instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2020-16956.
CVE ID: CVE-2020-16956 Date Updated: 2024-08-04T13:45:34.790Z Date Published: 2020-10-16T22:18:05 Description: <p>A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not properly sanitize a specially crafted web request to an affected Dynamics server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected Dynamics server.</p> <p>The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current authenticated user. These attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions within Dynamics Server on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user.</p> <p>The security update addresses the vulnerability by helping to ensure that Dynamics Server properly sanitizes web requests.</p> No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16956 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47141.
CVE ID: CVE-2021-47141 Date Updated: 2024-08-04T05:24:39.872Z Date Published: 2024-03-25T09:07:39.737Z Description: In the Linux kernel, the following vulnerability has been resolved: gve: Add NULL pointer checks when freeing irqs. When freeing notification blocks, we index priv->msix_vectors. If we failed to allocate priv->msix_vectors (see abort_with_msix_vectors) this could lead to a NULL pointer dereference if the driver is unloaded. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/821149ee88c206fa37e79c1868cc270518484876 - https://git.kernel.org/stable/c/da21a35c00ff1a1794d4f166d3b3fa8db4d0f6fb - https://git.kernel.org/stable/c/5278c75266c5094d3c0958793bf12fc90300e580 - https://git.kernel.org/stable/c/5218e919c8d06279884aa0baf76778a6817d5b93 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11358.
CVE ID: CVE-2018-11358 Date Updated: 2024-08-05T08:10:13.402Z Date Published: 2018-05-22T21:00:00 Description: In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wireshark.org/security/wnpa-sec-2018-31.html - http://www.securityfocus.com/bid/104308 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689 - https://www.debian.org/security/2018/dsa-4217 - https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ccb1ac3c8cec47fbbbf2e80ced80644005c65252 - https://lists.debian.org/debian-lts-announce/2018/05/msg00019.html - http://www.securitytracker.com/id/1041036 - http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6320.
CVE ID: CVE-2016-6320 Date Updated: 2024-08-06T01:29:18.439Z Date Published: 2016-08-19T21:00:00 Description: Cross-site scripting (XSS) vulnerability in app/assets/javascripts/host_edit_interfaces.js in Foreman before 1.12.2 allows remote authenticated users to inject arbitrary web script or HTML via the network interface device identifier in the host interface form. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHBA-2016:1885 - http://www.securityfocus.com/bid/92431 - https://theforeman.org/security.html#2016-6320 - https://github.com/theforeman/foreman/pull/3714/commits/850c38451c7bbde75521b796d16aca26e4d240a0 - https://bugzilla.redhat.com/show_bug.cgi?id=1365785 - http://projects.theforeman.org/issues/16022 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19616.
CVE ID: CVE-2019-19616 Date Updated: 2024-08-05T02:25:12.212Z Date Published: 2019-12-06T02:06:33 Description: An Insecure Direct Object Reference (IDOR) vulnerability in the Xtivia Web Time and Expense (WebTE) interface used for Microsoft Dynamics NAV before 2017 allows an attacker to download arbitrary files by specifying arbitrary values for the recId and filename parameters of the /Home/GetAttachment function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.nolanbkennedy.com/post/insecure-direct-object-reference-idor-in-xtivia-web-time-and-expense-webte No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36107.
CVE ID: CVE-2022-36107 Date Updated: 2024-08-03T09:52:00.556Z Date Published: 2022-09-13T17:30:13 Description: TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the `FileDumpController` (backend and frontend context) is vulnerable to cross-site scripting when malicious files are displayed using this component. A valid backend user account is needed to exploit this vulnerability. Update to TYPO3 version 7.6.58 ELTS, 8.7.48 ELTS, 9.5.37 ELTS, 10.4.32 or 11.5.16 that fix the problem. There are no known workarounds for this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/TYPO3/typo3/security/advisories/GHSA-9c6w-55cp-5w25 - https://github.com/TYPO3/typo3/commit/bd58d2ff2eeef89e63ef754a2389597d22622a39 - https://typo3.org/security/advisory/typo3-core-sa-2022-009 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7519.
CVE ID: CVE-2017-7519 Date Updated: 2024-08-05T16:04:11.820Z Date Published: 2018-07-27T14:00:00 Description: In Ceph, a format string flaw was found in the way libradosstriper parses input from user. A user could crash an application or service using the libradosstriper library. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/99075 - https://www.debian.org/security/2018/dsa-4339 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7519 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1204.002
The MITRE ATT&CK technique T1204.002: Malicious File is related to the vulnerability CVE-CVE-2017-8570. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2024-20712.
CVE ID: CVE-2024-20712 Date Updated: 2024-08-01T21:59:42.847Z Date Published: 2024-01-10T12:25:59.624Z Description: Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/substance3d_stager/apsb24-06.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5844.
CVE ID: CVE-2012-5844 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-29752.
CVE ID: CVE-2023-29752 Date Updated: 2024-08-02T14:14:39.913Z Date Published: 2023-06-09T00:00:00 Description: An issue found in Facemoji Emoji Keyboard v.2.9.1.2 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29752/CVE%20detailed.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-38280.
CVE ID: CVE-2022-38280 Date Updated: 2024-08-03T10:54:02.250Z Date Published: 2022-09-09T13:40:52 Description: JFinal CMS 5.1.0 is vulnerable to SQL Injection via /admin/image/list. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jflyfox/jfinal_cms/issues/51 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2085.
CVE ID: CVE-2023-2085 Date Updated: 2024-08-02T06:12:20.324Z Date Published: 2023-06-09T05:33:26.919Z Description: The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the templates function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/ad2c1ab6-5c78-4317-b5e7-c86e2eebeb4f?source=cve - https://plugins.trac.wordpress.org/browser/essential-blocks/tags/4.0.6/includes/Admin/Admin.php - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2900595%40essential-blocks%2Ftrunk&old=2900029%40essential-blocks%2Ftrunk&sfp_email=&sfph_mail=#file2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12352.
CVE ID: CVE-2019-12352 Date Updated: 2024-08-04T23:17:39.870Z Date Published: 2022-06-17T12:11:12 Description: An issue was discovered in zzcms 2019. There is a SQL injection Vulnerability in /dl/dl_sendmail.php (when the attacker has dls_print authority) via a dlid cookie. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/cby234/zzcms/issues/5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4567.
CVE ID: CVE-2017-4567 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8021.
CVE ID: CVE-2018-8021 Date Updated: 2024-08-05T06:46:11.477Z Date Published: 2018-11-07T14:00:00 Description: Versions of Superset prior to 0.23 used an unsafe load method from the pickle library to deserialize data leading to possible remote code execution. Note Superset 0.23 was released prior to any Superset release under the Apache Software Foundation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/45933/ - https://github.com/apache/incubator-superset/pull/4243 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-22126.
CVE ID: CVE-2024-22126 Date Updated: 2024-08-01T22:35:34.804Z Date Published: 2024-02-13T01:58:27.745Z Description: The User Admin application of SAP NetWeaver AS for Java - version 7.50, insufficiently validates and improperly encodes the incoming URL parameters before including them into the redirect URL. This results in Cross-Site Scripting (XSS) vulnerability, leading to a high impact on confidentiality and mild impact on integrity and availability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://me.sap.com/notes/3417627 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-20313.
CVE ID: CVE-2024-20313 Date Updated: 2024-08-09T18:34:02.110Z Date Published: 2024-04-24T20:42:10.379Z Description: A vulnerability in the OSPF version 2 (OSPFv2) feature of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of OSPF updates that are processed by a device. An attacker could exploit this vulnerability by sending a malformed OSPF update to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ospf-dos-dR9Sfrxp No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1270.
CVE ID: CVE-2008-1270 Date Updated: 2024-08-07T08:17:34.265Z Date Published: 2008-03-10T21:00:00 Description: mod_userdir in lighttpd 1.4.18 and earlier, when userdir.path is not set, uses a default of $HOME, which might allow remote attackers to read arbitrary files, as demonstrated by accessing the ~nobody directory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://issues.rpath.com/browse/RPL-2344 - http://secunia.com/advisories/29622 - http://secunia.com/advisories/29318 - http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html - http://security.gentoo.org/glsa/glsa-200804-08.xml - http://www.debian.org/security/2008/dsa-1521 - http://www.lighttpd.net/security/lighttpd_sa_2008_03.txt - http://www.securityfocus.com/archive/1/489465/100/0/threaded - http://secunia.com/advisories/29636 - http://www.vupen.com/english/advisories/2008/0885/references - http://www.securityfocus.com/bid/28226 - http://trac.lighttpd.net/trac/ticket/1587 - http://secunia.com/advisories/29403 - http://www.lighttpd.net/2008/3/10/1-4-19-made-in-germany - https://bugs.gentoo.org/show_bug.cgi?id=212930 - http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106 - https://exchange.xforce.ibmcloud.com/vulnerabilities/41173 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11591.
CVE ID: CVE-2018-11591 Date Updated: 2024-09-16T23:41:10.205Z Date Published: 2018-05-31T16:00:00Z Description: Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via a NULL pointer dereference during syntax parsing. This was addressed by adding validation for a debug trace print statement in jsvar.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/espruino/Espruino/issues/1420 - https://github.com/espruino/Espruino/commit/b6d362f6a1f2de0b3e7604848116efb509196bf4 - https://github.com/espruino/Espruino/files/2015612/test.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27108.
CVE ID: CVE-2023-27108 Date Updated: 2024-08-02T12:01:32.512Z Date Published: 2023-05-01T00:00:00 Description: An issue was discovered in KaiOS 3.0. The pre-installed Communications application exposes a Web Activity that returns the user's call log without origin or permission checks. An attacker can inject a JavaScript payload that runs in a browser or app without user interaction or consent. This allows an attacker to send the user's call logs to a remote server via XMLHttpRequest or Fetch. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/Tombarr/5ed6675f33e0eca149a8b4d38ce76dda - https://kaios.dev/cve/1409490 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1928.
CVE ID: CVE-2022-1928 Date Updated: 2024-08-03T00:17:00.935Z Date Published: 2022-05-29T00:00:00 Description: Cross-site Scripting (XSS) - Stored in GitHub repository go-gitea/gitea prior to 1.16.9. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/6336ec42-5c4d-4f61-ae38-2bb539f433d2 - https://github.com/go-gitea/gitea/commit/65e0688a5c9dacad50e71024b7529fdf0e3c2e9c - https://security.gentoo.org/glsa/202210-14 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1044.
CVE ID: CVE-2017-1044 Date Updated: 2023-02-22T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4772.
CVE ID: CVE-2011-4772 Date Updated: 2024-09-17T02:37:21.769Z Date Published: 2012-01-25T02:00:00Z Description: The 360 KouXin (com.qihoo360.kouxin) application 1.5.3 for Android does not properly protect data, which allows remote attackers to read or modify SMS messages and a contact list via a crafted application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2011-4772-vulnerability-in-360KouXin.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20190.
CVE ID: CVE-2018-20190 Date Updated: 2024-08-05T11:58:18.151Z Date Published: 2018-12-17T20:00:00 Description: In LibSass 3.5.5, a NULL Pointer Dereference in the function Sass::Eval::operator()(Sass::Supports_Operator*) in eval.cpp may cause a Denial of Service (application crash) via a crafted sass input file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/106232 - https://github.com/sass/libsass/issues/2786 - http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00047.html - http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00051.html - http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00027.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-45041.
CVE ID: CVE-2024-45041 Date Updated: 2024-09-09T17:11:22.575Z Date Published: 2024-09-09T14:54:31.066Z Description: External Secrets Operator is a Kubernetes operator that integrates external secret management systems. The external-secrets has a deployment called default-external-secrets-cert-controller, which is bound with a same-name ClusterRole. This ClusterRole has "get/list" verbs of secrets resources. It also has path/update verb of validatingwebhookconfigurations resources. This can be used to abuse the SA token of the deployment to retrieve or get ALL secrets in the whole cluster, capture and log all data from requests attempting to update Secrets, or make a webhook deny all Pod create and update requests. This vulnerability is fixed in 0.10.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/external-secrets/external-secrets/security/advisories/GHSA-qwgc-rr35-h4x9 - https://github.com/external-secrets/external-secrets/commit/428a452fd2ad45935312f2c2c0d40bc37ce6e67c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39086.
CVE ID: CVE-2021-39086 Date Updated: 2024-09-16T19:45:45.375Z Date Published: 2022-08-16T18:45:48.196675Z Description: IBM Sterling File Gateway 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 215889. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6612537 - https://exchange.xforce.ibmcloud.com/vulnerabilities/215889 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2018-18987
CVE-CVE-2018-18987 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1574: Hijack Execution Flow. The vulnerability is classified as a secondary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2018 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2013-2627.
CVE ID: CVE-2013-2627 Date Updated: 2024-08-06T15:44:32.329Z Date Published: 2013-12-21T00:00:00 Description: SQL injection vulnerability in action.php in Leed (Light Feed), possibly before 1.5 Stable, allows remote attackers to execute arbitrary SQL commands via the id parameter in a removeFolder action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/bugtraq/2013/Dec/107 - http://www.securityfocus.com/bid/64426 - http://www.csnc.ch/misc/files/advisories/CSNC-2013-005-006-007_Leed_Multiple_vulns.txt - http://osvdb.org/101156 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5564.
CVE ID: CVE-2023-5564 Date Updated: 2024-09-17T17:08:03.569Z Date Published: 2023-10-13T00:00:19.626Z Description: Cross-site Scripting (XSS) - Stored in GitHub repository froxlor/froxlor prior to 2.1.0-dev1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/9254d8f3-a847-4ae8-8477-d2ce027cff5c - https://github.com/froxlor/froxlor/commit/e8ed43056c1665522a586e3485da67f2bdf073aa No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-22636.
CVE ID: CVE-2023-22636 Date Updated: 2024-08-02T10:13:49.450Z Date Published: 2023-02-27T08:55:03.706Z Description: An unauthorized configuration download vulnerability in FortiWeb 6.3.6 through 6.3.21, 6.4.0 through 6.4.2 and 7.0.0 through 7.0.4 may allow a local attacker to access confidential configuration files via a crafted http request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/psirt/FG-IR-22-460 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0780.
CVE ID: CVE-2018-0780 Date Updated: 2024-09-16T19:47:29.319Z Date Published: 2018-01-04T14:00:00Z Description: Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0767 and CVE-2018-0800. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/43720/ - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0780 - http://www.securitytracker.com/id/1040100 - http://www.securityfocus.com/bid/102389 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30575.
CVE ID: CVE-2022-30575 Date Updated: 2024-09-16T17:29:00.246Z Date Published: 2022-08-16T17:55:10.368153Z Description: The Web Console component of TIBCO Software Inc.'s TIBCO Data Science - Workbench, TIBCO Statistica, TIBCO Statistica - Estore Edition, and TIBCO Statistica Trial contains easily exploitable Reflected Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker with network access to execute scripts targeting the affected system or the victim's local system. Affected releases are TIBCO Software Inc.'s TIBCO Data Science - Workbench: versions 14.0.0 and below, TIBCO Statistica: versions 14.0.0 and below, TIBCO Statistica - Estore Edition: versions 14.0.0 and below, and TIBCO Statistica Trial: versions 14.0.0 and below. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tibco.com/services/support/advisories - https://www.tibco.com/support/advisories/2022/08/tibco-security-advisory-august-16-2022-tibco-statistica-cve-2022-30575 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7832.
CVE ID: CVE-2014-7832 Date Updated: 2024-08-06T13:03:27.260Z Date Published: 2014-11-24T11:00:00 Description: mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by viewing an activity instance. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1031215 - http://openwall.com/lists/oss-security/2014/11/17/11 - http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47921 - https://moodle.org/mod/forum/discuss.php?d=275154 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6973.
CVE ID: CVE-2016-6973 Date Updated: 2024-08-06T01:43:38.747Z Date Published: 2016-10-13T19:00:00 Description: Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1036986 - https://helpx.adobe.com/security/products/acrobat/apsb16-33.html - http://www.securityfocus.com/bid/93496 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3285.
CVE ID: CVE-2020-3285 Date Updated: 2024-09-16T16:58:40.942Z Date Published: 2020-05-06T16:42:02.593614Z Description: A vulnerability in the Transport Layer Security version 1.3 (TLS 1.3) policy with URL category functionality for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured TLS 1.3 policy to block traffic for a specific URL. The vulnerability is due to a logic error with Snort handling of the connection with the TLS 1.3 policy and URL category configuration. An attacker could exploit this vulnerability by sending crafted TLS 1.3 connections to an affected device. A successful exploit could allow the attacker to bypass the TLS 1.3 policy and access URLs that are outside the affected device and normally would be dropped. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssl-bypass-O5tGum2n No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2489.
CVE ID: CVE-2014-2489 Date Updated: 2024-08-06T10:14:26.604Z Date Published: 2014-07-17T02:36:00 Description: Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34, 4.2.26, and 4.3.12 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vmware.com/security/advisories/VMSA-2014-0012.html - http://www.securityfocus.com/archive/1/534161/100/0/threaded - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - http://seclists.org/fulldisclosure/2014/Dec/23 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33215.
CVE ID: CVE-2021-33215 Date Updated: 2024-08-03T23:42:20.280Z Date Published: 2021-07-07T14:04:16 Description: An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. The API allows Directory Traversal. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://korelogic.com/advisories.html - http://seclists.org/fulldisclosure/2021/May/76 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3167.
CVE ID: CVE-2018-3167 Date Updated: 2024-10-02T19:40:53.765Z Date Published: 2018-10-17T01:00:00 Description: Vulnerability in the Application Management Pack for Oracle E-Business Suite component of Oracle E-Business Suite (subcomponent: User Monitoring). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Application Management Pack for Oracle E-Business Suite. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Application Management Pack for Oracle E-Business Suite accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1041897 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - http://www.securityfocus.com/bid/105627 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-7733.
CVE ID: CVE-2024-7733 Date Updated: 2024-08-13T18:44:31.529Z Date Published: 2024-08-13T18:00:11.066Z Description: A vulnerability, which was classified as problematic, was found in FastCMS up to 0.1.5. Affected is an unknown function of the component New Article Category Page. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.274350 - https://vuldb.com/?ctiid.274350 - https://gitee.com/xjd2020/fastcms/issues/IAI8T6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2990.
CVE ID: CVE-2015-2990 Date Updated: 2024-08-06T05:32:21.135Z Date Published: 2015-09-05T01:00:00 Description: Directory traversal vulnerability in zhtml.cgi in NEOJAPAN desknet NEO 2.0R1.0 through 2.5R1.4 allows remote authenticated users to read arbitrary files via a crafted parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jvndb.jvn.jp/jvndb/JVNDB-2015-000122 - http://jvn.jp/en/jp/JVN09283606/index.html - http://www.desknets.com/neo/support/mainte/2590/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38528.
CVE ID: CVE-2021-38528 Date Updated: 2024-08-04T01:44:22.991Z Date Published: 2021-08-11T00:00:51 Description: Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D8500 before 1.0.3.58, R6900P before 1.3.2.132, R7000P before 1.3.2.132, R7100LG before 1.0.0.64, WNDR3400v3 before 1.0.1.38, and XR300 before 1.0.3.56. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000063781/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Gateways-and-Routers-PSV-2020-0297 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2146.
CVE ID: CVE-2019-2146 Date Updated: 2024-08-04T18:42:50.156Z Date Published: 2019-09-27T18:05:11 Description: In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112859714 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/android-10 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12673.
CVE ID: CVE-2018-12673 Date Updated: 2024-08-05T08:45:00.692Z Date Published: 2018-10-19T22:00:00 Description: An attacker with remote access to the SV3C HD Camera (L-SERIES V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B) web interface can disclose information about the camera including camera hardware, wireless network, and local area network information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.bishopfox.com/news/2018/10/sv3c-l-series-hd-camera-multiple-vulnerabilities/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2367.
CVE ID: CVE-2017-2367 Date Updated: 2024-08-05T13:55:03.988Z Date Published: 2017-04-02T01:36:00 Description: An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1038137 - https://support.apple.com/HT207601 - http://www.securityfocus.com/bid/97130 - https://www.exploit-db.com/exploits/41801/ - https://security.gentoo.org/glsa/201706-15 - https://support.apple.com/HT207600 - https://support.apple.com/HT207617 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42139.
CVE ID: CVE-2021-42139 Date Updated: 2024-08-04T03:30:37.400Z Date Published: 2021-10-11T04:14:16 Description: Deno Standard Modules before 0.107.0 allows Code Injection via an untrusted YAML file in certain configurations. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/denoland/deno_std/releases/tag/0.107.0 - https://github.com/denoland/deno_std/pull/1275 - https://vuln.ryotak.me/advisories/58 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0761.
CVE ID: CVE-2019-0761 Date Updated: 2024-08-04T17:58:58.698Z Date Published: 2019-04-09T01:49:10 Description: A security feature bypass vulnerability exists when Internet Explorer fails to validate the correct Security Zone of requests for specific URLs, aka 'Internet Explorer Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0768. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0761 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28101.
CVE ID: CVE-2022-28101 Date Updated: 2024-08-03T05:48:36.562Z Date Published: 2022-04-28T13:55:08 Description: Turtlapp Turtle Note v0.7.2.6 does not filter the <meta> tag during markdown parsing, allowing attackers to execute HTML injection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cybercitadel.com/html-injection-turtl/ - https://github.com/turtl/tracker/issues/404 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-3794.
CVE ID: CVE-2017-3794 Date Updated: 2024-08-05T14:39:41.056Z Date Published: 2017-01-26T07:45:00 Description: A vulnerability in Cisco WebEx Meetings Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against an administrative user. More Information: CSCuz03317. Known Affected Releases: 2.6. Known Fixed Releases: 2.7.1.12. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/95635 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-wms - http://www.securitytracker.com/id/1037649 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8386.
CVE ID: CVE-2016-8386 Date Updated: 2024-08-06T02:20:31.075Z Date Published: 2017-02-27T21:00:00 Description: An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a PDF containing a malformed font to XML, the tool will attempt to use a size out of the font to search through a linked list of buffers to return. Due to a signedness issue, a buffer smaller than the requested size will be returned. Later when the tool tries to populate this buffer, the overflow will occur which can lead to code execution under the context of the user running the tool. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/96472 - http://www.talosintelligence.com/reports/TALOS-2016-0211/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5698.
CVE ID: CVE-2014-5698 Date Updated: 2024-08-06T11:55:48.647Z Date Published: 2014-09-09T10:00:00 Description: The Furdiburb (aka com.sheado.lite.pet) application 1.1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/493617 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25249.
CVE ID: CVE-2024-25249 Date Updated: 2024-08-16T17:40:51.809Z Date Published: 2024-02-21T00:00:00 Description: An issue in He3 App for macOS version 2.0.17, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/intbjw - https://www.electronjs.org/blog/statement-run-as-node-cves - https://github.com/intbjw/CVE-2024-25249 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-28027.
CVE ID: CVE-2021-28027 Date Updated: 2024-08-03T21:33:17.315Z Date Published: 2021-03-05T08:40:52 Description: An issue was discovered in the bam crate before 0.1.3 for Rust. There is an integer underflow and out-of-bounds write during the loading of a bgzip block. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://rustsec.org/advisories/RUSTSEC-2021-0027.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6675.
CVE ID: CVE-2017-6675 Date Updated: 2024-08-05T15:33:20.488Z Date Published: 2017-06-13T06:00:00 Description: A vulnerability in the web interface of Cisco Industrial Network Director could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against an affected system. More Information: CSCvd25405. Known Affected Releases: 1.1(0.176). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-ind - http://www.securityfocus.com/bid/98962 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5350.
CVE ID: CVE-2015-5350 Date Updated: 2024-09-16T17:38:47.368Z Date Published: 2018-03-19T13:00:00Z Description: In Garden versions 0.22.0-0.329.0, a vulnerability has been discovered in the garden-linux nstar executable that allows access to files on the host system. By staging an application on Cloud Foundry using Diego and Garden installations with a malicious custom buildpack an end user could read files on the host system that the BOSH-created vcap user has permissions to read and then package them into their app droplet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pivotal.io/security/cve-2015-5350 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47325.
CVE ID: CVE-2021-47325 Date Updated: 2024-08-04T05:32:08.511Z Date Published: 2024-05-21T14:35:38.498Z Description: In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation The reference counting issue happens in several exception handling paths of arm_smmu_iova_to_phys_hard(). When those error scenarios occur, the function forgets to decrease the refcount of "smmu" increased by arm_smmu_rpm_get(), causing a refcount leak. Fix this issue by jumping to "out" label when those error scenarios occur. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0 - https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb - https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492 - https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b - https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-45024.
CVE ID: CVE-2021-45024 Date Updated: 2024-08-04T04:32:13.587Z Date Published: 2022-06-17T11:57:47 Description: ASG technologies ( A Rocket Software Company) ASG-Zena Cross Platform Server Enterprise Edition 4.2.1 is vulnerable to XML External Entity (XXE). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://asg-zena.com - http://asg.com - https://docs.rocketsoftware.com/bundle/ven1649700711249/page/ayk1652945111726.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6633.
CVE ID: CVE-2024-6633 Date Updated: 2024-08-29T03:55:32.406Z Date Published: 2024-08-27T14:11:24.527Z Description: The default credentials for the setup HSQL database (HSQLDB) for FileCatalyst Workflow are published in a vendor knowledgebase article. Misuse of these credentials could lead to a compromise of confidentiality, integrity, or availability of the software. The HSQLDB is only included to facilitate installation, has been deprecated, and is not intended for production use per vendor guides. However, users who have not configured FileCatalyst Workflow to use an alternative database per recommendations are vulnerable to attack from any source that can reach the HSQLDB. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.fortra.com/security/advisories/product-security/fi-2024-011 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52465.
CVE ID: CVE-2023-52465 Date Updated: 2024-08-02T23:03:19.593Z Date Published: 2024-02-25T08:16:30.088Z Description: In the Linux kernel, the following vulnerability has been resolved: power: supply: Fix null pointer dereference in smb2_probe devm_kasprintf and devm_kzalloc return a pointer to dynamically allocated memory which can be NULL upon failure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/e2717302fbc20f148bcda362facee0444b949a3a - https://git.kernel.org/stable/c/bd3d2ec447ede9da822addf3960a5f4275e3ae76 - https://git.kernel.org/stable/c/88f04bc3e737155e13caddf0ba8ed19db87f0212 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38943.
CVE ID: CVE-2023-38943 Date Updated: 2024-08-02T17:54:39.654Z Date Published: 2023-08-05T00:00:00 Description: ShuiZe_0x727 v1.0 was discovered to contain a remote command execution (RCE) vulnerability via the component /iniFile/config.ini. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/0x727/ShuiZe_0x727 - https://github.com/0x727/ShuiZe_0x727/issues/160 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7117.
CVE ID: CVE-2017-7117 Date Updated: 2024-08-05T15:49:02.837Z Date Published: 2017-10-23T01:00:00 Description: An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT208141 - http://www.securitytracker.com/id/1039384 - https://www.exploit-db.com/exploits/42955/ - https://support.apple.com/HT208142 - https://support.apple.com/HT208113 - http://www.securityfocus.com/bid/101006 - https://support.apple.com/HT208112 - http://www.securitytracker.com/id/1039428 - https://support.apple.com/HT208116 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-26044.
CVE ID: CVE-2023-26044 Date Updated: 2024-08-02T11:39:06.566Z Date Published: 2023-05-17T17:24:25.855Z Description: react/http is an event-driven, streaming HTTP client and server implementation for ReactPHP. Previous versions of ReactPHP's HTTP server component contain a potential DoS vulnerability that can cause high CPU load when processing large HTTP request bodies. This vulnerability has little to no impact on the default configuration, but can be exploited when explicitly using the RequestBodyBufferMiddleware with very large settings. This might lead to consuming large amounts of CPU time for processing requests and significantly delay or slow down the processing of legitimate user requests. This issue has been addressed in release 1.9.0. Users are advised to upgrade. Users unable to upgrade may keep the request body limited using RequestBodyBufferMiddleware with a sensible value which should mitigate the issue. An infrastructure or DevOps workaround could be to place a reverse proxy in front of the ReactPHP HTTP server to filter out any excessive HTTP request bodies. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/reactphp/http/security/advisories/GHSA-95x4-j7vc-h8mf - https://github.com/reactphp/http/commit/9681f764b80c45ebfb5fe2ea7da5bd3babfcdcfd No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22502.
CVE ID: CVE-2021-22502 Date Updated: 2024-08-03T18:44:13.632Z Date Published: 2021-02-08T21:12:35 Description: Remote Code execution vulnerability in Micro Focus Operation Bridge Reporter (OBR) product, affecting version 10.40. The vulnerability could be exploited to allow Remote Code Execution on the OBR server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://softwaresupport.softwaregrp.com/doc/KM03775947 - https://www.zerodayinitiative.com/advisories/ZDI-21-153/ - https://www.zerodayinitiative.com/advisories/ZDI-21-154/ - http://packetstormsecurity.com/files/162408/Micro-Focus-Operations-Bridge-Reporter-Unauthenticated-Command-Injection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9980.
CVE ID: CVE-2014-9980 Date Updated: 2024-09-16T23:26:57.332Z Date Published: 2017-08-18T18:00:00Z Description: In all Qualcomm products with Android releases from CAF using the Linux kernel, a Sample App failed to check a length potentially leading to unauthorized access to secure memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-07-01 - http://www.securityfocus.com/bid/99467 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-5943.
CVE ID: CVE-2020-5943 Date Updated: 2024-08-04T08:47:40.910Z Date Published: 2020-11-05T19:23:05 Description: In versions 14.1.0-14.1.0.1 and 14.1.2.5-14.1.2.7, when a BIG-IP object is created or listed through the REST interface, the protected fields are obfuscated in the REST response, not protected via a SecureVault cryptogram as TMSH does. One example of protected fields is the GTM monitor password. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.f5.com/csp/article/K20059815 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4191.
CVE ID: CVE-2022-4191 Date Updated: 2024-08-03T01:34:49.886Z Date Published: 2022-11-29T00:00:00 Description: Use after free in Sign-In in Google Chrome prior to 108.0.5359.71 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via profile destruction. (Chromium security severity: Medium) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_29.html - https://crbug.com/1373941 - https://security.gentoo.org/glsa/202305-10 - https://security.gentoo.org/glsa/202311-11 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2725.
CVE ID: CVE-2019-2725 Date Updated: 2024-10-01T16:24:23.512Z Date Published: 2019-04-26T18:21:08 Description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/108074 - http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html - https://support.f5.com/csp/article/K90059138 - https://www.exploit-db.com/exploits/46780/ - http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html - http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - https://www.oracle.com/security-alerts/cpujan2020.html - https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3512.
CVE ID: CVE-2024-3512 Date Updated: 2024-04-25T12:57:58.911Z Date Published: 2024-04-09T18:58:36.805Z Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6594.
CVE ID: CVE-2013-6594 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-44186.
CVE ID: CVE-2024-44186 Date Updated: 2024-09-17T13:28:04.356Z Date Published: 2024-09-16T23:23:21.473Z Description: An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15. An app may be able to access protected user data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/121238 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11937.
CVE ID: CVE-2018-11937 Date Updated: 2024-08-05T08:24:03.308Z Date Published: 2019-05-24T16:35:54 Description: Lack of input validation before copying can lead to a buffer over read in WLAN function in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24, SM7150 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.codeaurora.org/security-bulletin/2019/04/01/april-2019-code-aurora-security-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1165.
CVE ID: CVE-2018-1165 Date Updated: 2024-08-05T03:51:48.985Z Date Published: 2018-02-21T14:00:00 Description: This vulnerability allows local attackers to escalate privileges on vulnerable installations of Joyent SmartOS release-20170803-20170803T064301Z. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the SMB_IOC_SVCENUM IOCTL. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the host OS. Was ZDI-CAN-4983. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://help.joyent.com/hc/en-us/articles/360000124928 - https://zerodayinitiative.com/advisories/ZDI-18-158 - https://www.oracle.com/security-alerts/cpuapr2020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33626.
CVE ID: CVE-2023-33626 Date Updated: 2024-08-02T15:47:06.626Z Date Published: 2023-06-12T00:00:00 Description: D-Link DIR-600 Hardware Version B5, Firmware Version 2.18 was discovered to contain a stack overflow via the gena.cgi binary. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dlink.com/en/security-bulletin/ - https://github.com/naihsin/IoT/tree/main/D-Link/DIR-600/overflow - https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/overflow/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-44021.
CVE ID: CVE-2021-44021 Date Updated: 2024-08-04T04:10:17.287Z Date Published: 2021-12-03T10:50:11 Description: An unnecessary privilege vulnerability in Trend Micro Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-44019 and 44020. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://success.trendmicro.com/solution/000289230 - https://www.zerodayinitiative.com/advisories/ZDI-21-1366/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-51075.
CVE ID: CVE-2023-51075 Date Updated: 2024-08-02T22:32:08.939Z Date Published: 2023-12-27T00:00:00 Description: hutool-core v5.8.23 was discovered to contain an infinite loop in the StrSplitter.splitByRegex function. This vulnerability allows attackers to cause a Denial of Service (DoS) via manipulation of the first two parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/dromara/hutool/issues/3421 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2018-0101
CVE-CVE-2018-0101 is a vulnerability in Cisco Adaptive Security Appliance. It is related to the MITRE ATT&CK technique T1190: Exploit Public-Facing Application. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2018 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2018-16438.
CVE ID: CVE-2018-16438 Date Updated: 2024-08-05T10:24:32.643Z Date Published: 2018-09-04T00:00:00 Description: An issue was discovered in the HDF HDF5 1.8.20 library. There is an out of bounds read in H5L_extern_query at H5Lexternal.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/TeamSeri0us/pocs/tree/master/hdf5/h5stat No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20659.
CVE ID: CVE-2023-20659 Date Updated: 2024-08-02T09:14:40.603Z Date Published: 2023-04-06T00:00:00 Description: In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588413. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/April-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38526.
CVE ID: CVE-2021-38526 Date Updated: 2024-08-04T01:44:23.517Z Date Published: 2021-08-11T00:01:17 Description: Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects RAX35 before 1.0.3.94, RAX38 before 1.0.3.94, and RAX40 before 1.0.3.94. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000063782/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0416 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-2230.
CVE ID: CVE-2021-2230 Date Updated: 2024-09-26T14:48:23.237Z Date Published: 2021-04-22T21:53:53 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2021.html - https://security.netapp.com/advisory/ntap-20210513-0002/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0116.
CVE ID: CVE-2014-0116 Date Updated: 2024-08-06T09:05:38.723Z Date Published: 2014-05-08T10:00:00 Description: CookieInterceptor in Apache Struts 2.x before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and modify session state via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0113. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/67218 - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm - http://struts.apache.org/release/2.3.x/docs/s2-022.html - http://secunia.com/advisories/59816 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33143.
CVE ID: CVE-2023-33143 Date Updated: 2024-08-02T15:39:35.240Z Date Published: 2023-06-03T00:36:57.825Z Description: Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33143 - https://security.gentoo.org/glsa/202402-05 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1126.
CVE ID: CVE-2015-1126 Date Updated: 2024-08-06T04:33:20.701Z Date Published: 2015-04-10T14:00:00 Description: WebKit, as used in Apple iOS before 8.3 and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, does not properly handle the userinfo field in FTP URLs, which allows remote attackers to trigger incorrect resource access via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT204658 - http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html - http://lists.apple.com/archives/security-announce/2015/Apr/msg00000.html - http://www.securitytracker.com/id/1032047 - https://support.apple.com/HT204661 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5321.
CVE ID: CVE-2008-5321 Date Updated: 2024-08-07T10:49:12.235Z Date Published: 2008-12-03T19:00:00 Description: SQL injection vulnerability in index.php in GesGaleri, a module for XOOPS, allows remote attackers to execute arbitrary SQL commands via the no parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/6778 - http://www.securityfocus.com/bid/31808 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45976 - http://securityreason.com/securityalert/4682 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1407.
CVE ID: CVE-2012-1407 Date Updated: 2024-09-16T22:20:38.574Z Date Published: 2012-03-07T11:00:00Z Description: Unspecified vulnerability in the GO Message Widget (com.gau.go.launcherex.gowidget.smswidget) application 1.9, 2.1, and 2.3 for Android has unknown impact and attack vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1407-vulnerability-in-GOMessageWidget.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6348.
CVE ID: CVE-2016-6348 Date Updated: 2024-08-06T01:29:19.534Z Date Published: 2017-04-12T22:00:00 Description: JacksonJsonpInterceptor in RESTEasy might allow remote attackers to conduct a cross-site script inclusion (XSSI) attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1372129 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15137.
CVE ID: CVE-2019-15137 Date Updated: 2024-08-05T00:34:53.278Z Date Published: 2019-08-18T15:44:12 Description: The Access Control plugin in eProsima Fast RTPS through 1.9.0 allows fnmatch pattern matches with topic name strings (instead of the permission expressions themselves), which can lead to unintended connections between participants in a Data Distribution Service (DDS) network. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://arxiv.org/abs/1908.05310 - https://github.com/eProsima/Fast-RTPS/issues/441 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0455.
CVE ID: CVE-2017-0455 Date Updated: 2024-08-05T13:03:57.210Z Date Published: 2017-03-08T01:00:00 Description: An information disclosure vulnerability in the Qualcomm bootloader could help to enable a local malicious application to to execute arbitrary code within the context of the bootloader. This issue is rated as High because it is a general bypass for a bootloader level defense in depth or exploit mitigation technology. Product: Android. Versions: Kernel-3.18. Android ID: A-32370952. References: QC-CR#1082755. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/96812 - https://source.android.com/security/bulletin/2017-03-01 - http://www.securitytracker.com/id/1037968 - https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=2c00928b4884fdb0b1661bcc530d7e68c9561a2f No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0700.
CVE ID: CVE-2019-0700 Date Updated: 2020-01-24T21:14:23 Date Published: 2020-01-24T21:14:23 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8017.
CVE ID: CVE-2018-8017 Date Updated: 2024-09-17T02:27:20.580Z Date Published: 2018-09-19T14:00:00Z Description: In Apache Tika 1.2 to 1.18, a carefully crafted file can trigger an infinite loop in the IptcAnpaParser. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread.html/72df7a3f0dda49a912143a1404b489837a11f374dfd1961061873a91%40%3Cdev.tika.apache.org%3E - http://www.securityfocus.com/bid/105513 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8711.
CVE ID: CVE-2018-8711 Date Updated: 2024-09-17T02:06:59.686Z Date Published: 2018-03-14T19:00:00Z Description: A local file inclusion issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The vulnerability is due to the lack of args/input validation on render_html before allowing it to be called by extract(), a PHP built-in function. Because of this, the supplied args/input can be used to overwrite the $pagepath variable, which then could lead to a local file inclusion attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/woocommerce-products-filter/#developers - https://sec-consult.com/en/blog/advisories/arbitrary-shortcode-execution-local-file-inclusion-in-woof-pluginus-net/index.html - https://www.woocommerce-filter.com/update-woocommerce-products-filter-v-2-2-0/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-2119.
CVE ID: CVE-2020-2119 Date Updated: 2024-08-04T07:01:41.123Z Date Published: 2020-02-12T14:35:44 Description: Jenkins Azure AD Plugin 1.1.2 and earlier transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1717 - http://www.openwall.com/lists/oss-security/2020/02/12/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1072.
CVE ID: CVE-2013-1072 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1833.
CVE ID: CVE-2020-1833 Date Updated: 2024-08-04T06:46:30.896Z Date Published: 2020-05-29T19:55:27 Description: Honor 9X smartphones with versions earlier than 9.1.1.172(C00E170R8P1) have an improper authentication vulnerability. A logic error occurs when handling clock function, an attacker should do a series of crafted operations quickly before the phone is unlocked, successful exploit could allow the attacker to access clock information without unlock the phone. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-05-smartphone-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-25844.
CVE ID: CVE-2020-25844 Date Updated: 2024-09-16T16:53:50.623Z Date Published: 2020-12-31T07:45:46.812952Z Description: The digest generation function of NHIServiSignAdapter has not been verified for parameter’s length, which leads to a stack overflow loophole. Remote attackers can use the leak to execute code without privilege. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.twcert.org.tw/tw/cp-132-4272-23ba4-1.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12372.
CVE ID: CVE-2019-12372 Date Updated: 2024-08-04T23:17:39.987Z Date Published: 2019-05-28T00:11:33 Description: Petraware pTransformer ADC before 2.1.7.22827 allows SQL Injection via the User ID parameter to the login form. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://faudhzanrahman.blogspot.com/2019/05/sql-injection-on-login-form.html - http://packetstormsecurity.com/files/153084/Petraware-pTransformer-ADC-SQL-Injection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4287.
CVE ID: CVE-2011-4287 Date Updated: 2024-08-07T00:01:51.543Z Date Published: 2012-07-16T10:00:00 Description: admin/uploaduser_form.php in Moodle 2.0.x before 2.0.3 does not force password changes for autosubscribed users, which makes it easier for remote attackers to obtain access by leveraging knowledge of the initial password of a new user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://openwall.com/lists/oss-security/2011/11/14/1 - http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=22a77963439e00441949440f0517135b3a5418da - http://moodle.org/mod/forum/discuss.php?d=175588 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46979.
CVE ID: CVE-2021-46979 Date Updated: 2024-08-04T05:24:38.457Z Date Published: 2024-02-28T08:13:09.736Z Description: In the Linux kernel, the following vulnerability has been resolved: iio: core: fix ioctl handlers removal Currently ioctl handlers are removed twice. For the first time during iio_device_unregister() then later on inside iio_device_unregister_eventset() and iio_buffers_free_sysfs_and_mask(). Double free leads to kernel panic. Fix this by not touching ioctl handlers list directly but rather letting code responsible for registration call the matching cleanup routine itself. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/11e1cae5da4096552f7c091476cbadbc0d1817da - https://git.kernel.org/stable/c/ab6c935ba3a04317632f3b8b68675bdbaf395303 - https://git.kernel.org/stable/c/901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0444.
CVE ID: CVE-2016-0444 Date Updated: 2024-08-05T22:22:54.274Z Date Published: 2016-01-21T02:00:00 Description: Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control 11.1.0.1, 11.2.0.4, 12.1.0.4, and 12.1.0.5 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Agent Next Gen, a different vulnerability than CVE-2016-0447 and CVE-2016-0449. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html - http://www.securitytracker.com/id/1034734 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-42405.
CVE ID: CVE-2023-42405 Date Updated: 2024-09-25T18:23:07.872Z Date Published: 2023-09-14T00:00:00 Description: SQL injection vulnerability in FIT2CLOUD RackShift v1.7.1 allows attackers to execute arbitrary code via the `sort` parameter to taskService.list(), bareMetalService.list(), and switchService.list(). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/fit2cloud/rackshift/issues/79 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.