wordpress-advanced-local-pickup-for-woocommerce-plugin-1-5-2-broken-access-control?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4216.
CVE ID: CVE-2018-4216 Date Updated: 2024-08-05T05:04:29.903Z Date Published: 2019-04-03T17:43:12 Description: A logic issue existed in the handling of call URLs. This issue was addressed with improved state management. This issue affected versions prior to iOS 11.4.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/kb/HT208938 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6609.
CVE ID: CVE-2024-6609 Date Updated: 2024-09-12T15:48:04.264Z Date Published: 2024-07-09T14:25:59.075Z Description: When almost out-of-memory an elliptic curve key which was never allocated could have been freed again. This vulnerability affects Firefox < 128 and Thunderbird < 128. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1839258 - https://www.mozilla.org/security/advisories/mfsa2024-29/ - https://www.mozilla.org/security/advisories/mfsa2024-32/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20605.
CVE ID: CVE-2022-20605 Date Updated: 2024-08-03T02:17:52.909Z Date Published: 2022-12-16T00:00:00 Description: In SAECOMM_CopyBufferBytes of SAECOMM_Utility.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-231722405References: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2022-12-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7979.
CVE ID: CVE-2017-7979 Date Updated: 2024-08-05T16:19:29.630Z Date Published: 2017-04-19T23:00:00 Description: The cookie feature in the packet action API implementation in net/sched/act_api.c in the Linux kernel 4.11.x through 4.11-rc7 mishandles the tb nlattr array, which allows local users to cause a denial of service (uninitialized memory access and refcount underflow, and system hang or crash) or possibly have unspecified other impact via "tc filter add" commands in certain contexts. NOTE: this does not affect stable kernels, such as 4.10.x, from kernel.org. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://marc.info/?l=linux-netdev&m=149251041420195 - https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1682368 - https://bugzilla.proxmox.com/show_bug.cgi?id=1351 - http://marc.info/?l=linux-netdev&m=149200742616349 - http://marc.info/?l=linux-netdev&m=149200746116365 - http://marc.info/?l=linux-netdev&m=149251041420194 - http://marc.info/?l=linux-netdev&m=149200746116366 - http://www.securityfocus.com/bid/97969 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1078
The MITRE ATT&CK technique T1078 : Valid Accounts is related to the vulnerability CVE-CVE-2020-15105. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as secondary_impact.
Provide detailed information about CVE-2021-46914.
CVE ID: CVE-2021-46914 Date Updated: 2024-08-04T05:17:42.986Z Date Published: 2024-02-27T06:53:53.508Z Description: In the Linux kernel, the following vulnerability has been resolved: ixgbe: fix unbalanced device enable/disable in suspend/resume pci_disable_device() called in __ixgbe_shutdown() decreases dev->enable_cnt by 1. pci_enable_device_mem() which increases dev->enable_cnt by 1, was removed from ixgbe_resume() in commit 6f82b2558735 ("ixgbe: use generic power management"). This caused unbalanced increase/decrease. So add pci_enable_device_mem() back. Fix the following call trace. ixgbe 0000:17:00.1: disabling already-disabled device Call Trace: __ixgbe_shutdown+0x10a/0x1e0 [ixgbe] ixgbe_suspend+0x32/0x70 [ixgbe] pci_pm_suspend+0x87/0x160 ? pci_pm_freeze+0xd0/0xd0 dpm_run_callback+0x42/0x170 __device_suspend+0x114/0x460 async_suspend+0x1f/0xa0 async_run_entry_fn+0x3c/0xf0 process_one_work+0x1dd/0x410 worker_thread+0x34/0x3f0 ? cancel_delayed_work+0x90/0x90 kthread+0x14c/0x170 ? kthread_park+0x90/0x90 ret_from_fork+0x1f/0x30 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/be07581aacae7cd0a073afae8e8862032f794309 - https://git.kernel.org/stable/c/f1b4be4a753caa4056496f679d70550d0c11a264 - https://git.kernel.org/stable/c/debb9df311582c83fe369baa35fa4b92e8a9c58a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14207.
CVE ID: CVE-2019-14207 Date Updated: 2024-08-05T00:12:42.492Z Date Published: 2019-07-21T18:17:18 Description: An issue was discovered in Foxit PhantomPDF before 8.3.11. The application could crash when calling the clone function due to an endless loop resulting from confusing relationships between a child and parent object (caused by an append error). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.foxitsoftware.com/support/security-bulletins.php - http://www.securityfocus.com/bid/109314 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29113.
CVE ID: CVE-2021-29113 Date Updated: 2024-09-17T02:52:12.478Z Date Published: 2021-12-07T10:48:48.897153Z Description: A remote file inclusion vulnerability in the ArcGIS Server help documentation may allow a remote, unauthenticated attacker to inject attacker supplied html into a page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/arcgis-server-security-2021-update-2-patch-is-now-available No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1768.
CVE ID: CVE-2008-1768 Date Updated: 2024-08-07T08:32:01.266Z Date Published: 2008-04-24T18:00:00 Description: Multiple integer overflows in VLC before 0.8.6f allow remote attackers to cause a denial of service (crash) via the (1) MP4 demuxer, (2) Real demuxer, and (3) Cinepak codec, which triggers a buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.videolan.org/security/sa0803.php - http://www.securityfocus.com/bid/28903 - http://www.videolan.org/developers/vlc/NEWS - http://security.gentoo.org/glsa/glsa-200804-25.xml - http://wiki.videolan.org/Changelog/0.8.6f - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14412 - http://secunia.com/advisories/29800 - http://secunia.com/advisories/29503 - http://www.vupen.com/english/advisories/2008/0985 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47037.
CVE ID: CVE-2021-47037 Date Updated: 2024-08-04T05:24:38.694Z Date Published: 2024-02-28T08:13:44.683Z Description: In the Linux kernel, the following vulnerability has been resolved: ASoC: q6afe-clocks: fix reprobing of the driver Q6afe-clocks driver can get reprobed. For example if the APR services are restarted after the firmware crash. However currently Q6afe-clocks driver will oops because hw.init will get cleared during first _probe call. Rewrite the driver to fill the clock data at runtime rather than using big static array of clocks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/6893df3753beafa5f7351228a9dd8157a57d7492 - https://git.kernel.org/stable/c/62413972f5266568848a36fd15160397b211fa74 - https://git.kernel.org/stable/c/96fadf7e8ff49fdb74754801228942b67c3eeebd No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4783.
CVE ID: CVE-2023-4783 Date Updated: 2024-08-02T07:38:00.700Z Date Published: 2023-10-16T19:39:04.294Z Description: The Magee Shortcodes WordPress plugin through 2.1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/02928db8-ceb3-471a-b626-ca661d073e4f No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23811.
CVE ID: CVE-2024-23811 Date Updated: 2024-08-27T14:27:23.272Z Date Published: 2024-02-13T09:00:23.301Z Description: A vulnerability has been identified in SINEC NMS (All versions < V2.0 SP1). The affected application allows users to upload arbitrary files via TFTP. This could allow an attacker to upload malicious firmware images or other files, that could potentially lead to remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/html/ssa-943925.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4255.
CVE ID: CVE-2011-4255 Date Updated: 2024-09-16T23:56:04.028Z Date Published: 2011-11-24T11:00:00Z Description: Unspecified vulnerability in RealNetworks RealPlayer before 15.0.0 and Mac RealPlayer before 12.0.0.1703 allows remote attackers to execute arbitrary code via an invalid codec name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://service.real.com/realplayer/security/11182011_player/en/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5427.
CVE ID: CVE-2017-5427 Date Updated: 2024-08-05T15:04:13.318Z Date Published: 2018-06-11T21:00:00 Description: A non-existent chrome.manifest file will attempt to be loaded during startup from the primary installation directory. If a malicious user with local access puts chrome.manifest and other referenced files in this directory, they will be loaded and activated during startup. This could result in malicious software being added without consent or modification of referenced installed files. This vulnerability affects Firefox < 52. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1295542 - https://www.mozilla.org/security/advisories/mfsa2017-05/ - http://www.securitytracker.com/id/1037966 - http://www.securityfocus.com/bid/96692 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3969.
CVE ID: CVE-2015-3969 Date Updated: 2024-08-06T06:04:01.141Z Date Published: 2015-10-28T10:00:00 Description: Janitza UMG 508, 509, 511, 604, and 605 devices allow remote attackers to obtain sensitive network-connection information via a request to UDP port (1) 1234 or (2) 1235. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14497.
CVE ID: CVE-2018-14497 Date Updated: 2024-08-05T09:29:51.642Z Date Published: 2018-08-03T16:00:00 Description: Tenda D152 ADSL routers allow XSS via a crafted SSID. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/45336/ - https://sandipdeyhack7.blogspot.com/2018/07/cve-2018-14497-tenda-d152-adsl-routers_24.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33822.
CVE ID: CVE-2021-33822 Date Updated: 2024-08-03T23:58:23.111Z Date Published: 2021-06-18T18:47:47 Description: An issue was discovered on 4GEE ROUTER HH70VB Version HH70_E1_02.00_22. Attackers can use slowhttptest tool to send incomplete HTTP request, which could make server keep waiting for the packet to finish the connection, until its resource exhausted. Then the web server is denial-of-service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/shekyan/slowhttptest - https://www.sing4g.com/product-page/4gee-router-hh70vb-4g-300mbps-2lan-32wifi - https://github.com/Jian-Xian/CVE-POC/blob/master/CVE-2021-33822.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-25772.
CVE ID: CVE-2021-25772 Date Updated: 2024-08-03T20:11:28.274Z Date Published: 2021-02-03T15:33:26 Description: In JetBrains TeamCity before 2020.2.2, TeamCity server DoS was possible via server integration. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.jetbrains.com - https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4074.
CVE ID: CVE-2014-4074 Date Updated: 2024-08-06T11:04:27.935Z Date Published: 2014-09-10T01:00:00 Description: The Task Scheduler in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via an application that schedules a crafted task, aka "Task Scheduler Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1030820 - https://exchange.xforce.ibmcloud.com/vulnerabilities/95542 - http://www.securityfocus.com/bid/69593 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-054 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15982.
CVE ID: CVE-2019-15982 Date Updated: 2024-09-17T01:36:55.688Z Date Published: 2020-01-06T07:45:35.686907Z Description: Multiple vulnerabilities in the REST and SOAP API endpoints and the Application Framework feature of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct directory traversal attacks on an affected device. To exploit these vulnerabilities, an attacker would need administrative privileges on the DCNM application. For more information about these vulnerabilities, see the Details section of this advisory. Note: The severity of these vulnerabilities is aggravated by the vulnerabilities described in the Cisco Data Center Network Manager Authentication Bypass Vulnerabilities advisory, published simultaneously with this one. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200102-dcnm-path-trav No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36229.
CVE ID: CVE-2024-36229 Date Updated: 2024-08-02T03:30:13.144Z Date Published: 2024-06-13T07:53:51.846Z Description: Adobe Experience Manager versions 6.5.20 and earlier Answer: are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a specially crafted link or to submit a malicious form. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6082.
CVE ID: CVE-2008-6082 Date Updated: 2024-08-07T11:20:24.598Z Date Published: 2009-02-06T11:00:00 Description: Titan FTP Server 6.26 build 630 allows remote attackers to cause a denial of service (CPU consumption) via the SITE WHO command. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32269 - http://www.securityfocus.com/bid/31757 - http://www.osvdb.org/49177 - https://www.exploit-db.com/exploits/6753 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45871 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4373.
CVE ID: CVE-2023-4373 Date Updated: 2024-10-03T17:54:55.052Z Date Published: 2023-08-21T18:36:23.305Z Description: Inadequate validation of permissions when employing remote tools and macros within Devolutions Remote Desktop Manager versions 2023.2.19 and earlier permits a user to initiate a connection without proper execution rights via the remote tools feature. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://devolutions.net/security/advisories/DEVO-2023-0015/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4432.
CVE ID: CVE-2013-4432 Date Updated: 2024-08-06T16:45:13.524Z Date Published: 2014-05-19T14:00:00 Description: Mahara before 1.5.13, 1.6.x before 1.6.8, and 1.7.x before 1.7.4 does not properly restrict access to folders, which allows remote authenticated users to read arbitrary folders (1) by leveraging an active folder tab loaded before permissions were removed or (2) via the folder parameter to artefact/file/groupfiles.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2013/10/08/3 - https://mahara.org/interaction/forum/topic.php?id=5864 - http://www.openwall.com/lists/oss-security/2013/10/15/1 - http://www.openwall.com/lists/oss-security/2013/10/16/7 - https://bugs.launchpad.net/mahara/+bug/1034180 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38088.
CVE ID: CVE-2021-38088 Date Updated: 2024-08-04T01:30:09.083Z Date Published: 2021-08-12T13:38:10 Description: Acronis Cyber Protect 15 for Windows prior to build 27009 allowed local privilege escalation via binary hijacking. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.acronis.com/content/68564 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5468.
CVE ID: CVE-2017-5468 Date Updated: 2024-08-05T15:04:14.734Z Date Published: 2018-06-11T21:00:00 Description: An issue with incorrect ownership model of "privateBrowsing" information exposed through developer tools. This can result in a non-exploitable crash when manually triggered during debugging. This vulnerability affects Firefox < 53. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1329521 - https://www.mozilla.org/security/advisories/mfsa2017-10/ - http://www.securityfocus.com/bid/97940 - http://www.securitytracker.com/id/1038320 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2950.
CVE ID: CVE-2024-2950 Date Updated: 2024-08-01T19:32:42.518Z Date Published: 2024-04-06T03:24:44.633Z Description: The BoldGrid Easy SEO – Simple and Effective SEO plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.6.14 via meta information (og:description) This makes it possible for unauthenticated attackers to view the first 130 characters of a password protected post which can contain sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/d502e617-a59f-4385-b050-3702a1b1ed7e?source=cve - https://plugins.trac.wordpress.org/browser/boldgrid-easy-seo/tags/1.6.15/includes/class-boldgrid-seo-admin.php?rev=3064911 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36432.
CVE ID: CVE-2024-36432 Date Updated: 2024-08-02T03:37:05.147Z Date Published: 2024-07-15T00:00:00 Description: An arbitrary memory write vulnerability was discovered in Supermicro X11DPG-HGX2, X11PDG-QT, X11PDG-OT, and X11PDG-SN motherboards with BIOS firmware before 4.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.supermicro.com/en/support/security_center#%21advisories - https://www.supermicro.com/zh_tw/support/security_BIOS_Jul_2024 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10027.
CVE ID: CVE-2016-10027 Date Updated: 2024-08-06T03:07:31.883Z Date Published: 2017-01-12T23:00:00 Description: Race condition in the XMPP library in Smack before 4.1.9, when the SecurityMode.required TLS setting has been set, allows man-in-the-middle attackers to bypass TLS protections and trigger use of cleartext for client authentication by stripping the "starttls" feature from a server response. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/igniterealtime/Smack/commit/059ee99ba0d5ff7758829acf5a9aeede09ec820b - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4WXAZ4JVJXHMEDDXJVWJHPVBF5QCTZF/ - http://www.securityfocus.com/bid/95129 - https://issues.igniterealtime.org/projects/SMACK/issues/SMACK-739 - https://github.com/igniterealtime/Smack/commit/a9d5cd4a611f47123f9561bc5a81a4555fe7cb04 - http://www.openwall.com/lists/oss-security/2016/12/22/12 - https://community.igniterealtime.org/blogs/ignite/2016/11/22/smack-security-advisory-2016-11-22 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0629.
CVE ID: CVE-2024-0629 Date Updated: 2024-08-01T18:11:35.678Z Date Published: 2024-05-02T16:52:33.005Z Description: The 2Checkout Payment Gateway for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the sniff_ins function in all versions up to, and including, 6.2. This makes it possible for unauthenticated attackers to make changes to orders and mark them as paid. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/bcc6a4a5-b133-4ee1-a345-a7c812624b03?source=cve - https://wordpress.org/plugins/woocommerce-2checkout-payment/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9407.
CVE ID: CVE-2019-9407 Date Updated: 2024-08-04T21:46:30.514Z Date Published: 2019-09-27T18:05:18 Description: In notification management of the service manager, there is a possible permissions bypass. This could lead to local escalation of privilege by preventing user notification, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112434609 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/android-10 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5564.
CVE ID: CVE-2012-5564 Date Updated: 2024-08-06T21:14:15.529Z Date Published: 2013-02-14T22:00:00Z Description: android-tools 4.1.1 in Android Debug Bridge (ADB) allows local users to overwrite arbitrary files via a symlink attack on /tmp/adb.log. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2012/11/23/8 - https://bugzilla.redhat.com/show_bug.cgi?id=879582 - http://www.securityfocus.com/bid/56653 - http://www.openwall.com/lists/oss-security/2012/11/23/1 - http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098532.html - http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098527.html - http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098529.html - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688280 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16297.
CVE ID: CVE-2017-16297 Date Updated: 2024-08-05T20:20:05.476Z Date Published: 2023-01-11T21:39:52.818Z Description: Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_schd, at 0x9d01a21c, the value for the `oncmd` key is copied using `strcpy` to the buffer at `$sp+0x2d0`.This buffer is 100 bytes large, sending anything longer will cause a buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-25676.
CVE ID: CVE-2021-25676 Date Updated: 2024-08-03T20:11:27.563Z Date Published: 2021-03-15T17:03:31 Description: A vulnerability has been identified in RUGGEDCOM RM1224 (V6.3), SCALANCE M-800 (V6.3), SCALANCE S615 (V6.3), SCALANCE SC-600 (All Versions >= V2.1 and < V2.1.3). Multiple failed SSH authentication attempts could trigger a temporary Denial-of-Service under certain conditions. When triggered, the device will reboot automatically. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-296266.pdf - https://us-cert.cisa.gov/ics/advisories/icsa-21-068-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7465.
CVE ID: CVE-2017-7465 Date Updated: 2024-08-05T16:04:11.524Z Date Published: 2018-06-27T16:00:00 Description: It was found that the JAXP implementation used in JBoss EAP 7.0 for XSLT processing is vulnerable to code injection. An attacker could use this flaw to cause remote code execution if they are able to provide XSLT content for parsing. Doing a transform in JAXP requires the use of a 'javax.xml.transform.TransformerFactory'. If the FEATURE_SECURE_PROCESSING feature is set to 'true', it mitigates this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7465 - http://www.securityfocus.com/bid/97605 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4231.
CVE ID: CVE-2013-4231 Date Updated: 2024-08-06T16:38:01.563Z Date Published: 2014-01-19T15:00:00 Description: Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c. NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://bugzilla.maptools.org/show_bug.cgi?id=2450 - http://rhn.redhat.com/errata/RHSA-2014-0223.html - http://www.debian.org/security/2013/dsa-2744 - http://secunia.com/advisories/54543 - https://bugzilla.redhat.com/show_bug.cgi?id=995965 - http://www.asmail.be/msg0055359936.html - http://secunia.com/advisories/54628 - http://www.openwall.com/lists/oss-security/2013/08/10/2 - http://www.securityfocus.com/bid/61695 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6955.
CVE ID: CVE-2008-6955 Date Updated: 2024-08-07T11:49:02.655Z Date Published: 2009-08-12T10:00:00 Description: mxCamArchive 2.2 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain configuration details and passwords via a direct request for archive/config.ini. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/7136 - http://www.securityfocus.com/bid/32324 - http://secunia.com/advisories/32751 - http://osvdb.org/49886 - https://exchange.xforce.ibmcloud.com/vulnerabilities/46647 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1600.
CVE ID: CVE-2020-1600 Date Updated: 2024-09-17T02:26:34.432Z Date Published: 2020-01-15T08:40:33.912746Z Description: In a Point-to-Multipoint (P2MP) Label Switched Path (LSP) scenario, an uncontrolled resource consumption vulnerability in the Routing Protocol Daemon (RPD) in Juniper Networks Junos OS allows a specific SNMP request to trigger an infinite loop causing a high CPU usage Denial of Service (DoS) condition. This issue affects both SNMP over IPv4 and IPv6. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D90; 15.1 versions prior to 15.1R7-S6; 15.1X49 versions prior to 15.1X49-D200; 15.1X53 versions prior to 15.1X53-D238, 15.1X53-D592; 16.1 versions prior to 16.1R7-S5; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R3-S1; 17.2 versions prior to 17.2R3-S2; 17.3 versions prior to 17.3R3-S7; 17.4 versions prior to 17.4R2-S4, 17.4R3; 18.1 versions prior to 18.1R3-S5; 18.2 versions prior to 18.2R3; 18.2X75 versions prior to 18.2X75-D50; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://prsearch.juniper.net/InfoCenter/index?page=prcontent&id=PR1402185 - https://kb.juniper.net/JSA10979 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14759.
CVE ID: CVE-2019-14759 Date Updated: 2024-08-05T00:26:38.976Z Date Published: 2020-09-14T19:17:29 Description: An issue was discovered in KaiOS 1.0, 2.5, and 2.5.1. The pre-installed Radio application is vulnerable to HTML and JavaScript injection attacks. A local attacker can inject arbitrary HTML into the Radio application. At a bare minimum, this allows an attacker to take control over the Radio application's UI (e.g., display a malicious prompt to the user asking them to re-enter credentials such as their KaiOS credentials to continue using the application) and also allows an attacker to abuse any of the privileges available to the mobile application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.nccgroup.trust/us/our-research/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20827.
CVE ID: CVE-2023-20827 Date Updated: 2024-08-02T09:14:41.051Z Date Published: 2023-09-04T02:27:27.371Z Description: In ims service, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937105; Issue ID: ALPS07937105. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/September-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-35926.
CVE ID: CVE-2024-35926 Date Updated: 2024-08-02T03:21:49.139Z Date Published: 2024-05-19T10:10:36.420Z Description: In the Linux kernel, the following vulnerability has been resolved: crypto: iaa - Fix async_disable descriptor leak The disable_async paths of iaa_compress/decompress() don't free idxd descriptors in the async_disable case. Currently this only happens in the testcases where req->dst is set to null. Add a test to free them in those paths. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/d994f7d77aaded05dc05af58a2720fd4f4b72a83 - https://git.kernel.org/stable/c/262534ddc88dfea7474ed18adfecf856e4fbe054 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-10053.
CVE ID: CVE-2015-10053 Date Updated: 2024-08-06T08:58:26.523Z Date Published: 2023-01-16T11:58:03.167Z Description: A vulnerability classified as critical has been found in prodigasistemas curupira up to 0.1.3. Affected is an unknown function of the file app/controllers/curupira/passwords_controller.rb. The manipulation leads to sql injection. Upgrading to version 0.1.4 is able to address this issue. The patch is identified as 93a9a77896bb66c949acb8e64bceafc74bc8c271. It is recommended to upgrade the affected component. VDB-218394 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.218394 - https://vuldb.com/?ctiid.218394 - https://github.com/prodigasistemas/curupira/commit/93a9a77896bb66c949acb8e64bceafc74bc8c271 - https://github.com/prodigasistemas/curupira/releases/tag/v0.1.4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6604.
CVE ID: CVE-2014-6604 Date Updated: 2024-08-06T12:24:34.333Z Date Published: 2018-03-29T18:00:00 Description: Cross-site scripting (XSS) vulnerability in class-s2-list-table.php in the Subscribe2 plugin before 10.16 for WordPress allows remote attackers to inject arbitrary web script or HTML via the ip parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://plugins.trac.wordpress.org/changeset/993564/subscribe2 - http://barmat.io/blog/2014/10/01/stored-xss-vulnerability-in-the-wordpress-plugin-subscribe2/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4103.
CVE ID: CVE-2014-4103 Date Updated: 2024-08-06T11:04:28.475Z Date Published: 2014-09-10T01:00:00 Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2799, CVE-2014-4059, CVE-2014-4065, CVE-2014-4079, CVE-2014-4081, CVE-2014-4083, CVE-2014-4085, CVE-2014-4088, CVE-2014-4090, CVE-2014-4094, CVE-2014-4097, CVE-2014-4100, CVE-2014-4104, CVE-2014-4105, CVE-2014-4106, CVE-2014-4107, CVE-2014-4108, CVE-2014-4109, CVE-2014-4110, and CVE-2014-4111. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1030818 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052 - http://www.securityfocus.com/bid/69611 - https://exchange.xforce.ibmcloud.com/vulnerabilities/95533 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3616.
CVE ID: CVE-2015-3616 Date Updated: 2024-08-06T05:47:57.724Z Date Published: 2017-08-11T21:00:00 Description: SQL injection vulnerability in Fortinet FortiManager 5.0.x before 5.0.11, 5.2.x before 5.2.2 allows remote attackers to execute arbitrary commands via unspecified parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/74444 - https://fortiguard.com/psirt/FG-IR-15-011 - http://www.securitytracker.com/id/1032188 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9470.
CVE ID: CVE-2020-9470 Date Updated: 2024-08-04T10:26:16.364Z Date Published: 2020-03-07T00:20:48 Description: An issue was discovered in Wing FTP Server 6.2.5 before February 2020. Due to insecure permissions when handling session cookies, a local user may view the contents of the session and session_admin directories, which expose active session cookies within the Wing FTP HTTP interface and administration panel. These cookies may be used to hijack user and administrative sessions, including the ability to execute Lua commands as root within the administration panel. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.hooperlabs.xyz/disclosures/cve-2020-9470.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-5205.
CVE ID: CVE-2020-5205 Date Updated: 2024-08-04T08:22:08.880Z Date Published: 2020-01-09T02:05:14 Description: In Pow (Hex package) before 1.0.16, the use of Plug.Session in Pow.Plug.Session is susceptible to session fixation attacks if a persistent session store is used for Plug.Session, such as Redis or a database. Cookie store, which is used in most Phoenix apps, doesn't have this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/danschultzer/pow/security/advisories/GHSA-v2wf-c3j6-wpvw - https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f - https://github.com/danschultzer/pow/blob/master/CHANGELOG.md#v1016-2020-01-07 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3447.
CVE ID: CVE-2016-3447 Date Updated: 2024-08-05T23:56:13.579Z Date Published: 2016-04-21T10:00:00 Description: Unspecified vulnerability in the Oracle Applications Framework component in Oracle E-Business Suite 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect confidentiality and integrity via vectors related to OAF Core. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html - http://www.securitytracker.com/id/1035603 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27220.
CVE ID: CVE-2021-27220 Date Updated: 2024-08-03T20:40:47.475Z Date Published: 2021-03-31T21:50:56 Description: An issue was discovered in PRTG Network Monitor before 21.1.66.1623. By invoking the screenshot functionality with prepared context paths, an attacker is able to verify the existence of certain files on the filesystem of the PRTG's Web server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.paessler.com/prtg/history/stable#21.1.66.1623 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3822.
CVE ID: CVE-2011-3822 Date Updated: 2024-09-16T19:36:38.104Z Date Published: 2011-09-24T00:00:00Z Description: XOOPS 2.5.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/system/xoops_version.php and certain other files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2011/06/27/6 - http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/xoops-2.5.0 - http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39841.
CVE ID: CVE-2024-39841 Date Updated: 2024-08-23T17:27:36.442Z Date Published: 2024-08-23T00:00:00 Description: A SQL Injection vulnerability exists in the service configuration functionality in Centreon Web 24.04.x before 24.04.3, 23.10.x before 23.10.13, 23.04.x before 23.04.19, and 22.10.x before 22.10.23. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/centreon/centreon/releases - https://thewatch.centreon.com/latest-security-bulletins-64/security-bulletin-for-centreon-web-3744 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4323.
CVE ID: CVE-2019-4323 Date Updated: 2024-08-04T19:33:37.933Z Date Published: 2020-07-07T14:49:46 Description: "HCL AppScan Enterprise advisory API documentation is susceptible to clickjacking, which could allow an attacker to embed the contents of untrusted web pages in a frame." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0080572 - https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0080572&sys_kb_id=3668a078dbb9101855f38d6d13961955 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19931.
CVE ID: CVE-2019-19931 Date Updated: 2024-08-05T02:32:09.532Z Date Published: 2019-12-23T02:02:13 Description: In libIEC61850 1.4.0, MmsValue_decodeMmsData in mms/iso_mms/server/mms_access_result.c has a heap-based buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/mz-automation/libiec61850/issues/194 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4691.
CVE ID: CVE-2012-4691 Date Updated: 2024-09-16T16:37:42.622Z Date Published: 2012-12-18T11:00:00Z Description: Memory leak in Siemens Automation License Manager (ALM) 4.x and 5.x before 5.2 allows remote attackers to cause a denial of service (memory consumption) via crafted packets. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.us-cert.gov/control_systems/pdf/ICSA-12-349-01.pdf - http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-783261.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3429.
CVE ID: CVE-2020-3429 Date Updated: 2024-09-16T20:33:00.558Z Date Published: 2020-09-24T17:53:12.157634Z Description: A vulnerability in the WPA2 and WPA3 security implementation of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect packet processing during the WPA2 and WPA3 authentication handshake when configured for dot1x or pre-shared key (PSK) authentication key management (AKM) with 802.11r BSS Fast Transition (FT) enabled. An attacker could exploit this vulnerability by sending a crafted authentication packet to an affected device. A successful exploit could cause an affected device to reload, resulting in a DoS condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wpa-dos-cXshjerc No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2766.
CVE ID: CVE-2022-2766 Date Updated: 2024-08-03T00:46:04.477Z Date Published: 2022-08-11T09:30:29 Description: A vulnerability was found in SourceCodester Loan Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-206162 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Drun1baby/CVE_Pentest/blob/main/Loan%20Management%20System%20CMS/images/sql01.png - https://vuldb.com/?id.206162 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41547.
CVE ID: CVE-2021-41547 Date Updated: 2024-08-04T03:15:28.522Z Date Published: 2021-12-14T12:06:36 Description: A vulnerability has been identified in Teamcenter Active Workspace V4.3 (All versions < V4.3.11), Teamcenter Active Workspace V5.0 (All versions < V5.0.10), Teamcenter Active Workspace V5.1 (All versions < V5.1.6), Teamcenter Active Workspace V5.2 (All versions < V5.2.3). The application contains an unsafe unzipping pattern that could lead to a zip path traversal attack. This could allow and attacker to execute a remote shell with admin rights. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-133772.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0441.
CVE ID: CVE-2009-0441 Date Updated: 2024-08-07T04:31:26.257Z Date Published: 2009-02-05T20:00:00 Description: PHP remote file inclusion vulnerability in skin_shop/standard/2_view_body/body_default.php in TECHNOTE 7.2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the shop_this_skin_path parameter, a different vector than CVE-2008-4138. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/33592 - http://secunia.com/advisories/33732 - https://www.exploit-db.com/exploits/7965 - http://osvdb.org/51740 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-7399.
CVE ID: CVE-2024-7399 Date Updated: 2024-08-09T15:31:30.338Z Date Published: 2024-08-09T04:43:29.828Z Description: Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1050 allows attackers to write arbitrary file as system authority. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungtv.com/securityUpdates No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25923.
CVE ID: CVE-2022-25923 Date Updated: 2024-08-03T04:49:44.455Z Date Published: 2023-01-06T05:00:01.298Z Description: Versions of the package exec-local-bin before 1.2.0 are vulnerable to Command Injection via the theProcess() functionality due to improper user-input sanitization. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.snyk.io/vuln/SNYK-JS-EXECLOCALBIN-3157956 - https://github.com/saeedseyfi/exec-local-bin/blob/92db00bde9d6e2d83410849f898df12f075b73b0/index.js%23L9 - https://github.com/saeedseyfi/exec-local-bin/commit/d425866375c85038133a6f79db2aac66c0a72624 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1303.
CVE ID: CVE-2023-1303 Date Updated: 2024-08-02T05:41:00.001Z Date Published: 2023-03-09T21:48:49.584Z Description: A vulnerability was found in UCMS 1.6 and classified as critical. This issue affects some unknown processing of the file sadmin/fileedit.php of the component System File Management Module. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-222683. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.222683 - https://vuldb.com/?ctiid.222683 - https://github.com/yztale/taley/blob/main/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43050.
CVE ID: CVE-2022-43050 Date Updated: 2024-08-03T13:26:02.482Z Date Published: 2022-11-07T00:00:00 Description: Online Tours & Travels Management System v1.0 was discovered to contain an arbitrary file upload vulnerability in the component update_profile.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/1909900436/bug_report/blob/main/vendors/mayuri_k/online-tours-travels-management-system/RCE-1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-17029.
CVE ID: CVE-2020-17029 Date Updated: 2024-09-10T15:51:46.558Z Date Published: 2020-11-11T06:48:09 Description: Windows Canonical Display Driver Information Disclosure Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17029 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-22835.
CVE ID: CVE-2023-22835 Date Updated: 2024-08-02T10:20:30.836Z Date Published: 2023-07-10T20:58:14.697Z Description: A security defect was identified that enabled a user of Foundry Issues to perform a Denial of Service attack by submitting malformed data in an Issue that caused loss of frontend functionality to all issue participants. This defect was resolved with the release of Foundry Issues 2.510.0 and Foundry Frontend 6.228.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://palantir.safebase.us/?tcuUid=0e2e79bd-cc03-42a8-92c2-c0e68a1ea53d No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0507.
CVE ID: CVE-2011-0507 Date Updated: 2024-08-06T21:58:25.638Z Date Published: 2011-01-20T18:00:00 Description: FTPService.exe in Blackmoon FTP 3.1 Build 1735 and Build 1736 (3.1.7.1736), and possibly other versions before 3.1.8.1737, allows remote attackers to cause a denial of service (crash) via a large number of PORT commands with long arguments, which triggers a NULL pointer dereference. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/64696 - http://www.securityfocus.com/bid/45814 - http://osvdb.org/70452 - http://secunia.com/advisories/42933 - http://www.exploit-db.com/exploits/15986 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49807.
CVE ID: CVE-2023-49807 Date Updated: 2024-08-02T22:01:26.024Z Date Published: 2023-12-26T07:21:11.658Z Description: Stored cross-site scripting vulnerability when processing the MathJax exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/ - https://jvn.jp/en/jp/JVN18715935/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5147.
CVE ID: CVE-2019-5147 Date Updated: 2024-08-04T19:47:56.667Z Date Published: 2020-01-25T17:53:12 Description: An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13003.1007. A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0936 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30451.
CVE ID: CVE-2023-30451 Date Updated: 2024-08-02T14:21:44.837Z Date Published: 2023-12-25T00:00:00 Description: In TYPO3 11.5.24, the filelist component allows attackers (who have access to the administrator panel) to read arbitrary files via directory traversal in the baseuri field, as demonstrated by POST /typo3/record/edit with ../../../ in data[sys_file_storage]*[data][sDEF][lDEF][basePath][vDEF]. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/176274/TYPO3-11.5.24-Path-Traversal.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39467.
CVE ID: CVE-2023-39467 Date Updated: 2024-08-02T18:10:20.678Z Date Published: 2024-05-03T01:59:29.616Z Description: Triangle MicroWorks SCADA Data Gateway certificate Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Triangle MicroWorks SCADA Data Gateway. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of certificate web directory. The issue results from the exposure of sensitive information in the application webroot. An attacker can leverage this vulnerability to disclose sensitive information. Was ZDI-CAN-20798. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-1035/ - https://www.trianglemicroworks.com/products/scada-data-gateway/what's-new No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3864.
CVE ID: CVE-2010-3864 Date Updated: 2024-08-07T03:26:11.631Z Date Published: 2010-11-17T15:00:00 Description: Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051170.html - http://marc.info/?l=bugtraq&m=132828103218869&w=2 - http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.668793 - http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 - http://www.vupen.com/english/advisories/2010/3041 - http://support.apple.com/kb/HT4723 - http://marc.info/?l=bugtraq&m=132828103218869&w=2 - http://securitytracker.com/id?1024743 - http://blogs.sun.com/security/entry/cve_2010_3864_race_condition - http://secunia.com/advisories/42413 - http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051255.html - http://openssl.org/news/secadv_20101116.txt - http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html - http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html - https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html - http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051237.html - http://www.kb.cert.org/vuls/id/737740 - https://rhn.redhat.com/errata/RHSA-2010-0888.html - http://secunia.com/advisories/42397 - http://marc.info/?l=bugtraq&m=130497251507577&w=2 - http://secunia.com/advisories/42241 - https://bugzilla.redhat.com/show_bug.cgi?id=649304 - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777 - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777 - http://marc.info/?l=bugtraq&m=129916880600544&w=2 - http://secunia.com/advisories/57353 - https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html - http://www.vupen.com/english/advisories/2010/3097 - http://www.adobe.com/support/security/bulletins/apsb11-11.html - http://secunia.com/advisories/42336 - http://secunia.com/advisories/42309 - http://www.vupen.com/english/advisories/2010/3077 - http://security.FreeBSD.org/advisories/FreeBSD-SA-10:10.openssl.asc - http://secunia.com/advisories/44269 - http://secunia.com/advisories/43312 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html - http://secunia.com/advisories/42243 - http://marc.info/?l=bugtraq&m=130497251507577&w=2 - http://www.vupen.com/english/advisories/2010/3121 - http://marc.info/?l=bugtraq&m=129916880600544&w=2 - http://secunia.com/advisories/42352 - http://www.securityfocus.com/archive/1/516397/100/0/threaded - http://www.debian.org/security/2010/dsa-2125 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5880.
CVE ID: CVE-2016-5880 Date Updated: 2024-08-06T01:15:10.023Z Date Published: 2017-02-01T20:00:00 Description: IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/94606 - http://www.securitytracker.com/id/1037383 - http://www.ibm.com/support/docview.wss?uid=swg21992835 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1877.
CVE ID: CVE-2010-1877 Date Updated: 2024-08-07T01:35:54.088Z Date Published: 2010-05-11T20:00:00 Description: SQL injection vulnerability in the JTM Reseller (com_jtm) component 1.9 Beta for Joomla! allows remote attackers to execute arbitrary SQL commands via the author parameter in a search action to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/39584 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57977 - http://packetstormsecurity.org/1004-exploits/joomlajtmreseller-sql.txt - http://www.exploit-db.com/exploits/12306 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46562.
CVE ID: CVE-2021-46562 Date Updated: 2024-08-04T05:10:35.145Z Date Published: 2022-02-18T19:44:20 Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14987. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 - https://www.zerodayinitiative.com/advisories/ZDI-22-149/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33853.
CVE ID: CVE-2021-33853 Date Updated: 2024-08-04T00:05:51.624Z Date Published: 2022-03-16T14:03:37 Description: A Cross-Site Scripting (XSS) attack can cause arbitrary code (javascript) to run in a user’s browser while the browser is connected to a trusted website. As the vehicle for the attack, the application targets the users and not the application itself. Additionally, the XSS payload is executed when the user attempts to access any page of the CRM. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cybersecurityworks.com/zerodays/cve-2021-33853-stored-cross-site-scripting-in-x2crm.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1672.
CVE ID: CVE-2008-1672 Date Updated: 2024-08-07T08:32:01.259Z Date Published: 2008-05-29T16:00:00 Description: OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html - http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.562004 - http://secunia.com/advisories/30852 - https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01029.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/42667 - http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=738400 - http://secunia.com/advisories/30460 - http://secunia.com/advisories/30825 - http://www.vupen.com/english/advisories/2008/1680 - http://www.securityfocus.com/archive/1/492932/100/0/threaded - http://www.ubuntu.com/usn/usn-620-1 - http://secunia.com/advisories/30868 - http://www.openssl.org/news/secadv_20080528.txt - http://security.gentoo.org/glsa/glsa-200806-08.xml - http://sourceforge.net/project/shownotes.php?release_id=615606 - http://secunia.com/advisories/31288 - http://secunia.com/advisories/30405 - http://www.securityfocus.com/bid/29405 - http://www.securitytracker.com/id?1020122 - http://www.vupen.com/english/advisories/2008/1937/references - http://secunia.com/advisories/31228 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:107 - http://www.kb.cert.org/vuls/id/520586 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0007.
CVE ID: CVE-2014-0007 Date Updated: 2024-08-06T08:58:26.563Z Date Published: 2014-06-20T14:00:00 Description: The Smart-Proxy in Foreman before 1.4.5 and 1.5.x before 1.5.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the path parameter to tftp/fetch_boot_file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://projects.theforeman.org/issues/6086 - http://rhn.redhat.com/errata/RHSA-2014-0770.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26655.
CVE ID: CVE-2022-26655 Date Updated: 2024-08-03T05:11:43.435Z Date Published: 2022-07-17T20:18:02 Description: Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.pexip.com/admin/security_bulletins.htm#CVE-2022-26655 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30721.
CVE ID: CVE-2023-30721 Date Updated: 2024-09-26T15:25:23.654Z Date Published: 2023-09-06T03:12:08.181Z Description: Insertion of sensitive information into log vulnerability in Locksettings prior to SMR Sep-2023 Release 1 allows a privileged local attacker to get lock screen match information from the log. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0503.
CVE ID: CVE-2014-0503 Date Updated: 2024-08-06T09:20:18.516Z Date Published: 2014-03-12T01:00:00 Description: Adobe Flash Player before 11.7.700.272 and 11.8.x through 12.0.x before 12.0.0.77 on Windows and OS X, and before 11.2.202.346 on Linux, allows remote attackers to bypass the Same Origin Policy via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00013.html - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00014.html - http://helpx.adobe.com/security/products/flash-player/apsb14-08.html - http://security.gentoo.org/glsa/glsa-201405-04.xml - http://rhn.redhat.com/errata/RHSA-2014-0289.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0647.
CVE ID: CVE-2013-0647 Date Updated: 2024-08-06T14:33:05.609Z Date Published: 2013-02-12T20:00:00 Description: Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-0638. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html - http://rhn.redhat.com/errata/RHSA-2013-0254.html - http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html - http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html - http://www.us-cert.gov/cas/techalerts/TA13-043A.html - http://www.adobe.com/support/security/bulletins/apsb13-05.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.