instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2016-7990.
CVE ID: CVE-2016-7990 Date Updated: 2024-08-06T02:13:21.617Z Date Published: 2016-10-31T10:00:00 Description: On Samsung Galaxy S4 through S7 devices, an integer overflow condition exists within libomacp.so when parsing OMACP messages (within WAP Push SMS messages) leading to a heap corruption that can result in Denial of Service and potentially remote code execution, a subset of SVE-2016-6542. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016 - http://www.securityfocus.com/bid/94086 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-25058.
CVE ID: CVE-2020-25058 Date Updated: 2024-08-04T15:26:09.330Z Date Published: 2020-08-31T20:45:29 Description: An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9, and 10 software. The network_management service does not properly restrict configuration changes. The LG ID is LVE-SMP-200012 (July 2020). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lgsecurity.lge.com/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3617.
CVE ID: CVE-2015-3617 Date Updated: 2024-08-06T05:47:58.136Z Date Published: 2017-08-22T15:00:00 Description: Fortinet FortiManager 5.0 before 5.0.11 and 5.2 before 5.2.2 allow local users to gain privileges via crafted CLI commands. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/74444 - https://fortiguard.com/psirt/FG-IR-15-011 - http://www.securitytracker.com/id/1032188 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10768.
CVE ID: CVE-2017-10768 Date Updated: 2024-08-05T17:50:11.565Z Date Published: 2017-07-05T19:00:00 Description: XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpInsertFreeBlock+0x00000000000001ca." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-10768 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30719.
CVE ID: CVE-2022-30719 Date Updated: 2024-08-03T06:56:13.812Z Date Published: 2022-06-07T17:58:03 Description: Improper input validation check logic vulnerability in libsmkvextractor prior to SMR Jun-2022 Release 1 allows attackers to trigger crash. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-23546.
CVE ID: CVE-2022-23546 Date Updated: 2024-08-03T03:43:46.508Z Date Published: 2023-01-05T18:10:08.048Z Description: In version 2.9.0.beta14 of Discourse, an open-source discussion platform, maliciously embedded urls can leak an admin's digest of recent topics, possibly exposing private information. A patch is available for version 2.9.0.beta15. There are no known workarounds for this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/discourse/discourse/security/advisories/GHSA-q9jp-xv4g-328f - https://github.com/discourse/discourse/commit/cf862e736565c6fa905c12b5dbe63d0bd056efb8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5779.
CVE ID: CVE-2014-5779 Date Updated: 2024-08-06T11:55:49.734Z Date Published: 2014-09-09T10:00:00 Description: The Jack'd - Gay Chat & Dating (aka mobi.jackd.android) application 1.9.0a for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/481913 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3503.
CVE ID: CVE-2009-3503 Date Updated: 2024-09-17T00:31:09.693Z Date Published: 2009-09-30T15:00:00Z Description: Multiple SQL injection vulnerabilities in search.aspx in BPowerHouse BPHolidayLettings 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) rid and (2) tid parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2009/2744 - http://secunia.com/advisories/36833 - http://packetstormsecurity.org/0909-exploits/bpholidaylettings-sql.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2686.
CVE ID: CVE-2023-2686 Date Updated: 2024-08-02T06:33:04.000Z Date Published: 2023-06-15T19:00:04.688Z Description: Buffer overflow in Wi-Fi Commissioning MicriumOS example in Silicon Labs Gecko SDK v4.2.3 or earlier allows connected device to write payload onto the stack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/SiliconLabs/gecko_sdk/releases - https://community.silabs.com/sfc/servlet.shepherd/document/download/0698Y00000U2sFvQAJ?operationContext=S1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47403.
CVE ID: CVE-2021-47403 Date Updated: 2024-08-04T05:39:59.005Z Date Published: 2024-05-21T15:03:57.344Z Description: In the Linux kernel, the following vulnerability has been resolved: ipack: ipoctal: fix module reference leak A reference to the carrier module was taken on every open but was only released once when the final reference to the tty struct was dropped. Fix this by taking the module reference and initialising the tty driver data when installing the tty. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/31398849b84ebae0d43a1cf379cb9895597f221a - https://git.kernel.org/stable/c/c0adb5a947dec6cff7050ec56d78ecd3916f9ce6 - https://git.kernel.org/stable/c/dde4c1429b97383689f755ce92b4ed1e84a9c92b - https://git.kernel.org/stable/c/9c5b77a7ffc983b2429ce158b50497c5d3c86a69 - https://git.kernel.org/stable/c/3253c87e1e5bc0107aab773af2f135ebccf38666 - https://git.kernel.org/stable/c/7cea848678470daadbfdaa6a112b823c290f900c - https://git.kernel.org/stable/c/811178f296b16af30264def74c8d2179a72d5562 - https://git.kernel.org/stable/c/bb8a4fcb2136508224c596a7e665bdba1d7c3c27 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43860.
CVE ID: CVE-2021-43860 Date Updated: 2024-08-04T04:10:17.171Z Date Published: 2022-01-12T00:00:00 Description: Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn't properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there's a null byte in the metadata file of an app. Therefore apps can grant themselves permissions without the consent of the user. Flatpak shows permissions to the user during install by reading them from the "xa.metadata" key in the commit metadata. This cannot contain a null terminator, because it is an untrusted GVariant. Flatpak compares these permissions to the *actual* metadata, from the "metadata" file to ensure it wasn't lied to. However, the actual metadata contents are loaded in several places where they are read as simple C-style strings. That means that, if the metadata file includes a null terminator, only the content of the file from *before* the terminator gets compared to xa.metadata. Thus, any permissions that appear in the metadata file after a null terminator are applied at runtime but not shown to the user. So maliciously crafted apps can give themselves hidden permissions. Users who have Flatpaks installed from untrusted sources are at risk in case the Flatpak has a maliciously crafted metadata file, either initially or in an update. This issue is patched in versions 1.12.3 and 1.10.6. As a workaround, users can manually check the permissions of installed apps by checking the metadata file or the xa.metadata key on the commit metadata. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/flatpak/flatpak/security/advisories/GHSA-qpjc-vq3c-572j - https://github.com/flatpak/flatpak/commit/54ec1a482dfc668127eaae57f135e6a8e0bc52da - https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042 - https://github.com/flatpak/flatpak/commit/93357d357119093804df05acc32ff335839c6451 - https://github.com/flatpak/flatpak/commit/ba818f504c926baaf6e362be8159cfacf994310e - https://github.com/flatpak/flatpak/commit/d9a8f9d8ccc0b7c1135d0ecde006a75d25f66aee - https://github.com/flatpak/flatpak/releases/tag/1.10.6 - https://github.com/flatpak/flatpak/releases/tag/1.12.3 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APFTBYGJJVJPFVHRXUW5PII5XOAFI4KH/ - https://www.debian.org/security/2022/dsa-5049 - https://security.gentoo.org/glsa/202312-12 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22556.
CVE ID: CVE-2022-22556 Date Updated: 2024-09-17T00:05:37.571Z Date Published: 2022-06-02T21:00:20.337640Z Description: Dell PowerStore contains an Uncontrolled Resource Consumption Vulnerability in PowerStore User Interface. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the Denial of Service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/000196367 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1565.001
The MITRE ATT&CK technique T1565.001: Stored Data Manipulation is related to the vulnerability CVE-CVE-2019-1863. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as secondary_impact.
Provide detailed information about CVE-2022-27168.
CVE ID: CVE-2022-27168 Date Updated: 2024-08-03T05:18:39.338Z Date Published: 2022-07-11T00:40:19 Description: Cross-site scripting vulnerability in LiteCart versions prior to 2.4.2 allows a remote attacker to inject an arbitrary script via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.litecart.net/en/ - https://github.com/litecart/litecart - https://github.com/litecart/litecart/commit/050fea86cc162f3da2f7824f586602125a0f6d63 - https://jvn.jp/en/jp/JVN32625020/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38729.
CVE ID: CVE-2021-38729 Date Updated: 2024-08-04T01:51:20.189Z Date Published: 2022-10-28T00:00:00 Description: SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Plist.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sem-cms.cn/wenda/view-56.html - https://github.com/BigTiger2020/SCSHOP/blob/main/semcms-5.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-4327.
CVE ID: CVE-2020-4327 Date Updated: 2024-09-16T18:29:46.621Z Date Published: 2020-06-24T14:10:21.695404Z Description: IBM Security Secret Server 10.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 177599. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6237260 - https://exchange.xforce.ibmcloud.com/vulnerabilities/177599 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-44377.
CVE ID: CVE-2023-44377 Date Updated: 2024-01-02T19:12:49.504Z Date Published: 2023-10-27T12:15:59.654Z Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-7118.
CVE ID: CVE-2024-7118 Date Updated: 2024-08-01T21:52:30.581Z Date Published: 2024-07-26T04:00:05.572Z Description: A vulnerability classified as critical was found in MD-MAFUJUL-HASAN Online-Payroll-Management-System up to 20230911. Affected by this vulnerability is an unknown functionality of the file /department_viewmore.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The identifier VDB-272449 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.272449 - https://vuldb.com/?ctiid.272449 - https://vuldb.com/?submit.376890 - https://github.com/topsky979/Security-Collections/tree/main/cve9 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3956.
CVE ID: CVE-2020-3956 Date Updated: 2024-08-04T07:52:20.437Z Date Published: 2020-05-20T13:30:58 Description: VMware Cloud Director 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x before 9.5.0.6, and 9.1.0.x before 9.1.0.4 do not properly handle input leading to a code injection vulnerability. An authenticated actor may be able to send malicious traffic to VMware Cloud Director which may lead to arbitrary remote code execution. This vulnerability can be exploited through the HTML5- and Flex-based UIs, the API Explorer interface and API access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vmware.com/security/advisories/VMSA-2020-0010.html - https://citadelo.com/en/blog/full-infrastructure-takeover-of-vmware-cloud-director-CVE-2020-3956/ - https://github.com/aaronsvk/CVE-2020-3956 - http://packetstormsecurity.com/files/157909/vCloud-Director-9.7.0.15498291-Remote-Code-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21893.
CVE ID: CVE-2024-21893 Date Updated: 2024-08-01T22:35:33.414Z Date Published: 2024-01-31T17:51:35.095Z Description: A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://forums.ivanti.com/s/article/CVE-2024-21888-Privilege-Escalation-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-14711.
CVE ID: CVE-2020-14711 Date Updated: 2024-09-26T20:38:09.829Z Date Published: 2020-07-15T17:34:35 Description: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: The CVE-2020-14711 is applicable to macOS host only. CVSS 3.1 Base Score 6.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujul2020.html - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html - https://security.gentoo.org/glsa/202101-09 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-13242.
CVE ID: CVE-2017-13242 Date Updated: 2024-09-16T21:56:46.066Z Date Published: 2018-02-12T19:00:00Z Description: A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. ID: A-62672248. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/103014 - https://source.android.com/security/bulletin/pixel/2018-02-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-31296.
CVE ID: CVE-2024-31296 Date Updated: 2024-08-02T01:52:56.134Z Date Published: 2024-04-07T18:07:00.960Z Description: Authorization Bypass Through User-Controlled Key vulnerability in Repute Infosystems BookingPress.This issue affects BookingPress: from n/a through 1.0.81. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/bookingpress-appointment-booking/wordpress-bookingpress-plugin-1-0-81-insecure-direct-object-references-idor-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30216.
CVE ID: CVE-2023-30216 Date Updated: 2024-08-02T14:21:44.539Z Date Published: 2023-05-04T00:00:00 Description: Insecure permissions in the updateUserInfo function of newbee-mall before commit 1f2c2dfy allows attackers to obtain user account information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/newbee-ltd/newbee-mall/issues/76 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5646.
CVE ID: CVE-2024-5646 Date Updated: 2024-08-01T21:18:06.823Z Date Published: 2024-06-11T20:33:00.081Z Description: The Futurio Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘header_size’ attribute within the Advanced Text Block widget in all versions up to, and including, 2.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/cbb3bd9b-ac1f-4488-931f-2ba37576df2d?source=cve - https://plugins.trac.wordpress.org/browser/futurio-extra/tags/2.0.5/inc/elementor/widgets/advanced-text-block.php#L265 - https://plugins.trac.wordpress.org/changeset/3100491/#file1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-28115.
CVE ID: CVE-2020-28115 Date Updated: 2024-08-04T16:33:57.544Z Date Published: 2020-11-05T14:58:48 Description: SQL Injection vulnerability in "Documents component" found in AudimexEE version 14.1.0 allows an attacker to execute arbitrary SQL commands via the object_path parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/piuppi/Proof-of-Concepts/blob/main/AudimexEE/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6515.
CVE ID: CVE-2016-6515 Date Updated: 2024-08-06T01:29:20.223Z Date Published: 2016-08-07T00:00:00 Description: The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03779en_us - https://security.netapp.com/advisory/ntap-20171130-0003/ - https://github.com/openssh/openssh-portable/commit/fcd135c9df440bcd2d5870405ad3311743d78d97 - http://packetstormsecurity.com/files/140070/OpenSSH-7.2-Denial-Of-Service.html - https://www.exploit-db.com/exploits/40888/ - http://www.securityfocus.com/bid/92212 - https://security.FreeBSD.org/advisories/FreeBSD-SA-17:06.openssh.asc - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - http://www.securitytracker.com/id/1036487 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X2L6RW34VFNXYNVVN2CN73YAGJ5VMTFU/ - https://access.redhat.com/errata/RHSA-2017:2029 - https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html - http://openwall.com/lists/oss-security/2016/08/01/2 - https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf - https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4861.
CVE ID: CVE-2019-4861 Date Updated: 2019-12-30T16:19:31 Date Published: 2019-12-30T16:19:31 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28901.
CVE ID: CVE-2024-28901 Date Updated: 2024-08-02T01:03:50.802Z Date Published: 2024-04-09T17:00:19.794Z Description: Windows Remote Access Connection Manager Information Disclosure Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28901 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31058.
CVE ID: CVE-2021-31058 Date Updated: 2021-08-24T18:52:34 Date Published: 2021-08-24T18:52:34 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20110.
CVE ID: CVE-2018-20110 Date Updated: 2021-01-06T16:16:04 Date Published: 2019-03-05T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-1188.
CVE ID: CVE-2016-1188 Date Updated: 2024-08-05T22:48:13.490Z Date Published: 2016-06-25T21:00:00 Description: Cybozu Garoon 3.x and 4.x before 4.2.1 allows remote authenticated users to send spoofed e-mail messages via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jvn.jp/en/jp/JVN18975349/index.html - https://support.cybozu.com/ja-jp/article/8845 - http://jvndb.jvn.jp/jvndb/JVNDB-2016-000077 - https://garoon.cybozu.co.jp/support/update/package/421sp1.html#03 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1717.
CVE ID: CVE-2024-1717 Date Updated: 2024-08-01T18:48:21.978Z Date Published: 2024-06-04T05:32:12.265Z Description: The Admin Notices Manager plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the handle_ajax_call() function in all versions up to, and including, 1.4.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve a list of registered user emails. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/0849d86b-5cf1-4346-a9e9-a54768837969?source=cve - https://plugins.trac.wordpress.org/browser/admin-notices-manager/trunk/vendor/wpwhitesecurity/select2-wpwhitesecurity/load.php#L58 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1184.
CVE ID: CVE-2013-1184 Date Updated: 2024-09-16T17:22:47.218Z Date Published: 2013-04-25T10:00:00Z Description: The management API in the XML API management service in the Manager component in Cisco Unified Computing System (UCS) 1.x before 1.2(1b) allows remote attackers to cause a denial of service (service outage) via a malformed request, aka Bug ID CSCtg48206. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-ucsmulti No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3385.
CVE ID: CVE-2013-3385 Date Updated: 2024-09-16T17:58:38.931Z Date Published: 2013-06-27T21:00:00Z Description: The management GUI in the web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-602; Email Security Appliance devices before 7.1.5-106 and 7.3, 7.5, and 7.6 before 7.6.3-019; and Content Security Management Appliance devices before 7.9.1-102 and 8.0 before 8.0.0-404 allows remote attackers to cause a denial of service (system hang) via a series of (1) HTTP or (2) HTTPS requests to a management interface, aka Bug IDs CSCzv58669, CSCzv63329, and CSCzv78669. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-wsa - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-sma - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130626-esa No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8726.
CVE ID: CVE-2016-8726 Date Updated: 2024-08-06T02:27:41.467Z Date Published: 2017-04-13T19:00:00 Description: An exploitable null pointer dereference vulnerability exists in the Web Application /forms/web_runScript iw_filename functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. An HTTP POST request with a blank line in the header will cause a segmentation fault in the web server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.talosintelligence.com/reports/TALOS-2016-0240/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0253.
CVE ID: CVE-2020-0253 Date Updated: 2024-08-04T05:55:12.454Z Date Published: 2020-08-11T19:30:44 Description: There is a possible memory corruption due to a use after free.Product: AndroidVersions: Android SoCAndroid ID: A-152647365 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2020-08-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1000499.
CVE ID: CVE-2017-1000499 Date Updated: 2024-08-05T22:00:41.653Z Date Published: 2018-01-03T14:00:00 Description: phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weakness. By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1040163 - http://cyberworldmirror.com/vulnerability-phpmyadmin-lets-attacker-perform-drop-table-single-click/ - https://www.exploit-db.com/exploits/45284/ - https://www.phpmyadmin.net/security/PMASA-2017-9/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-25516.
CVE ID: CVE-2020-25516 Date Updated: 2024-08-04T15:33:05.749Z Date Published: 2020-10-29T12:30:57 Description: WSO2 Enterprise Integrator 6.6.0 or earlier contains a stored cross-site scripting (XSS) vulnerability in BPMN explorer tasks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0781 - https://github.com/piuppi/Proof-of-Concepts/blob/main/WSO2/CVE-2020-25516.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38198.
CVE ID: CVE-2024-38198 Date Updated: 2024-09-19T21:52:39.189Z Date Published: 2024-08-13T17:29:54.662Z Description: Windows Print Spooler Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38198 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7849.
CVE ID: CVE-2017-7849 Date Updated: 2024-08-05T16:19:28.361Z Date Published: 2017-04-19T14:00:00 Description: Nessus 6.10.x before 6.10.5 was found to be vulnerable to a local denial of service condition due to insecure permissions when running in Agent Mode. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/tns-2017-10 - http://www.securityfocus.com/bid/97951 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5723.
CVE ID: CVE-2008-5723 Date Updated: 2024-08-07T11:04:44.391Z Date Published: 2008-12-26T17:08:00 Description: Directory traversal vulnerability in CGI RESCUE KanniBBS2000 (aka KanniBBS2000i, MiniBBS2000, and MiniBBS2000i) before 1.03 allows remote attackers to read arbitrary files via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.rescue.ne.jp/whatsnew/blog.cgi/permalink/20081113221811 - http://www.securityfocus.com/bid/32485 - http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000078.html - http://jvn.jp/en/jp/JVN86833991/index.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/46972 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7575.
CVE ID: CVE-2014-7575 Date Updated: 2024-08-06T12:56:11.608Z Date Published: 2014-10-20T10:00:00 Description: The eBiblio Andalucia (aka com.bqreaders.reader.ebiblioandalucia) application 1.6.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/223017 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2019-13533
CVE-CVE-2019-13533 is a vulnerability in Omron PLC CJ and CS Series. It is related to the MITRE ATT&CK technique T0842: Network Sniffing. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2019 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2018-13874.
CVE ID: CVE-2018-13874 Date Updated: 2024-09-16T18:48:29.996Z Date Published: 2018-07-10T21:00:00Z Description: An issue was discovered in the HDF HDF5 1.8.20 library. There is a stack-based buffer overflow in the function H5FD_sec2_read in H5FDsec2.c, related to HDmemset. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/TeamSeri0us/pocs/tree/master/hdf5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4513.
CVE ID: CVE-2017-4513 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-31516.
CVE ID: CVE-2022-31516 Date Updated: 2024-08-03T07:19:06.136Z Date Published: 2022-07-11T00:55:00 Description: The Harveyzyh/Python repository through 2022-05-04 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4615.
CVE ID: CVE-2011-4615 Date Updated: 2024-08-07T00:09:19.538Z Date Published: 2011-12-29T22:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/77771 - http://www.securityfocus.com/bid/51093 - http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071660.html - https://support.zabbix.com/browse/ZBX-4015 - http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071687.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/71855 - http://www.zabbix.com/rn1.8.10.php - http://secunia.com/advisories/47216 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3892.
CVE ID: CVE-2013-3892 Date Updated: 2024-08-06T16:22:01.541Z Date Published: 2013-10-09T14:44:00 Description: Microsoft Word 2007 SP3 and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Memory Corruption Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-086 - http://www.us-cert.gov/ncas/alerts/TA13-288A - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18953 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32142.
CVE ID: CVE-2022-32142 Date Updated: 2024-09-17T01:00:49.177Z Date Published: 2022-06-24T07:46:28.408653Z Description: Multiple CODESYS Products are prone to a out-of bounds read or write access. A low privileged remote attacker may craft a request with invalid offset, which can cause an out-of-bounds read or write access, resulting in denial-of-service condition or local memory overwrite, which can lead to a change of local files. User interaction is not required. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25244.
CVE ID: CVE-2022-25244 Date Updated: 2024-08-03T04:36:06.580Z Date Published: 2022-03-07T21:41:52 Description: Vault Enterprise clusters using the tokenization transform feature can expose the tokenization key through the tokenization key configuration endpoint to authorized operators with `read` permissions on this endpoint. Fixed in Vault Enterprise 1.9.4, 1.8.9 and 1.7.10. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://discuss.hashicorp.com - https://discuss.hashicorp.com/t/hcsec-2022-08-vault-enterprise-s-tokenization-transform-configuration-endpoint-may-expose-transform-key/36599 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24398.
CVE ID: CVE-2021-24398 Date Updated: 2024-08-03T19:28:23.799Z Date Published: 2021-09-20T10:06:02 Description: The Add new scene functionality in the Responsive 3D Slider WordPress plugin through 1.2 uses an id parameter which is not sanitised, escaped or validated before being inserted to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query is ran twice. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/e6fb2256-0214-4891-b4b7-e4371a1599a5 - https://codevigilant.com/disclosure/2021/wp-plugin-morpheus-slider/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-25956.
CVE ID: CVE-2021-25956 Date Updated: 2024-09-16T19:45:46.350Z Date Published: 2021-08-17T14:15:54.142113Z Description: In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25956 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4002.
CVE ID: CVE-2011-4002 Date Updated: 2024-09-16T16:54:09.048Z Date Published: 2011-11-30T02:00:00Z Description: HP no Mawashimono Nikki 6.6 and earlier allows remote attackers to execute arbitrary commands via unspecified vectors, related to a "command injection vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jvndb.jvn.jp/jvndb/JVNDB-2011-000076 - http://jvn.jp/en/jp/JVN48839888/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-45995.
CVE ID: CVE-2021-45995 Date Updated: 2024-08-04T04:54:31.135Z Date Published: 2022-02-04T01:33:40 Description: Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function formSetStaticRoute. This vulnerability allows attackers to cause a Denial of Service (DoS) via the staticRouteNet, staticRouteMask, and staticRouteGateway parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/pjqwudi/my_vuln/blob/main/Tenda/vuln_9/9.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4245.
CVE ID: CVE-2021-4245 Date Updated: 2024-08-03T17:23:10.286Z Date Published: 2022-12-15T00:00:00 Description: A vulnerability classified as problematic has been found in chbrown rfc6902. This affects an unknown part of the file pointer.ts. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The exploit has been disclosed to the public and may be used. The name of the patch is c006ce9faa43d31edb34924f1df7b79c137096cf. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215883. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/chbrown/rfc6902/pull/76 - https://github.com/chbrown/rfc6902/commit/c006ce9faa43d31edb34924f1df7b79c137096cf - https://vuldb.com/?id.215883 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15688.
CVE ID: CVE-2019-15688 Date Updated: 2024-08-05T00:56:22.438Z Date Published: 2019-11-26T15:32:17 Description: Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component did not adequately inform the user about the threat of redirecting to an untrusted site. Bypass. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#251119_1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-45755.
CVE ID: CVE-2023-45755 Date Updated: 2024-09-10T17:45:04.461Z Date Published: 2023-10-24T11:34:08.866Z Description: Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in BuddyBoss BuddyPress Global Search plugin <= 1.2.1 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/buddypress-global-search/wordpress-buddypress-global-search-plugin-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-18065.
CVE ID: CVE-2020-18065 Date Updated: 2024-08-04T14:00:49.111Z Date Published: 2021-08-25T19:17:46 Description: Cross Site Scripting (XSS) vulnerability exists in PopojiCMS 2.0.1 in admin.php?mod=menumanager--------- edit menu. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/PopojiCMS/PopojiCMS/issues/16 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-13113.
CVE ID: CVE-2019-13113 Date Updated: 2024-08-04T23:41:10.389Z Date Published: 2019-06-30T22:21:47 Description: Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to assertion failure) via an invalid data location in a CRW image file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Exiv2/exiv2/issues/841 - https://github.com/Exiv2/exiv2/pull/842 - https://usn.ubuntu.com/4056-1/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGBT5OD2TF4AIXJUC56WOUJRHAZLZ4DC/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6772.
CVE ID: CVE-2019-6772 Date Updated: 2024-08-04T20:31:04.277Z Date Published: 2019-06-03T18:15:02 Description: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 2019.010.20098. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8231. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.foxitsoftware.com/support/security-bulletins.php - https://www.zerodayinitiative.com/advisories/ZDI-19-446/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0481.
CVE ID: CVE-2023-0481 Date Updated: 2024-08-02T05:10:56.412Z Date Published: 2023-02-24T00:00:00 Description: In RestEasy Reactive implementation of Quarkus the insecure File.createTempFile() is used in the FileBodyHandler class which creates temp files with insecure permissions that could be read by a local user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/quarkusio/quarkus/pull/30694 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-21259.
CVE ID: CVE-2018-21259 Date Updated: 2024-08-05T12:26:39.575Z Date Published: 2020-06-19T16:47:10 Description: An issue was discovered in Mattermost Server before 4.10.1, 4.9.4, and 4.8.2. It allows attackers to cause a denial of service (application hang) via a malformed link in a channel. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mattermost.com/security-updates/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7236.
CVE ID: CVE-2015-7236 Date Updated: 2024-08-06T07:43:45.669Z Date Published: 2015-10-01T20:00:00 Description: Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - https://security.gentoo.org/glsa/201611-17 - http://www.spinics.net/lists/linux-nfs/msg53045.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172152.html - http://www.openwall.com/lists/oss-security/2015/09/17/6 - http://www.ubuntu.com/usn/USN-2756-1 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html - http://www.openwall.com/lists/oss-security/2015/09/17/1 - http://www.securityfocus.com/bid/76771 - http://www.securitytracker.com/id/1033673 - https://security.FreeBSD.org/advisories/FreeBSD-SA-15:24.rpcbind.asc - http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171030.html - http://www.debian.org/security/2015/dsa-3366 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12279.
CVE ID: CVE-2020-12279 Date Updated: 2024-08-04T11:48:58.767Z Date Published: 2020-04-27T00:00:00 Description: An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. checkout.c mishandles equivalent filenames that exist because of NTFS short names. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1353. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/libgit2/libgit2/releases/tag/v0.99.0 - https://github.com/libgit2/libgit2/releases/tag/v0.28.4 - https://github.com/git/git/security/advisories/GHSA-589j-mmg9-733v - https://github.com/libgit2/libgit2/commit/64c612cc3e25eff5fb02c59ef5a66ba7a14751e4 - https://lists.debian.org/debian-lts-announce/2022/03/msg00031.html - https://lists.debian.org/debian-lts-announce/2023/02/msg00034.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14425.
CVE ID: CVE-2017-14425 Date Updated: 2024-08-05T19:27:40.562Z Date Published: 2017-09-13T17:00:00 Description: D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices have 0666 /var/etc/hnapasswd permissions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0447.
CVE ID: CVE-2014-0447 Date Updated: 2024-08-06T09:13:10.601Z Date Published: 2014-04-15T22:00:00 Description: Unspecified vulnerability in Oracle Solaris 10 and 11.1 allows local users to affect availability via unknown vectors related to Kernel, a different vulnerability than CVE-2013-5876. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20680.
CVE ID: CVE-2023-20680 Date Updated: 2024-08-02T09:14:40.379Z Date Published: 2023-04-06T00:00:00 Description: In adsp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07664785; Issue ID: ALPS07664785. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/April-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4445.
CVE ID: CVE-2012-4445 Date Updated: 2024-08-06T20:35:09.940Z Date Published: 2012-10-10T18:00:00 Description: Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small "TLS Message Length" value in an EAP-TLS message with the "More Fragments" flag set. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://w1.fi/gitweb/gitweb.cgi?p=hostap.git%3Ba=commitdiff%3Bh=586c446e0ff42ae00315b014924ec669023bd8de - http://www.pre-cert.de/advisories/PRE-SA-2012-07.txt - http://www.openwall.com/lists/oss-security/2012/10/08/3 - http://secunia.com/advisories/50805 - http://www.debian.org/security/2012/dsa-2557 - http://www.securitytracker.com/id?1027808 - http://www.mandriva.com/security/advisories?name=MDVSA-2012:168 - http://osvdb.org/86051 - http://www.securityfocus.com/bid/55826 - http://www.freebsd.org/security/advisories/FreeBSD-SA-12:07.hostapd.asc - https://exchange.xforce.ibmcloud.com/vulnerabilities/79104 - http://secunia.com/advisories/50888 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-26586.
CVE ID: CVE-2023-26586 Date Updated: 2024-08-14T19:55:19.101Z Date Published: 2024-02-14T13:37:59.856Z Description: Uncaught exception for some Intel(R) PROSet/Wireless and Intel(R) Killer(TM) Wi-Fi software before version 22.240 may allow an unauthenticated user to potentially enable denial of service via adjacent access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2750.
CVE ID: CVE-2015-2750 Date Updated: 2024-08-06T05:24:38.749Z Date Published: 2017-09-13T16:00:00 Description: Open redirect vulnerability in URL-related API functions in Drupal 6.x before 6.35 and 7.x before 7.35 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving the "//" initial sequence. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2015/dsa-3200 - http://www.openwall.com/lists/oss-security/2015/03/26/4 - http://cgit.drupalcode.org/drupal/commit/includes/menu.inc?h=6.x&id=8ffc5db3c0ab926f3d4b2cf8bc51714c8c0f3c93 - http://www.securityfocus.com/bid/73219 - http://cgit.drupalcode.org/drupal/commit/includes/common.inc?h=7.x&id=b44056d2f8e8c71d35c85ec5c2fb8f7c8a02d8a8 - https://www.drupal.org/SA-CORE-2015-001 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3610.
CVE ID: CVE-2016-3610 Date Updated: 2024-08-06T00:03:34.143Z Date Published: 2016-07-21T10:00:00 Description: Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3598. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ubuntu.com/usn/USN-3043-1 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - https://security.gentoo.org/glsa/201610-08 - http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html - http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html - https://security.netapp.com/advisory/ntap-20160721-0001/ - https://access.redhat.com/errata/RHSA-2016:1475 - http://www.securityfocus.com/bid/91930 - http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html - http://www.securitytracker.com/id/1036365 - https://security.gentoo.org/glsa/201701-43 - http://www.ubuntu.com/usn/USN-3062-1 - http://www.securityfocus.com/bid/91787 - http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html - https://access.redhat.com/errata/RHSA-2016:1458 - http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html - http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html - http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html - http://rhn.redhat.com/errata/RHSA-2016-1504.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34254.
CVE ID: CVE-2022-34254 Date Updated: 2024-09-17T02:57:57.176Z Date Published: 2022-08-16T19:44:17.754260Z Description: Adobe Commerce versions 2.4.3-p2 (and earlier), 2.3.7-p3 (and earlier) and 2.4.4 (and earlier) are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could be abused by an attacker to inject malicious scripts into the vulnerable endpoint. A low privileged attacker could leverage this vulnerability to read local files and to perform Stored XSS. Exploitation of this issue does not require user interaction. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/magento/apsb22-38.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3575.
CVE ID: CVE-2022-3575 Date Updated: 2024-09-16T23:42:05.915Z Date Published: 2022-11-02T16:15:33.921717Z Description: Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.frauscher.com/en/psirt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2347.
CVE ID: CVE-2018-2347 Date Updated: 2019-01-22T17:57:02 Date Published: 2019-01-22T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1577.
CVE ID: CVE-2017-1577 Date Updated: 2024-09-16T23:56:44.548Z Date Published: 2017-09-27T17:00:00Z Description: IBM WebSphere Portal 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 132117. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/132117 - http://www.securityfocus.com/bid/101017 - http://www.securitytracker.com/id/1039405 - http://www.ibm.com/support/docview.wss?uid=swg22008586 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30832.
CVE ID: CVE-2021-30832 Date Updated: 2024-08-03T22:48:12.675Z Date Published: 2021-10-19T13:11:54 Description: A memory corruption issue was addressed with improved state management. This issue is fixed in Security Update 2021-005 Catalina, macOS Big Sur 11.6. A local attacker may be able to elevate their privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT212804 - https://support.apple.com/en-us/HT212805 - https://www.zerodayinitiative.com/advisories/ZDI-22-355/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39854.
CVE ID: CVE-2023-39854 Date Updated: 2024-09-19T15:56:29.839Z Date Published: 2023-10-09T00:00:00 Description: The web interface of ATX Ucrypt through 3.5 allows authenticated users (or attackers using default credentials for the admin, master, or user account) to include files via a URL in the /hydra/view/get_cc_url url parameter. There can be resultant SSRF. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wiki.notveg.ninja/blog/CVE-2023-39854/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-27510.
CVE ID: CVE-2022-27510 Date Updated: 2024-08-03T05:32:59.200Z Date Published: 2022-11-08T21:26:10.688499Z Description: Unauthorized access to Gateway user capabilities No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.citrix.com/article/CTX463706/citrix-gateway-and-citrix-adc-security-bulletin-for-cve202227510-cve202227513-and-cve202227516 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-25517.
CVE ID: CVE-2023-25517 Date Updated: 2024-08-02T11:25:19.070Z Date Published: 2023-07-03T23:27:05.649Z Description: NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where a guest OS may be able to control resources for which it is not authorized, which may lead to information disclosure and data tampering. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nvidia.custhelp.com/app/answers/detail/a_id/5468 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6161.
CVE ID: CVE-2017-6161 Date Updated: 2024-09-16T20:31:33.873Z Date Published: 2017-10-27T14:00:00Z Description: In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator software version 12.0.0 - 12.1.2, 11.6.0 - 11.6.1, 11.4.0 - 11.5.4, 11.2.1, when ConfigSync is configured, attackers on adjacent networks may be able to bypass the TLS protections usually used to encrypted and authenticate connections to mcpd. This vulnerability may allow remote attackers to cause a denial-of-service (DoS) attack via resource exhaustion. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.f5.com/csp/article/K62279530 - http://www.securitytracker.com/id/1039676 - http://www.securityfocus.com/bid/101636 - http://www.securitytracker.com/id/1039675 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5476.
CVE ID: CVE-2008-5476 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-46818.
CVE ID: CVE-2022-46818 Date Updated: 2024-09-05T18:19:02.979Z Date Published: 2023-11-03T15:58:23.831Z Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Gopi Ramasamy Email posts to subscribers allows SQL Injection.This issue affects Email posts to subscribers: from n/a through 6.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/email-posts-to-subscribers/wordpress-email-posts-to-subscribers-plugin-6-2-sql-injection?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4370.
CVE ID: CVE-2021-4370 Date Updated: 2024-08-03T17:23:10.721Z Date Published: 2023-06-07T01:51:43.279Z Description: The uListing plugin for WordPress is vulnerable to authorization bypass as most actions and endpoints are accessible to unauthenticated users, lack security nonces, and data is seldom validated. This issue exists in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to conduct numerous administrative actions, including those less critical than the explicitly outlined ones in our detection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/c5ada976-03b8-4219-9ae3-9060fb7b9de5?source=cve - https://blog.nintechnet.com/wordpress-ulisting-plugin-fixed-multiple-critical-vulnerabilities/ - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2456786%40ulisting&new=2456786%40ulisting&sfp_email=&sfph_mail= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11869.
CVE ID: CVE-2020-11869 Date Updated: 2024-08-04T11:42:00.811Z Date Published: 2020-04-27T19:00:34 Description: An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2020/04/24/2 - https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ac2071c3791b67fc7af78b8ceb320c01ca1b5df7 - https://usn.ubuntu.com/4372-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-26826.
CVE ID: CVE-2020-26826 Date Updated: 2024-08-04T16:03:22.433Z Date Published: 2020-12-09T16:30:35 Description: Process Integration Monitoring of SAP NetWeaver AS JAVA, versions - 7.31, 7.40, 7.50, allows an attacker to upload any file (including script files) without proper file format validation, leading to Unrestricted File Upload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564757079 - https://launchpad.support.sap.com/#/notes/2974330 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28829.
CVE ID: CVE-2024-28829 Date Updated: 2024-08-21T19:37:32.708Z Date Published: 2024-08-20T09:29:26.474Z Description: Least privilege violation and reliance on untrusted inputs in the mk_informix Checkmk agent plugin before Checkmk 2.3.0p12, 2.2.0p32, 2.1.0p47 and 2.0.0 (EOL) allows local users to escalate privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://checkmk.com/werk/16249 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3409.
CVE ID: CVE-2013-3409 Date Updated: 2024-09-16T20:37:12.014Z Date Published: 2013-10-10T10:00:00Z Description: The portal in Cisco Prime Central for Hosted Collaboration Solution (HCS) places cleartext credentials in temporary files, which allows local users to obtain sensitive information by leveraging weak file permissions to read these files, aka Bug IDs CSCuh33735 and CSCuh34230. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3409 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-31688.
CVE ID: CVE-2022-31688 Date Updated: 2024-08-03T07:26:01.182Z Date Published: 2022-11-09T00:00:00 Description: VMware Workspace ONE Assist prior to 22.10 contains a Reflected cross-site scripting (XSS) vulnerability. Due to improper user input sanitization, a malicious actor with some user interaction may be able to inject javascript code in the target user's window. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vmware.com/security/advisories/VMSA-2022-0028.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24690.
CVE ID: CVE-2024-24690 Date Updated: 2024-09-20T14:50:06.835Z Date Published: 2024-02-14T00:00:04.089Z Description: Improper input validation in some Zoom clients may allow an authenticated user to conduct a denial of service via network access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zoom.com/en/trust/security-bulletin/ZSB-24007/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0004.
CVE ID: CVE-2014-0004 Date Updated: 2024-08-06T08:58:26.565Z Date Published: 2014-03-11T15:00:00 Description: Stack-based buffer overflow in udisks before 1.0.5 and 2.x before 2.1.3 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long mount point. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-updates/2014-03/msg00053.html - http://lists.opensuse.org/opensuse-updates/2014-03/msg00052.html - http://lists.opensuse.org/opensuse-updates/2014-03/msg00051.html - http://rhn.redhat.com/errata/RHSA-2014-0293.html - http://lists.freedesktop.org/archives/devkit-devel/2014-March/001568.html - http://www.ubuntu.com/usn/USN-2142-1 - http://www.securityfocus.com/bid/66081 - http://www.debian.org/security/2014/dsa-2872 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1163.
CVE ID: CVE-2010-1163 Date Updated: 2024-08-07T01:14:06.554Z Date Published: 2010-04-16T19:00:00 Description: The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ubuntu.com/usn/USN-928-1 - http://secunia.com/advisories/43068 - http://www.redhat.com/support/errata/RHSA-2010-0361.html - http://www.vupen.com/english/advisories/2011/0212 - http://secunia.com/advisories/39384 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9382 - http://secunia.com/advisories/39543 - http://secunia.com/advisories/39399 - http://www.vupen.com/english/advisories/2010/1019 - http://www.osvdb.org/63878 - http://www.vupen.com/english/advisories/2010/0956 - http://www.securityfocus.com/archive/1/510880/100/0/threaded - http://www.securityfocus.com/archive/1/514489/100/0/threaded - http://www.mandriva.com/security/advisories?name=MDVSA-2010:078 - http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039986.html - http://www.vupen.com/english/advisories/2010/0895 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - http://www.vupen.com/english/advisories/2010/0949 - http://wiki.rpath.com/Advisories:rPSA-2010-0075 - http://www.securityfocus.com/archive/1/510827/100/0/threaded - http://www.securityfocus.com/bid/39468 - http://www.vupen.com/english/advisories/2010/0881 - http://secunia.com/advisories/39474 - http://www.securityfocus.com/archive/1/510846/100/0/threaded - http://www.sudo.ws/sudo/alerts/sudoedit_escalate2.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/57836 - http://www.vupen.com/english/advisories/2010/0904 - http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.577019 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2598.
CVE ID: CVE-2011-2598 Date Updated: 2024-08-06T23:08:23.239Z Date Published: 2011-06-30T15:26:00 Description: The WebGL implementation in Mozilla Firefox 4.x allows remote attackers to obtain screenshots of the windows of arbitrary desktop applications via vectors involving an SVG filter, an IFRAME element, and uninitialized data in graphics memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://blog.mozilla.com/security/2011/06/16/webgl-graphics-memory-stealing-issue/ - http://www.securityfocus.com/bid/48319 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14207 - http://www.contextis.com/resources/blog/webgl2/ - http://www.theregister.co.uk/2011/06/16/webgl_security_threats_redux/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8413.
CVE ID: CVE-2014-8413 Date Updated: 2024-08-06T13:18:48.273Z Date Published: 2014-11-24T15:00:00 Description: The res_pjsip_acl module in Asterisk Open Source 12.x before 12.7.1 and 13.x before 13.0.1 does not properly create and load ACLs defined in pjsip.conf at startup, which allows remote attackers to bypass intended PJSIP ACL rules. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://downloads.asterisk.org/pub/security/AST-2014-013.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32978.
CVE ID: CVE-2023-32978 Date Updated: 2024-08-02T15:32:46.629Z Date Published: 2023-05-16T15:59:59.535Z Description: A cross-site request forgery (CSRF) vulnerability in Jenkins LDAP Plugin allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3046 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-2766.
CVE ID: CVE-2020-2766 Date Updated: 2024-09-30T15:40:18.054Z Date Published: 2020-04-15T13:29:45 Description: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-37361.
CVE ID: CVE-2022-37361 Date Updated: 2024-08-03T10:29:20.718Z Date Published: 2023-03-29T00:00:00 Description: This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 files. Crafted data in a JP2 file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-17674. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tracker-software.com/product/pdf-xchange-editor/history - https://www.zerodayinitiative.com/advisories/ZDI-22-1089/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27435.
CVE ID: CVE-2024-27435 Date Updated: 2024-08-02T00:34:52.327Z Date Published: 2024-05-17T12:12:36.439Z Description: In the Linux kernel, the following vulnerability has been resolved: nvme: fix reconnection fail due to reserved tag allocation We found a issue on production environment while using NVMe over RDMA, admin_q reconnect failed forever while remote target and network is ok. After dig into it, we found it may caused by a ABBA deadlock due to tag allocation. In my case, the tag was hold by a keep alive request waiting inside admin_q, as we quiesced admin_q while reset ctrl, so the request maked as idle and will not process before reset success. As fabric_q shares tagset with admin_q, while reconnect remote target, we need a tag for connect command, but the only one reserved tag was held by keep alive command which waiting inside admin_q. As a result, we failed to reconnect admin_q forever. In order to fix this issue, I think we should keep two reserved tags for admin queue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/149afee5c7418ec5db9d7387b9c9a5c1eb7ea2a8 - https://git.kernel.org/stable/c/ff2f90f88d78559802466ad1c84ac5bda4416b3a - https://git.kernel.org/stable/c/6851778504cdb49431809b4ba061903d5f592c96 - https://git.kernel.org/stable/c/262da920896e2f2ab0e3947d9dbee0aa09045818 - https://git.kernel.org/stable/c/de105068fead55ed5c07ade75e9c8e7f86a00d1d No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0147.
CVE ID: CVE-2009-0147 Date Updated: 2024-08-07T04:24:18.354Z Date Published: 2009-04-23T17:00:00 Description: Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2009/dsa-1793 - http://security.gentoo.org/glsa/glsa-200904-20.xml - http://secunia.com/advisories/34963 - http://support.apple.com/kb/HT3639 - http://www.debian.org/security/2009/dsa-1790 - http://secunia.com/advisories/35037 - http://www.vupen.com/english/advisories/2009/1077 - http://www.vupen.com/english/advisories/2009/1621 - http://support.apple.com/kb/HT3549 - http://secunia.com/advisories/35064 - http://www.vupen.com/english/advisories/2009/1066 - http://secunia.com/advisories/34481 - http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.578477 - http://www.redhat.com/support/errata/RHSA-2009-0431.html - http://www.vupen.com/english/advisories/2009/1065 - http://wiki.rpath.com/Advisories:rPSA-2009-0061 - http://bugs.gentoo.org/show_bug.cgi?id=263028 - http://secunia.com/advisories/35074 - http://www.redhat.com/support/errata/RHSA-2009-0430.html - https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html - http://secunia.com/advisories/35618 - http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - http://lists.apple.com/archives/security-announce/2009/May/msg00002.html - http://secunia.com/advisories/35065 - http://www.redhat.com/support/errata/RHSA-2009-0480.html - http://www.securityfocus.com/bid/34568 - http://www.securityfocus.com/archive/1/502750/100/0/threaded - http://www.vupen.com/english/advisories/2010/1040 - http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html - http://rhn.redhat.com/errata/RHSA-2009-0458.html - https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html - http://secunia.com/advisories/34991 - http://wiki.rpath.com/Advisories:rPSA-2009-0059 - http://www.mandriva.com/security/advisories?name=MDVSA-2009:101 - http://www.mandriva.com/security/advisories?name=MDVSA-2010:087 - http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html - http://www.us-cert.gov/cas/techalerts/TA09-133A.html - http://secunia.com/advisories/35685 - http://secunia.com/advisories/34756 - http://secunia.com/advisories/34291 - http://secunia.com/advisories/34755 - http://www.vupen.com/english/advisories/2009/1297 - http://www.securityfocus.com/archive/1/502761/100/0/threaded - http://secunia.com/advisories/34852 - http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html - https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html - https://bugzilla.redhat.com/show_bug.cgi?id=490614 - http://secunia.com/advisories/34959 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9941 - http://www.redhat.com/support/errata/RHSA-2009-0429.html - http://www.securitytracker.com/id?1022073 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0503.
CVE ID: CVE-2009-0503 Date Updated: 2024-08-07T04:40:03.593Z Date Published: 2009-02-13T17:00:00 Description: IBM WebSphere Message Broker 6.1.x before 6.1.0.2 writes a database connection password to the Event Log and System Log during exception handling for a JDBC error, which allows local users to obtain sensitive information by reading these logs. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?rs=849&uid=swg27011431 - http://www.vupen.com/english/advisories/2009/0460 - http://www.securitytracker.com/id?1021735 - https://exchange.xforce.ibmcloud.com/vulnerabilities/48642 - http://www-1.ibm.com/support/docview.wss?uid=swg1IC55298 - http://www.securityfocus.com/bid/33819 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.