instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2018-7770.
CVE ID: CVE-2018-7770 Date Updated: 2024-09-17T03:43:43.992Z Date Published: 2018-07-03T14:00:00Z Description: The vulnerability exists within processing of sendmail.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The applet allows callers to select arbitrary files to send to an arbitrary email address. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.schneider-electric.com/en/download/document/SEVD-2018-095-01/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46447.
CVE ID: CVE-2023-46447 Date Updated: 2024-08-02T20:45:41.887Z Date Published: 2024-01-20T00:00:00 Description: The POPS! Rebel application 5.0 for Android, in POPS! Rebel Bluetooth Glucose Monitoring System, sends unencrypted glucose measurements over BLE. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/actuator/rebel/blob/main/CWE-319.md - https://popsdiabetes.com/about-us/ - https://play.google.com/store/apps/details?id=com.pops.pops No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4667.
CVE ID: CVE-2015-4667 Date Updated: 2024-08-06T06:18:12.091Z Date Published: 2017-09-25T17:00:00 Description: Multiple hardcoded credentials in Xsuite 2.x. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20180614-01--security-notice-for-ca-privileged-access-manager.html - http://www.securityfocus.com/archive/1/536058/100/0/threaded - http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt - https://www.exploit-db.com/exploits/37708/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0869.
CVE ID: CVE-2010-0869 Date Updated: 2024-08-07T01:06:51.323Z Date Published: 2010-04-13T22:00:00 Description: Unspecified vulnerability in the Oracle Transportation Management component in Oracle E-Business Suite 5.5.05.07, 5.5.06.00, and 6.0.03 allows remote attackers to affect confidentiality via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.us-cert.gov/cas/techalerts/TA10-103B.html - http://www.securitytracker.com/id?1023859 - http://secunia.com/advisories/39441 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-31819.
CVE ID: CVE-2023-31819 Date Updated: 2024-08-02T14:56:35.576Z Date Published: 2023-07-13T00:00:00 Description: An issue found in KEISEI STORE Co, Ltd. LIVRE KEISEI v.13.6.1 allows a remote attacker to gain access to sensitive information via the channel access token in the miniapp function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://keisei.com - http://livre.com - https://github.com/syz913/CVE-reports/blob/main/CVE-2023-31819.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2616.
CVE ID: CVE-2022-2616 Date Updated: 2024-08-03T00:46:03.109Z Date Published: 2022-08-12T19:37:07 Description: Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the Omnibox (URL bar) via a crafted Chrome Extension. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html - https://crbug.com/1302159 - https://security.gentoo.org/glsa/202208-35 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34692.
CVE ID: CVE-2022-34692 Date Updated: 2024-08-03T09:15:16.180Z Date Published: 2022-08-09T19:52:09 Description: Microsoft Exchange Server Information Disclosure Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34692 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-44833.
CVE ID: CVE-2021-44833 Date Updated: 2024-08-04T04:32:13.216Z Date Published: 2021-12-12T05:32:02 Description: The CLI 1.0.0 for Amazon AWS OpenSearch has weak permissions for the configuration file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/opensearch-project/opensearch-cli/blob/275085730f791daccaac81c566a25f541656d9f9/commands/root.go#L43 - https://github.com/opensearch-project/opensearch-cli/commit/69dc712d0d0d05dc2bc2bd0d733c73e3641b633a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8861.
CVE ID: CVE-2018-8861 Date Updated: 2024-09-17T03:59:05.842Z Date Published: 2018-05-04T17:00:00Z Description: Vulnerabilities within the Philips Brilliance CT kiosk environment (Brilliance 64 version 2.6.2 and prior, Brilliance iCT versions 4.1.6 and prior, Brillance iCT SP versions 3.2.4 and prior, and Brilliance CT Big Bore 2.3.5 and prior) could enable a limited-access kiosk user or an unauthorized attacker to break-out from the containment of the kiosk environment, attain elevated privileges from the underlying Windows OS, and access unauthorized resources from the operating system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.usa.philips.com/healthcare/about/customer-support/product-security - http://www.securityfocus.com/bid/104088 - https://ics-cert.us-cert.gov/advisories/ICSMA-18-123-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5256.
CVE ID: CVE-2008-5256 Date Updated: 2024-08-07T10:49:12.440Z Date Published: 2008-11-27T00:00:00 Description: The AcquireDaemonLock function in ipcdUnix.cpp in Sun Innotek VirtualBox before 2.0.6 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/.vbox-$USER-ipc/lock temporary file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://sunsolve.sun.com/search/document.do?assetkey=1-26-247326-1 - http://www.virtualbox.org/wiki/Changelog - http://secunia.com/advisories/32851 - http://www.virtualbox.org/changeset?new=trunk%2Fsrc%2Flibs%2Fxpcom18a4%2Fipc%2Fipcd%2Fdaemon%2Fsrc%2FipcdUnix.cpp%4013810 - http://www.vupen.com/english/advisories/2008/3410 - http://www.securitytracker.com/id?1021384 - http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504149 - https://exchange.xforce.ibmcloud.com/vulnerabilities/46826 - http://www.securityfocus.com/bid/32444 - http://www.mandriva.com/security/advisories?name=MDVSA-2009:011 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1434.
CVE ID: CVE-2024-1434 Date Updated: 2024-08-01T18:40:21.071Z Date Published: 2024-02-29T05:09:32.647Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jordy Meow Media Alt Renamer allows Stored XSS.This issue affects Media Alt Renamer: from n/a through 0.0.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/media-alt-renamer/wordpress-media-alt-renamer-plugin-0-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7309.
CVE ID: CVE-2020-7309 Date Updated: 2024-09-16T17:03:22.066Z Date Published: 2020-08-26T06:00:19.835635Z Description: Cross Site Scripting vulnerability in ePO extension in McAfee Application Control (MAC) prior to 8.3.1 allows administrators to inject arbitrary web script or HTML via specially crafted input in the policy discovery section. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kc.mcafee.com/corporate/index?page=content&id=SB10324 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-45901.
CVE ID: CVE-2021-45901 Date Updated: 2024-08-04T04:54:31.164Z Date Published: 2022-02-10T13:59:20 Description: The password-reset form in ServiceNow Orlando provides different responses to invalid authentication attempts depending on whether the username exists. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/servicenow-username-enumeration-vulnerability-cve-2021-45901/ - http://packetstormsecurity.com/files/165989/ServiceNow-Orlando-Username-Enumeration.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4093.
CVE ID: CVE-2015-4093 Date Updated: 2024-08-06T06:04:02.932Z Date Published: 2015-06-15T15:00:00 Description: Cross-site scripting (XSS) vulnerability in Elasticsearch Kibana 4.x before 4.0.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/535726/100/0/threaded - http://www.securityfocus.com/bid/75107 - http://packetstormsecurity.com/files/132232/Kibana-4.0.2-Cross-Site-Scripting.html - https://www.elastic.co/community/security/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27014.
CVE ID: CVE-2021-27014 Date Updated: 2022-02-28T21:58:49 Date Published: 2022-02-28T21:58:49 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3219.
CVE ID: CVE-2022-3219 Date Updated: 2024-08-03T01:00:10.537Z Date Published: 2023-02-23T00:00:00 Description: GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://dev.gnupg.org/D556 - https://marc.info/?l=oss-security&m=165696590211434&w=4 - https://access.redhat.com/security/cve/CVE-2022-3219 - https://bugzilla.redhat.com/show_bug.cgi?id=2127010 - https://dev.gnupg.org/T5993 - https://security.netapp.com/advisory/ntap-20230324-0001/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6854.
CVE ID: CVE-2014-6854 Date Updated: 2024-08-06T12:31:46.994Z Date Published: 2014-10-01T01:00:00 Description: The EyeXam (aka com.globaleyeventures.eyexam) application 1.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing - http://www.kb.cert.org/vuls/id/672609 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6436.
CVE ID: CVE-2017-6436 Date Updated: 2024-08-05T15:25:49.294Z Date Published: 2017-03-15T14:00:00 Description: The parse_string_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (memory allocation error) via a crafted plist file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/libimobiledevice/libplist/issues/94 - https://github.com/libimobiledevice/libplist/commit/32ee5213fe64f1e10ec76c1ee861ee6f233120dd - http://www.securityfocus.com/bid/97290 - https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50342.
CVE ID: CVE-2023-50342 Date Updated: 2024-09-06T17:28:51.871Z Date Published: 2024-01-03T02:39:45.432Z Description: HCL DRYiCE MyXalytics is impacted by an Insecure Direct Object Reference (IDOR) vulnerability.  A user can obtain certain details about another user as a result of improper access control. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-29561.
CVE ID: CVE-2020-29561 Date Updated: 2024-08-04T16:55:10.520Z Date Published: 2020-12-04T05:49:16 Description: An issue was discovered in SonicBOOM riscv-boom 3.0.0. For LR, it does not avoid acquiring a reservation in the case where a load translates successfully but still generates an exception. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/riscv-boom/riscv-boom/issues/504#issuecomment-736196635 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0128.
CVE ID: CVE-2016-0128 Date Updated: 2024-08-05T22:08:13.324Z Date Published: 2016-04-12T23:00:00 Description: The SAM and LSAD protocol implementations in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 do not properly establish an RPC channel, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "Windows SAM and LSAD Downgrade Vulnerability" or "BADLOCK." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://badlock.org/ - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-047 - https://www.kb.cert.org/vuls/id/813296 - https://www.samba.org/samba/security/CVE-2016-2118.html - https://bto.bluecoat.com/security-advisory/sa122 - http://www.securitytracker.com/id/1035534 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1141.
CVE ID: CVE-2019-1141 Date Updated: 2024-08-04T18:06:31.991Z Date Published: 2019-08-14T20:55:02 Description: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based). The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft Edge (HTML-based) and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the Chakra scripting engine handles objects in memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1141 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26847.
CVE ID: CVE-2022-26847 Date Updated: 2024-08-03T05:11:44.557Z Date Published: 2022-03-10T04:58:16 Description: SPIP before 3.2.14 and 4.x before 4.0.5 allows unauthenticated access to information about editorial objects. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.debian.org/debian-security-announce/2022/msg00060.html - https://blog.spip.net/Mise-a-jour-critique-de-securite-sorties-de-SPIP-4-0-5-et-SPIP-3-2-14.html - https://git.spip.net/spip/medias/commit/3014b845da2dd8ad15ff04b50fd9dbba388a9ca2 - https://lists.debian.org/debian-lts-announce/2022/03/msg00020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-17901.
CVE ID: CVE-2018-17901 Date Updated: 2024-09-16T21:57:33.671Z Date Published: 2018-10-17T02:00:00Z Description: LAquis SCADA Versions 4.1.0.3870 and prior, when processing project files the application fails to sanitize user input prior to performing write operations on a stack object, which may allow an attacker to execute code under the current process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://laquisscada.com/instale1.php - https://ics-cert.us-cert.gov/advisories/ICSA-18-289-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1629.
CVE ID: CVE-2020-1629 Date Updated: 2024-09-17T03:22:27.596Z Date Published: 2020-04-08T19:25:59.770859Z Description: A race condition vulnerability on Juniper Network Junos OS devices may cause the routing protocol daemon (RPD) process to crash and restart while processing a BGP NOTIFICATION message. This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S6; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R2-S11, 17.1R3-S1; 17.2 versions prior to 17.2R1-S9, 17.2R3-S3; 17.2 version 17.2R2 and later versions; 17.2X75 versions prior to 17.2X75-D105, 17.2X75-D110; 17.3 versions prior to 17.3R2-S5, 17.3R3-S6; 17.4 versions prior to 17.4R2-S7, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3-S3; 18.2X75 versions prior to 18.2X75-D410, 18.2X75-D420, 18.2X75-D50, 18.2X75-D60; 18.3 versions prior to 18.3R1-S5, 18.3R2-S2, 18.3R3; 18.4 versions prior to 18.4R2-S2, 18.4R3; 19.1 versions prior to 19.1R1-S2, 19.1R2; 19.2 versions prior to 19.2R1-S4, 19.2R2. This issue does not affect Juniper Networks Junos OS prior to version 16.1R1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.juniper.net/JSA11009 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4242.
CVE ID: CVE-2017-4242 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3571.
CVE ID: CVE-2009-3571 Date Updated: 2024-08-07T06:31:10.630Z Date Published: 2009-10-06T20:19:00 Description: Unspecified vulnerability in OpenOffice.org (OOo) has unknown impact and client-side attack vector, as demonstrated by a certain module in VulnDisco Pack Professional 8.8, aka "Client-side exploit." NOTE: as of 20091005, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/36285 - http://www.securitytracker.com/id?1022832 - http://secunia.com/advisories/35036 - http://intevydis.com/vd-list.shtml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-21009.
CVE ID: CVE-2018-21009 Date Updated: 2024-08-05T12:19:27.146Z Date Published: 2019-09-05T03:24:29 Description: Poppler before 0.66.0 has an integer overflow in Parser::makeStream in Parser.cc. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.freedesktop.org/poppler/poppler/commit/0868c499a9f5f37f8df5c9fef03c37496b40fc8a - https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html - https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14526.
CVE ID: CVE-2017-14526 Date Updated: 2024-08-05T19:27:40.860Z Date Published: 2017-09-27T17:00:00 Description: Multiple XML external entity (XXE) vulnerabilities in the OpenText Documentum Administrator 7.2.0180.0055 allow remote authenticated users to list the contents of arbitrary directories, read arbitrary files, cause a denial of service, or, on Windows, obtain Documentum user hashes via a (1) crafted DTD, involving unspecified XML structures in a request to xda/com/documentum/ucf/server/transport/impl/GAIRConnector or crafted XML file in a MediaProfile file (2) import or (3) check in. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2017/Sep/58 - https://knowledge.opentext.com/knowledge/llisapi.dll/Open/68982774 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5188.
CVE ID: CVE-2015-5188 Date Updated: 2024-08-06T06:41:09.012Z Date Published: 2015-10-27T16:00:00 Description: Cross-site request forgery (CSRF) vulnerability in the Web Console (web-console) in Red Hat Enterprise Application Platform before 6.4.4 and WildFly (formerly JBoss Application Server) before 2.0.0.CR9 allows remote attackers to hijack the authentication of administrators for requests that make arbitrary changes to an instance via vectors involving a file upload using a multipart/form-data submission. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1252885 - http://rhn.redhat.com/errata/RHSA-2015-1905.html - http://rhn.redhat.com/errata/RHSA-2015-1904.html - http://rhn.redhat.com/errata/RHSA-2015-1908.html - https://issues.jboss.org/browse/WFCORE-594 - http://rhn.redhat.com/errata/RHSA-2015-1907.html - http://www.securitytracker.com/id/1033859 - http://rhn.redhat.com/errata/RHSA-2015-1906.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-44994.
CVE ID: CVE-2024-44994 Date Updated: 2024-09-15T17:56:38.940Z Date Published: 2024-09-04T19:54:40.214Z Description: In the Linux kernel, the following vulnerability has been resolved: iommu: Restore lost return in iommu_report_device_fault() When iommu_report_device_fault gets called with a partial fault it is supposed to collect the fault into the group and then return. Instead the return was accidently deleted which results in trying to process the fault and an eventual crash. Deleting the return was a typo, put it back. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/cc6bc2ab1663ec9353636416af22452b078510e9 - https://git.kernel.org/stable/c/fca5b78511e98bdff2cdd55c172b23200a7b3404 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-41904.
CVE ID: CVE-2024-41904 Date Updated: 2024-08-13T14:25:30.856Z Date Published: 2024-08-13T07:54:23.788Z Description: A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V2.0). The affected application do not properly enforce restriction of excessive authentication attempts. This could allow an unauthenticated attacker to conduct brute force attacks against legitimate user credentials or keys. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/html/ssa-716317.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1208.
CVE ID: CVE-2014-1208 Date Updated: 2024-08-06T09:34:41.040Z Date Published: 2014-01-17T19:00:00 Description: VMware Workstation 9.x before 9.0.1, VMware Player 5.x before 5.0.1, VMware Fusion 5.x before 5.0.1, VMware ESXi 4.0 through 5.1, and VMware ESX 4.0 and 4.1 allow guest OS users to cause a denial of service (VMX process disruption) by using an invalid port. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/56499 - http://www.vmware.com/security/advisories/VMSA-2014-0001.html - http://www.securityfocus.com/bid/64994 - http://www.securitytracker.com/id/1029644 - http://osvdb.org/102197 - http://www.securitytracker.com/id/1029643 - https://exchange.xforce.ibmcloud.com/vulnerabilities/90558 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15993.
CVE ID: CVE-2018-15993 Date Updated: 2024-08-05T10:10:05.796Z Date Published: 2019-01-18T17:00:00 Description: Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/106164 - https://helpx.adobe.com/security/products/acrobat/apsb18-41.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13631.
CVE ID: CVE-2018-13631 Date Updated: 2024-08-05T09:07:52.522Z Date Published: 2018-07-09T06:00:00 Description: The mintToken function of a smart contract implementation for doccoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/BlockChainsSecurity/EtherTokens/tree/master/doccoin - https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11463.
CVE ID: CVE-2018-11463 Date Updated: 2024-08-05T08:10:14.230Z Date Published: 2018-12-12T16:00:00 Description: A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). A buffer overflow in the service command application could allow a local attacker to execute code with elevated privileges. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/106185 - https://cert-portal.siemens.com/productcert/pdf/ssa-170881.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4086.
CVE ID: CVE-2018-4086 Date Updated: 2024-08-05T05:04:29.518Z Date Published: 2018-04-03T06:00:00 Description: An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "Security" component. It allows remote attackers to spoof certificate validation via crafted name constraints. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT208462 - https://support.apple.com/HT208465 - http://www.securitytracker.com/id/1040265 - http://www.securityfocus.com/bid/102782 - https://support.apple.com/HT208464 - http://www.securitytracker.com/id/1040267 - https://support.apple.com/HT208463 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-37258.
CVE ID: CVE-2022-37258 Date Updated: 2024-08-03T10:29:20.487Z Date Published: 2022-09-16T20:57:18 Description: Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal 2.2.4 via the packageName variable in npm-convert.js. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L362 - https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/ext/npm-convert.js#L369 - https://github.com/stealjs/steal/issues/1527 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-24367.
CVE ID: CVE-2020-24367 Date Updated: 2024-08-04T15:12:09.010Z Date Published: 2020-11-10T20:43:28 Description: Incorrect file permissions in BlueStacks 4 through 4.230 on Windows allow a local attacker to escalate privileges by modifying a file that is later executed by a higher-privileged user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.bluestacks.com/hc/en-us/articles/360051471652--Bluestacks-update-fixes-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3445.
CVE ID: CVE-2016-3445 Date Updated: 2024-08-05T23:56:13.524Z Date Published: 2016-07-21T10:00:00 Description: Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0 and 12.1.3.0 allows remote attackers to affect availability via vectors related to Web Container, a different vulnerability than CVE-2016-5488. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - http://www.securitytracker.com/id/1036373 - http://www.securityfocus.com/bid/91787 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3951.
CVE ID: CVE-2015-3951 Date Updated: 2024-08-06T06:04:01.141Z Date Published: 2015-06-13T18:00:00 Description: RLE Nova-Wind Turbine HMI devices store cleartext credentials, which allows remote attackers to obtain sensitive information via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/75163 - https://ics-cert.us-cert.gov/advisories/ICSA-15-162-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-46755.
CVE ID: CVE-2022-46755 Date Updated: 2024-08-03T14:39:38.961Z Date Published: 2023-02-10T21:22:15.642Z Description: Wyse Management Suite 3.8 and below contain an improper access control vulnerability. A authenticated malicious admin user can edit general client policy for which the user is not authorized. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000206134/dsa-2022-329-dell-wyse-management-suite-security-update-for-multiple-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-16367.
CVE ID: CVE-2018-16367 Date Updated: 2024-08-05T10:24:31.706Z Date Published: 2018-09-02T22:00:00 Description: In OnlineJudge 2.0, the sandbox has an incorrect access control vulnerability that can write a file anywhere. A user can write a directory listing to /tmp, and can leak file data with a #include. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/QingdaoU/OnlineJudge/issues/165 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6347.
CVE ID: CVE-2008-6347 Date Updated: 2024-08-07T11:27:35.552Z Date Published: 2009-03-02T16:00:00 Description: PHP remote file inclusion vulnerability in lib/onguma.class.php in the Onguma Time Sheet (com_ongumatimesheet20) 2.0 4b component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/6976 - http://www.securityfocus.com/bid/32095 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6816.
CVE ID: CVE-2015-6816 Date Updated: 2024-08-06T07:29:25.323Z Date Published: 2017-08-09T18:00:00 Description: ganglia-web before 3.7.1 allows remote attackers to bypass authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1260562 - https://github.com/ganglia/ganglia-web/issues/267 - http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169641.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170362.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169788.html - https://www.freshports.org/sysutils/ganglia-webfrontend/ - http://www.openwall.com/lists/oss-security/2015/09/05/6 - http://www.securityfocus.com/bid/92146 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4513.
CVE ID: CVE-2015-4513 Date Updated: 2024-08-06T06:18:11.486Z Date Published: 2015-11-05T02:00:00 Description: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1034069 - http://www.debian.org/security/2015/dsa-3410 - http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html - https://security.gentoo.org/glsa/201512-10 - http://www.securityfocus.com/bid/77411 - https://bugzilla.mozilla.org/show_bug.cgi?id=1193038 - http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html - http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html - http://rhn.redhat.com/errata/RHSA-2015-2519.html - http://www.ubuntu.com/usn/USN-2785-1 - https://bugzilla.mozilla.org/show_bug.cgi?id=1107011 - http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html - https://bugzilla.mozilla.org/show_bug.cgi?id=1204700 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - https://bugzilla.mozilla.org/show_bug.cgi?id=1204669 - https://bugzilla.mozilla.org/show_bug.cgi?id=1208665 - http://rhn.redhat.com/errata/RHSA-2015-1982.html - http://www.ubuntu.com/usn/USN-2819-1 - http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html - https://bugzilla.mozilla.org/show_bug.cgi?id=1206564 - http://www.debian.org/security/2015/dsa-3393 - https://bugzilla.mozilla.org/show_bug.cgi?id=1191942 - http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html - https://bugzilla.mozilla.org/show_bug.cgi?id=1204580 - https://bugzilla.mozilla.org/show_bug.cgi?id=1209471 - http://www.mozilla.org/security/announce/2015/mfsa2015-116.html - https://bugzilla.mozilla.org/show_bug.cgi?id=1205707 - https://bugzilla.mozilla.org/show_bug.cgi?id=1213979 - http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22364.
CVE ID: CVE-2021-22364 Date Updated: 2024-08-03T18:44:12.301Z Date Published: 2021-05-27T12:44:16 Description: There is a denial of service vulnerability in the versions 10.1.0.126(C00E125R5P3) of HUAWEI Mate 30 and 10.1.0.152(C00E136R7P2) of HUAWEI Mate 30 (5G) . A module does not verify certain parameters sufficiently and it leads to some exceptions. Successful exploit could cause a denial of service condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210519-04-dos-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6109.
CVE ID: CVE-2012-6109 Date Updated: 2024-08-06T21:28:39.300Z Date Published: 2013-03-01T02:00:00Z Description: lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=895277 - https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5 - http://rack.github.com/ - https://github.com/rack/rack/blob/master/README.rdoc - https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ - http://rhn.redhat.com/errata/RHSA-2013-0548.html - http://rhn.redhat.com/errata/RHSA-2013-0544.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3776.
CVE ID: CVE-2013-3776 Date Updated: 2024-08-06T16:22:01.244Z Date Published: 2013-07-17T10:00:00 Description: Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7, 8.4.0, and 8.4.1 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2013-3781. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jvn.jp/en/jp/JVN68663052/index.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/85663 - http://osvdb.org/95276 - http://www.securityfocus.com/bid/61234 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html - http://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000071.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18243 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-061 - http://www-01.ibm.com/support/docview.wss?uid=swg21660640 - http://www.securitytracker.com/id/1028801 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1664.
CVE ID: CVE-2009-1664 Date Updated: 2024-08-07T05:20:35.148Z Date Published: 2009-05-17T16:00:00 Description: myaccount.php in Easy Scripts Answer and Question Script does not verify the original password before changing passwords, which allows remote attackers to change the password of other users and gain privileges via modified userid, txtpassword, and txtRpassword parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/8690 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1178.
CVE ID: CVE-2022-1178 Date Updated: 2024-08-02T23:55:24.554Z Date Published: 2022-03-30T11:00:20 Description: Stored Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/5813bd1f-b3aa-44f3-a5c0-aeeee2bf6fa4 - https://github.com/openemr/openemr/commit/347ad614507183035d188ba14427bc162419778c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-28547.
CVE ID: CVE-2021-28547 Date Updated: 2024-09-17T03:14:32.089Z Date Published: 2021-09-29T15:45:48.968490Z Description: Adobe Creative Cloud Desktop Application for macOS version 5.3 (and earlier) is affected by a privilege escalation vulnerability that could allow a normal user to delete the OOBE directory and get permissions of any directory under the administrator authority. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22168.
CVE ID: CVE-2022-22168 Date Updated: 2024-09-17T04:10:28.486Z Date Published: 2022-01-19T00:21:14.397981Z Description: An Improper Validation of Specified Type of Input vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated adjacent attacker to trigger a Missing Release of Memory after Effective Lifetime vulnerability. Continued exploitation of this vulnerability will eventually lead to an FPC reboot and thereby a Denial of Service (DoS). This issue affects: Juniper Networks Junos OS on vMX and MX150: All versions prior to 19.2R1-S8, 19.2R3-S4; 19.3 versions prior to 19.3R3-S5; 19.4 versions prior to 19.4R2-S5, 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R1-S1, 21.2R2; 21.3 versions prior to 21.3R1-S1, 21.3R2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.juniper.net/JSA11275 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4713.
CVE ID: CVE-2010-4713 Date Updated: 2024-09-16T23:06:37.624Z Date Published: 2011-01-31T19:00:00Z Description: Integer signedness error in gwia.exe in GroupWise Internet Agent (GWIA) in Novell GroupWise before 8.02HP allows remote attackers to execute arbitrary code via a signed integer value in the Content-Type header. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.novell.com/show_bug.cgi?id=642338 - http://www.novell.com/support/viewContent.do?externalId=7007154&sliceId=1 - http://zerodayinitiative.com/advisories/ZDI-10-241/ - http://www.facebook.com/note.php?note_id=477865030928 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-40697.
CVE ID: CVE-2024-40697 Date Updated: 2024-08-13T13:11:00.325Z Date Published: 2024-08-13T10:59:51.302Z Description: IBM Common Licensing 9.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 297895. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7165250 - https://exchange.xforce.ibmcloud.com/vulnerabilities/297895 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7776.
CVE ID: CVE-2019-7776 Date Updated: 2024-08-04T20:54:28.442Z Date Published: 2019-05-22T13:41:05 Description: Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-18.html - http://www.securityfocus.com/bid/108326 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2236.
CVE ID: CVE-2024-2236 Date Updated: 2024-09-14T03:12:54.823Z Date Published: 2024-03-06T22:07:16.617Z Description: A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/security/cve/CVE-2024-2236 - https://bugzilla.redhat.com/show_bug.cgi?id=2245218 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1717.
CVE ID: CVE-2010-1717 Date Updated: 2024-08-07T01:35:53.591Z Date Published: 2010-05-04T15:00:00 Description: Directory traversal vulnerability in the iF surfALERT (com_if_surfalert) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2010/0924 - http://secunia.com/advisories/39526 - http://www.exploit-db.com/exploits/12291 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3715.
CVE ID: CVE-2018-3715 Date Updated: 2024-09-17T04:08:49.420Z Date Published: 2018-06-07T02:00:00Z Description: glance node module before 3.0.4 suffers from a Path Traversal vulnerability due to lack of validation of path passed to it, which allows a malicious user to read content of any file with known path. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/310106 - https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40009.
CVE ID: CVE-2023-40009 Date Updated: 2024-09-20T13:18:37.537Z Date Published: 2023-10-03T12:45:15.131Z Description: Cross-Site Request Forgery (CSRF) vulnerability in ThimPress WP Pipes plugin <= 1.4.0 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/wp-pipes/wordpress-wp-pipes-plugin-1-4-0-multiple-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1857.
CVE ID: CVE-2023-1857 Date Updated: 2024-08-02T06:05:26.815Z Date Published: 2023-04-05T07:40:20.707Z Description: A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/?page=product/manage_product&id=2. The manipulation of the argument Product Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224996. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.224996 - https://vuldb.com/?ctiid.224996 - https://github.com/v2ish1yan/mycve/blob/main/ocls.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17092.
CVE ID: CVE-2017-17092 Date Updated: 2024-08-05T20:43:59.612Z Date Published: 2017-12-02T06:00:00 Description: wp-includes/functions.php in WordPress before 4.9.1 does not require the unfiltered_html capability for upload of .js files, which might allow remote attackers to conduct XSS attacks via a crafted file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.debian.org/security/2018/dsa-4090 - https://lists.debian.org/debian-lts-announce/2017/12/msg00019.html - https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509 - http://www.securityfocus.com/bid/102024 - https://codex.wordpress.org/Version_4.9.1 - https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/ - https://wpvulndb.com/vulnerabilities/8966 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33755.
CVE ID: CVE-2021-33755 Date Updated: 2024-08-03T23:58:23.090Z Date Published: 2021-07-14T17:53:29 Description: Windows Hyper-V Denial of Service Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33755 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-37014.
CVE ID: CVE-2024-37014 Date Updated: 2024-08-02T03:43:50.609Z Date Published: 2024-06-10T00:00:00 Description: Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/langflow-ai/langflow/issues/1973 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1059.
CVE ID: CVE-2020-1059 Date Updated: 2024-08-04T06:25:00.834Z Date Published: 2020-05-21T22:52:52 Description: A spoofing vulnerability exists when Microsoft Edge does not properly parse HTTP content, aka 'Microsoft Edge Spoofing Vulnerability'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1059 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30605.
CVE ID: CVE-2022-30605 Date Updated: 2024-09-17T02:47:58.703Z Date Published: 2022-08-22T18:24:29.434796Z Description: A privilege escalation vulnerability exists in the session id functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to increased privileges. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/WWBN/AVideo/blob/e04b1cd7062e16564157a82bae389eedd39fa088/updatedb/updateDb.v12.0.sql - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1535 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0338.
CVE ID: CVE-2023-0338 Date Updated: 2024-08-02T05:10:55.701Z Date Published: 2023-01-17T00:00:00 Description: Cross-site Scripting (XSS) - Reflected in GitHub repository lirantal/daloradius prior to master-branch. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/fcae1b67-db37-4d24-9137-8dda95573e77 - https://github.com/lirantal/daloradius/commit/e77a769c7503e63a2e3c05262cb5f8f81a4a7bbe No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-22401.
CVE ID: CVE-2023-22401 Date Updated: 2024-08-02T10:07:06.660Z Date Published: 2023-01-12T00:00:00 Description: An Improper Validation of Array Index vulnerability in the Advanced Forwarding Toolkit Manager daemon (aftmand) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On the PTX10008 and PTX10016 platforms running Junos OS or Junos OS Evolved, when a specific SNMP MIB is queried this will cause a PFE crash and the FPC will go offline and not automatically recover. A system restart is required to get the affected FPC in an operational state again. This issue affects: Juniper Networks Junos OS 22.1 version 22.1R2 and later versions; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2. Juniper Networks Junos OS Evolved 21.3-EVO version 21.3R3-EVO and later versions; 21.4-EVO version 21.4R1-S2-EVO, 21.4R2-EVO and later versions prior to 21.4R2-S1-EVO; 22.1-EVO version 22.1R2-EVO and later versions prior to 22.1R3-EVO; 22.2-EVO versions prior to 22.2R1-S1-EVO, 22.2R2-EVO. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.juniper.net/JSA70197 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34046.
CVE ID: CVE-2023-34046 Date Updated: 2024-08-02T16:01:52.426Z Date Published: 2023-10-20T08:59:08.671Z Description: VMware Fusion(13.x prior to 13.5) contains a TOCTOU (Time-of-check Time-of-use) vulnerability that occurs during installation for the first time (the user needs to drag or copy the application to a folder from the '.dmg' volume) or when installing an upgrade. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed or being installed for the first time. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vmware.com/security/advisories/VMSA-2023-0022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39806.
CVE ID: CVE-2023-39806 Date Updated: 2024-08-02T18:18:10.026Z Date Published: 2023-08-10T00:00:00 Description: iCMS v7.0.16 was discovered to contain a SQL injection vulnerability via the bakupdata function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://icms.com - http://icmsdev.com - https://gist.github.com/ChubbyZ/27fa6f43699c9964ddfa701614fc4d5e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-0523.
CVE ID: CVE-2012-0523 Date Updated: 2024-08-06T18:30:52.283Z Date Published: 2012-05-03T17:18:00 Description: Unspecified vulnerability in the Oracle Grid Engine component in Oracle Sun Products Suite 6.1 and 6.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to sgepasswd. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id?1026950 - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html - http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2903.
CVE ID: CVE-2009-2903 Date Updated: 2024-08-07T06:07:37.216Z Date Published: 2009-09-15T22:00:00 Description: Memory leak in the appletalk subsystem in the Linux kernel 2.4.x through 2.4.37.6 and 2.6.x through 2.6.31, when the appletalk and ipddp modules are loaded but the ipddp"N" device is not found, allows remote attackers to cause a denial of service (memory consumption) via IP-DDP datagrams. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2009/09/17/11 - http://www.securityfocus.com/bid/36379 - http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html - http://www.ubuntu.com/usn/USN-852-1 - http://secunia.com/advisories/36707 - https://bugzilla.redhat.com/show_bug.cgi?id=522331 - http://www.mandriva.com/security/advisories?name=MDVSA-2009:329 - http://www.openwall.com/lists/oss-security/2009/09/14/1 - http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html - http://secunia.com/advisories/37909 - http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html - http://git.kernel.org/?p=linux/kernel/git/davem/net-next-2.6.git%3Ba=commit%3Bh=ffcfb8db540ff879c2a85bf7e404954281443414 - http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html - http://secunia.com/advisories/37105 - http://www.openwall.com/lists/oss-security/2009/09/14/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8992.
CVE ID: CVE-2014-8992 Date Updated: 2024-08-06T13:33:12.649Z Date Published: 2014-12-22T19:00:00 Description: Cross-site scripting (XSS) vulnerability in manager/assets/fileapi/FileAPI.flash.image.swf in MODX Revolution 2.3.2-pl allows remote attackers to inject arbitrary web script or HTML via the callback parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/modxcms/revolution/issues/12161 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-8905.
CVE ID: CVE-2017-8905 Date Updated: 2024-08-05T16:48:22.839Z Date Published: 2017-05-11T19:00:00 Description: Xen through 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201705-11 - http://www.securitytracker.com/id/1038388 - https://xenbits.xen.org/xsa/advisory-215.html - http://www.securityfocus.com/bid/98436 - https://blog.xenproject.org/2017/05/02/updates-on-xsa-213-xsa-214-and-xsa-215/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24342.
CVE ID: CVE-2021-24342 Date Updated: 2024-08-03T19:28:23.516Z Date Published: 2021-06-07T10:49:50 Description: The JNews WordPress theme before 8.0.6 did not sanitise the cat_id parameter in the POST request /?ajax-request=jnews (with action=jnews_build_mega_category_*), leading to a Reflected Cross-Site Scripting (XSS) issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/415ca763-fe65-48cb-acd3-b375a400217e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12649.
CVE ID: CVE-2019-12649 Date Updated: 2024-09-16T19:30:27.068Z Date Published: 2019-09-25T20:05:17.289654Z Description: A vulnerability in the Image Verification feature of Cisco IOS XE Software could allow an authenticated, local attacker to install and boot a malicious software image or execute unsigned binaries on an affected device. The vulnerability exists because, under certain circumstances, an affected device can be configured to not verify the digital signatures of system image files during the boot process. An attacker could exploit this vulnerability by abusing a specific feature that is part of the device boot process. A successful exploit could allow the attacker to install and boot a malicious software image or execute unsigned binaries on the targeted device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-digsig-bypass No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7059.
CVE ID: CVE-2019-7059 Date Updated: 2024-08-04T20:38:32.589Z Date Published: 2019-05-24T18:29:17 Description: Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-07.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2858.
CVE ID: CVE-2022-2858 Date Updated: 2024-08-03T00:52:59.563Z Date Published: 2022-09-26T15:01:14 Description: Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html - https://crbug.com/1341918 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-7371.
CVE ID: CVE-2024-7371 Date Updated: 2024-08-06T20:28:43.589Z Date Published: 2024-08-01T23:00:09.256Z Description: A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /quiz_view.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273355. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.273355 - https://vuldb.com/?ctiid.273355 - https://vuldb.com/?submit.383519 - https://gist.github.com/topsky979/e45c2b283d29bc0a2f3551ca9cb45999 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-4247.
CVE ID: CVE-2009-4247 Date Updated: 2024-08-07T06:54:10.219Z Date Published: 2010-01-25T19:00:00 Description: Stack-based buffer overflow in protocol/rtsp/rtspclnt.cpp in RealNetworks RealPlayer 10; RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741; RealPlayer 11 11.0.x; RealPlayer SP 1.0.0 and 1.0.1; RealPlayer Enterprise; Mac RealPlayer 10, 10.1, 11.0, and 11.0.1; Linux RealPlayer 10, 11.0.0, and 11.0.1; and Helix Player 10.x, 11.0.0, and 11.0.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an ASM RuleBook with a large number of rules, related to an "array overflow." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.redhat.com/support/errata/RHSA-2010-0094.html - http://www.vupen.com/english/advisories/2010/0178 - http://securitytracker.com/id?1023489 - http://service.real.com/realplayer/security/01192010_player/en/ - http://secunia.com/advisories/38450 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10677 - http://lists.helixcommunity.org/pipermail/protocol-cvs/2009-August/001943.html - https://helixcommunity.org/viewcvs/protocol/rtsp/rtspclnt.cpp?view=log#rev1.245 - http://lists.helixcommunity.org/pipermail/helix-client-dev/2009-August/008092.html - http://secunia.com/advisories/38218 - https://bugzilla.redhat.com/show_bug.cgi?id=561338 - http://www.securityfocus.com/bid/37880 - https://exchange.xforce.ibmcloud.com/vulnerabilities/55802 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13286.
CVE ID: CVE-2020-13286 Date Updated: 2024-08-04T12:11:19.556Z Date Published: 2020-08-13T13:30:55 Description: For GitLab before 13.0.12, 13.1.6, 13.2.3 user controlled git configuration settings can be modified to result in Server Side Request Forgery. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab/-/issues/215212 - https://hackerone.com/reports/855276 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13286.json No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-45349.
CVE ID: CVE-2023-45349 Date Updated: 2024-09-19T15:39:47.839Z Date Published: 2023-10-09T00:00:00 Description: Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.34.7, 4000 Assistant V10 R1.42.0, 4000 Assistant V10 R0, 4000 Manager V10 R1 before V10 R1.34.7, 4000 Manager V10 R1.42.0, and 4000 Manager V10 R0 expose sensitive information that may allow lateral movement to the backup system via AShbr. This is also known as OSFOURK-23722. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://networks.unify.com/security/advisories/OBSO-2306-01.pdf - https://www.news.de/technik/856969401/unify-openscape-4000-gefaehrdet-it-sicherheitswarnung-vom-bsi-und-bug-report-bekannte-schwachstellen-und-sicherheitsluecken/1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20091.
CVE ID: CVE-2022-20091 Date Updated: 2024-08-03T02:02:30.733Z Date Published: 2022-05-03T19:58:31 Description: In aee driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06226345. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/May-2022 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2685.
CVE ID: CVE-2012-2685 Date Updated: 2024-08-06T19:42:31.900Z Date Published: 2012-09-28T17:00:00 Description: Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allows remote authenticated users to cause a denial of service (memory consumption) via a large size in an image request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/55618 - http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=830248 - http://rhn.redhat.com/errata/RHSA-2012-1278.html - http://rhn.redhat.com/errata/RHSA-2012-1281.html - http://secunia.com/advisories/50660 - https://exchange.xforce.ibmcloud.com/vulnerabilities/78774 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4027.
CVE ID: CVE-2010-4027 Date Updated: 2024-08-07T03:34:36.304Z Date Published: 2010-10-28T19:00:00 Description: Unspecified vulnerability in the camera application in HP Palm webOS 1.4.1 allows local users to overwrite arbitrary files via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://marc.info/?l=bugtraq&m=128820226417721&w=2 - http://www.securitytracker.com/id?1024658 - http://marc.info/?l=bugtraq&m=128820226417721&w=2 - http://secunia.com/advisories/42023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5198.
CVE ID: CVE-2012-5198 Date Updated: 2024-09-16T19:24:20.332Z Date Published: 2013-02-16T21:00:00Z Description: Unspecified vulnerability in HP ArcSight Connector Appliance before 6.3 and ArcSight Logger 5.2 and earlier allows remote attackers to obtain sensitive information via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03606700 - http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03606700 - http://www.kb.cert.org/vuls/id/988100 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46999.
CVE ID: CVE-2021-46999 Date Updated: 2024-08-04T05:24:37.916Z Date Published: 2024-02-28T08:13:22.256Z Description: In the Linux kernel, the following vulnerability has been resolved: sctp: do asoc update earlier in sctp_sf_do_dupcook_a There's a panic that occurs in a few of envs, the call trace is as below: [] general protection fault, ... 0x29acd70f1000a: 0000 [#1] SMP PTI [] RIP: 0010:sctp_ulpevent_notify_peer_addr_change+0x4b/0x1fa [sctp] [] sctp_assoc_control_transport+0x1b9/0x210 [sctp] [] sctp_do_8_2_transport_strike.isra.16+0x15c/0x220 [sctp] [] sctp_cmd_interpreter.isra.21+0x1231/0x1a10 [sctp] [] sctp_do_sm+0xc3/0x2a0 [sctp] [] sctp_generate_timeout_event+0x81/0xf0 [sctp] This is caused by a transport use-after-free issue. When processing a duplicate COOKIE-ECHO chunk in sctp_sf_do_dupcook_a(), both COOKIE-ACK and SHUTDOWN chunks are allocated with the transort from the new asoc. However, later in the sideeffect machine, the old asoc is used to send them out and old asoc's shutdown_last_sent_to is set to the transport that SHUTDOWN chunk attached to in sctp_cmd_setup_t2(), which actually belongs to the new asoc. After the new_asoc is freed and the old asoc T2 timeout, the old asoc's shutdown_last_sent_to that is already freed would be accessed in sctp_sf_t2_timer_expire(). Thanks Alexander and Jere for helping dig into this issue. To fix it, this patch is to do the asoc update first, then allocate the COOKIE-ACK and SHUTDOWN chunks with the 'updated' old asoc. This would make more sense, as a chunk from an asoc shouldn't be sent out with another asoc. We had fixed quite a few issues caused by this. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/d624f2991b977821375fbd56c91b0c91d456a697 - https://git.kernel.org/stable/c/b1b31948c0af44628e43353828453461bb74098f - https://git.kernel.org/stable/c/f01988ecf3654f805282dce2d3bb9afe68d2691e - https://git.kernel.org/stable/c/61b877bad9bb0d82b7d8841be50872557090a704 - https://git.kernel.org/stable/c/0bfd913c2121b3d553bfd52810fe6061d542d625 - https://git.kernel.org/stable/c/35b4f24415c854cd718ccdf38dbea6297f010aae No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8379.
CVE ID: CVE-2015-8379 Date Updated: 2024-08-06T08:13:32.492Z Date Published: 2016-01-26T19:00:00 Description: CakePHP 2.x and 3.x before 3.1.5 might allow remote attackers to bypass the CSRF protection mechanism via the _method parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/135301/CakePHP-3.2.0-CSRF-Bypass.html - http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html - http://www.securityfocus.com/archive/1/537317/100/0/threaded - http://karmainsecurity.com/KIS-2016-01 - http://bakery.cakephp.org/2015/11/29/cakephp_315_released.html - http://seclists.org/fulldisclosure/2016/Jan/42 - https://github.com/cakephp/cakephp/commit/0f818a23a876c01429196bf7623e1e94a50230f0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-13548.
CVE ID: CVE-2019-13548 Date Updated: 2024-08-04T23:57:39.467Z Date Published: 2019-09-13T16:58:29 Description: CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which could cause a stack overflow and create a denial-of-service condition or allow remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.us-cert.gov/ics/advisories/icsa-19-255-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0769.
CVE ID: CVE-2020-0769 Date Updated: 2024-08-04T06:11:05.629Z Date Published: 2020-03-12T15:48:07 Description: An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows CSC Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0771. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0769 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30502.
CVE ID: CVE-2021-30502 Date Updated: 2024-08-03T22:32:41.142Z Date Published: 2021-04-25T02:55:10 Description: The unofficial vscode-ghc-simple (aka Simple Glasgow Haskell Compiler) extension before 0.2.3 for Visual Studio Code allows remote code execution via a crafted workspace configuration with replCommand. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/dramforever/vscode-ghc-simple/releases - https://vuln.ryotak.me/advisories/38 - https://github.com/dramforever/vscode-ghc-simple/blob/master/CHANGELOG.md#v023 - https://github.com/dramforever/vscode-ghc-simple/commit/bc7f6f0b857dade46ea51496d8bd1a4edef39b46 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2102.
CVE ID: CVE-2010-2102 Date Updated: 2024-08-07T02:25:06.760Z Date Published: 2010-05-27T22:00:00 Description: Buffer overflow in Webby Webserver 1.01 allows remote attackers to execute arbitrary code via a long HTTP GET request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/511428/100/0/threaded - https://exchange.xforce.ibmcloud.com/vulnerabilities/58892 - http://www.securityfocus.com/bid/40353 - http://www.exploit-db.com/exploits/12740 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32453.
CVE ID: CVE-2022-32453 Date Updated: 2024-08-03T07:39:51.192Z Date Published: 2022-08-18T07:13:13 Description: HTTP header injection vulnerability in Cybozu Office 10.0.0 to 10.8.5 may allow a remote attacker to obtain and/or alter the data of the product via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cs.cybozu.co.jp/2022/007584.html - https://jvn.jp/en/jp/JVN20573662/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-39298.
CVE ID: CVE-2022-39298 Date Updated: 2024-08-03T12:00:44.011Z Date Published: 2022-10-12T00:00:00 Description: MelisFront is the engine that displays website hosted on Melis Platform. It deals with showing pages, plugins, URL rewritting, search optimization and SEO, etc. Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-front`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-front` >= 5.0.1. This issue was addressed by restricting allowed classes when deserializing user-controlled data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/melisplatform/melis-front/security/advisories/GHSA-h479-2mv4-5c26 - https://github.com/melisplatform/melis-front/commit/89ae612d5f1f7aa2fb621ee8de27dffe1feb851e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30280.
CVE ID: CVE-2023-30280 Date Updated: 2024-08-02T14:21:44.771Z Date Published: 2023-04-26T00:00:00 Description: Buffer Overflow vulnerability found in Netgear R6900 v.1.0.2.26, R6700v3 v.1.0.4.128, R6700 v.1.0.0.26 allows a remote attacker to execute arbitrary code and cause a denial ofservice via the getInputData parameter of the fwSchedule.cgi page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.netgear.com/about/security/ - https://github.com/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-25020.
CVE ID: CVE-2021-25020 Date Updated: 2024-08-03T19:49:14.597Z Date Published: 2022-01-03T12:49:13 Description: The CAOS | Host Google Analytics Locally WordPress plugin before 4.1.9 does not validate the cache directory setting, allowing high privilege users to use a path traversal vector and delete arbitrary folders when uninstalling the plugin No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/67398332-b93e-46ae-8904-68419949a124 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38300.
CVE ID: CVE-2021-38300 Date Updated: 2024-08-04T01:37:16.284Z Date Published: 2021-09-20T05:25:30 Description: arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2021/09/15/5 - https://security.netapp.com/advisory/ntap-20211008-0003/ - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 - https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html - https://www.debian.org/security/2022/dsa-5096 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4798.
CVE ID: CVE-2019-4798 Date Updated: 2019-12-30T16:19:29 Date Published: 2019-12-30T16:19:29 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6728.
CVE ID: CVE-2008-6728 Date Updated: 2024-08-07T11:41:59.672Z Date Published: 2009-04-20T14:06:00 Description: SQL injection vulnerability in the Sections module in PHP-Nuke, probably before 8.0, allows remote attackers to execute arbitrary SQL commands via the artid parameter in a printpage action to modules.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/499656/100/0/threaded - http://osvdb.org/52033 - http://marc.info/?l=bugtraq&m=123073887531700&w=2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4336.
CVE ID: CVE-2011-4336 Date Updated: 2024-08-07T00:01:51.572Z Date Published: 2020-01-15T13:48:01 Description: Tiki Wiki CMS Groupware 7.0 has XSS via the GET "ajax" parameter to snarf_ajax.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://seclists.org/bugtraq/2011/Nov/140 - https://www.securityfocus.com/bid/48806/info No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.