instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2021-44299.
CVE ID: CVE-2021-44299 Date Updated: 2024-08-04T04:17:24.847Z Date Published: 2022-01-19T17:45:43 Description: A reflected cross-site scripting (XSS) vulnerability in \lib\packages\themes\themes.php of Navigate CMS v2.9.4 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/NavigateCMS/Navigate-CMS/issues/29 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0940.
CVE ID: CVE-2008-0940 Date Updated: 2024-09-16T22:14:36.185Z Date Published: 2008-02-25T20:00:00Z Description: Cross-site scripting (XSS) vulnerability in Plain Black WebGUI before 7.4.24 allows remote attackers to inject arbitrary web script or HTML when creating a username, a different vulnerability than CVE-2007-0407. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/28967 - http://www.securityfocus.com/bid/27869 - http://www.plainblack.com/getwebgui/advisories/webgui-7_4_24-stable-released No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14104.
CVE ID: CVE-2019-14104 Date Updated: 2024-08-05T00:12:42.484Z Date Published: 2020-04-16T10:46:14 Description: Slab-out-of-bounds access can occur if the context pointer is invalid due to lack of null check on pointer before accessing it in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile in APQ8053, SC8180X, SDX55, SM8150 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9962.
CVE ID: CVE-2014-9962 Date Updated: 2024-08-06T14:02:37.534Z Date Published: 2017-06-13T20:00:00 Description: In all Android releases from CAF using the Linux kernel, a vulnerability exists in the parsing of a DRM provisioning command. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-06-01 - http://www.securityfocus.com/bid/98874 - http://www.securitytracker.com/id/1038623 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2179.
CVE ID: CVE-2011-2179 Date Updated: 2024-08-06T22:53:17.162Z Date Published: 2011-06-14T17:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in (1) Nagios 3.2.3 and (2) Icinga before 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the expand parameter, as demonstrated by an (a) command action or a (b) hosts action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/67797 - http://securityreason.com/securityalert/8274 - http://www.securityfocus.com/bid/48087 - https://bugzilla.redhat.com/show_bug.cgi?id=709871 - http://tracker.nagios.org/view.php?id=224 - http://www.openwall.com/lists/oss-security/2011/06/01/10 - http://www.rul3z.de/advisories/SSCHADV2011-006.txt - http://www.openwall.com/lists/oss-security/2011/06/02/6 - https://dev.icinga.org/issues/1605 - http://secunia.com/advisories/44974 - http://www.rul3z.de/advisories/SSCHADV2011-005.txt - http://www.ubuntu.com/usn/USN-1151-1 - http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36270.
CVE ID: CVE-2022-36270 Date Updated: 2024-08-03T10:00:04.335Z Date Published: 2022-08-10T16:32:26 Description: Clinic's Patient Management System v1.0 has arbitrary code execution via url: ip/pms/users.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/FF9118/bug_report/blob/main/vendors/oretnom23/clinics-patient-management-system/RCE-1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46372.
CVE ID: CVE-2021-46372 Date Updated: 2024-08-04T05:02:11.532Z Date Published: 2022-02-18T12:40:26 Description: Scoold 1.47.2 is a Q&A/knowledge base platform written in Java. When writing a Q&A, the markdown editor is vulnerable to a XSS attack when using uppercase letters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.huntr.dev/bounties/eb681144-04f2-4eaa-98b6-c8cffbcb1601/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0919.
CVE ID: CVE-2017-0919 Date Updated: 2024-09-17T02:27:55.985Z Date Published: 2018-07-03T21:00:00Z Description: GitLab Community and Enterprise Editions before 10.1.6, 10.2.6, and 10.3.4 are vulnerable to an authorization bypass issue in the GitLab import component resulting in an attacker being able to perform operations under a group in which they were previously unauthorized. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/301137 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-24474.
CVE ID: CVE-2020-24474 Date Updated: 2024-08-04T15:12:09.228Z Date Published: 2021-06-09T19:01:40 Description: Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-35991.
CVE ID: CVE-2024-35991 Date Updated: 2024-08-02T03:30:12.585Z Date Published: 2024-05-20T09:47:56.401Z Description: In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Convert spinlock to mutex to lock evl workqueue drain_workqueue() cannot be called safely in a spinlocked context due to possible task rescheduling. In the multi-task scenario, calling queue_work() while drain_workqueue() will lead to a Call Trace as pushing a work on a draining workqueue is not permitted in spinlocked context. Call Trace: <TASK> ? __warn+0x7d/0x140 ? __queue_work+0x2b2/0x440 ? report_bug+0x1f8/0x200 ? handle_bug+0x3c/0x70 ? exc_invalid_op+0x18/0x70 ? asm_exc_invalid_op+0x1a/0x20 ? __queue_work+0x2b2/0x440 queue_work_on+0x28/0x30 idxd_misc_thread+0x303/0x5a0 [idxd] ? __schedule+0x369/0xb40 ? __pfx_irq_thread_fn+0x10/0x10 ? irq_thread+0xbc/0x1b0 irq_thread_fn+0x21/0x70 irq_thread+0x102/0x1b0 ? preempt_count_add+0x74/0xa0 ? __pfx_irq_thread_dtor+0x10/0x10 ? __pfx_irq_thread+0x10/0x10 kthread+0x103/0x140 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x31/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30 </TASK> The current implementation uses a spinlock to protect event log workqueue and will lead to the Call Trace due to potential task rescheduling. To address the locking issue, convert the spinlock to mutex, allowing the drain_workqueue() to be called in a safe mutex-locked context. This change ensures proper synchronization when accessing the event log workqueue, preventing potential Call Trace and improving the overall robustness of the code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/758071a35d9f3ffd84ff12169d081412a2f5f098 - https://git.kernel.org/stable/c/c9b732a9f73eadc638abdcf0a6d39bc7a0c1af5f - https://git.kernel.org/stable/c/d5638de827cff0fce77007e426ec0ffdedf68a44 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23347.
CVE ID: CVE-2023-23347 Date Updated: 2024-08-02T10:28:40.795Z Date Published: 2023-08-09T19:01:57.062Z Description: HCL DRYiCE iAutomate is affected by the use of a broken cryptographic algorithm. An attacker can potentially compromise the confidentiality and integrity of sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0106674 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40208.
CVE ID: CVE-2023-40208 Date Updated: 2024-09-24T18:51:23.602Z Date Published: 2023-09-04T10:40:09.268Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Aleksandar Urošević Stock Ticker plugin <= 3.23.3 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/stock-ticker/wordpress-stock-ticker-plugin-3-23-3-unauth-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2580.
CVE ID: CVE-2022-2580 Date Updated: 2024-08-03T00:39:08.108Z Date Published: 2022-08-01T14:12:38 Description: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/c5f2f1d4-0441-4881-b19c-055acaa16249 - https://github.com/vim/vim/commit/1e56bda9048a9625bce6e660938c834c5c15b07d No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6421.
CVE ID: CVE-2016-6421 Date Updated: 2024-08-06T01:29:20.026Z Date Published: 2016-10-05T20:00:00 Description: Cisco IOS XR 5.2.2 allows remote attackers to cause a denial of service (process restart) via a crafted OSPF Link State Advertisement (LSA) update, aka Bug ID CSCvb05643. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-ospf - http://www.securityfocus.com/bid/93212 - http://www.securitytracker.com/id/1036909 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23399.
CVE ID: CVE-2023-23399 Date Updated: 2024-08-02T10:28:40.886Z Date Published: 2023-03-14T16:55:29.157Z Description: Microsoft Excel Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23399 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6319.
CVE ID: CVE-2018-6319 Date Updated: 2024-08-05T06:01:48.544Z Date Published: 2018-02-02T21:00:00 Description: In Sophos Tester Tool 3.2.0.7 Beta, the driver accepts a special DeviceIoControl code that doesn't check its argument. This argument is a memory address: if a caller passes a NULL pointer or a random invalid address, the driver will cause a Blue Screen of Death. If a program or malware does this at boot time, it can cause a persistent denial of service on the machine. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://29wspy.ru/exploits/CVE-2018-6319.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14347.
CVE ID: CVE-2018-14347 Date Updated: 2024-08-05T09:21:41.680Z Date Published: 2018-07-17T15:00:00 Description: GNU Libextractor before 1.7 contains an infinite loop vulnerability in EXTRACTOR_mpeg_extract_method (mpeg_extractor.c). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.debian.org/security/2018/dsa-4290 - https://gnunet.org/bugs/view.php?id=5399 - https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html - https://gnunet.org/git/libextractor.git/commit/?id=f033468cd36e2b8bf92d747fbd683b2ace8da394 - http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00000.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2946.
CVE ID: CVE-2022-2946 Date Updated: 2024-08-03T00:53:00.389Z Date Published: 2022-08-23T00:00:00 Description: Use After Free in GitHub repository vim/vim prior to 9.0.0246. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5 - https://github.com/vim/vim/commit/adce965162dd89bf29ee0e5baf53652e7515762c - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/ - https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html - https://security.gentoo.org/glsa/202305-16 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13039.
CVE ID: CVE-2018-13039 Date Updated: 2024-08-05T08:52:49.767Z Date Published: 2018-07-01T18:00:00 Description: OpenSID 18.06-pasca has reflected Cross Site Scripting (XSS) via the cari parameter, aka an index.php/first?cari= URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/OpenSID/OpenSID/issues/1175 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4618.
CVE ID: CVE-2011-4618 Date Updated: 2024-08-07T00:09:19.399Z Date Published: 2013-01-24T01:00:00 Description: Cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://plugins.trac.wordpress.org/changeset?reponame=&new=466102%40advanced-text-widget&old=465828%40advanced-text-widget - https://exchange.xforce.ibmcloud.com/vulnerabilities/71412 - http://www.openwall.com/lists/oss-security/2011/12/19/6 - http://archives.neohapsis.com/archives/bugtraq/2012-04/0119.html - http://www.securityfocus.com/bid/50744 - http://www.securityfocus.com/archive/1/520589 - http://wordpress.org/extend/plugins/advanced-text-widget/changelog/ - http://wordpress.org/support/topic/wordpress-advanced-text-widget-plugin-cross-site-scripting-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12874.
CVE ID: CVE-2020-12874 Date Updated: 2024-08-04T12:11:19.001Z Date Published: 2020-05-14T19:07:18 Description: Veritas APTARE versions prior to 10.4 included code that bypassed the normal login process when specific authentication credentials were provided to the server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.veritas.com/content/support/en_US/security/VTS20-003 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21321.
CVE ID: CVE-2023-21321 Date Updated: 2024-09-06T20:15:58.839Z Date Published: 2023-10-30T16:56:31.437Z Description: In Package Manager, there is a possible cross-user settings disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/docs/security/bulletin/android-14 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1062.
CVE ID: CVE-2019-1062 Date Updated: 2024-08-04T18:06:31.391Z Date Published: 2019-07-15T18:56:20 Description: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1092, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1062 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-37638.
CVE ID: CVE-2021-37638 Date Updated: 2024-08-04T01:23:01.371Z Date Published: 2021-08-12T18:10:10 Description: TensorFlow is an end-to-end open source platform for machine learning. Sending invalid argument for `row_partition_types` of `tf.raw_ops.RaggedTensorToTensor` API results in a null pointer dereference and undefined behavior. The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L328) accesses the first element of a user supplied list of values without validating that the provided list is not empty. We have patched the issue in GitHub commit 301ae88b331d37a2a16159b65b255f4f9eb39314. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hwr7-8gxx-fj5p - https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21248.
CVE ID: CVE-2021-21248 Date Updated: 2024-08-03T18:09:15.318Z Date Published: 2021-01-15T20:10:30 Description: OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability involving the build endpoint parameters. InputSpec is used to define parameters of a Build spec. It does so by using dynamically generated Groovy classes. A user able to control job parameters can run arbitrary code on OneDev's server by injecting arbitrary Groovy code. The ultimate result is in the injection of a static constructor that will run arbitrary code. For a full example refer to the referenced GHSA. This issue was addressed in 4.0.3 by escaping special characters such as quote from user input. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/theonedev/onedev/security/advisories/GHSA-gwp4-5498-hv5f - https://github.com/theonedev/onedev/commit/39d95ab8122c5d9ed18e69dc024870cae08d2d60 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26384.
CVE ID: CVE-2021-26384 Date Updated: 2024-09-16T23:15:36.383Z Date Published: 2022-07-14T19:28:56.918810Z Description: A malformed SMI (System Management Interface) command may allow an attacker to establish a corrupted SMI Trigger Info data structure, potentially leading to out-of-bounds memory reads and writes when triggering an SMI resulting in a potential loss of resources. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4532.
CVE ID: CVE-2011-4532 Date Updated: 2024-09-17T02:11:52.067Z Date Published: 2012-01-08T20:00:00Z Description: Absolute path traversal vulnerability in the ALMListView.ALMListCtrl ActiveX control in almaxcx.dll in the graphical user interface in Siemens Automation License Manager (ALM) 2.0 through 5.1+SP1+Upd2 allows remote attackers to overwrite arbitrary files via the Save method. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.automation.siemens.com/WW/view/en/114358 - http://aluigi.altervista.org/adv/almsrvx_1-adv.txt - http://support.automation.siemens.com/WW/llisapi.dll/57252401?func=ll&objId=57252401&objAction=csView&nodeid0=17323948&lang=en&siteid=cseus&aktprim=0&extranet=standard&viewreg=WW&load=content - http://www.us-cert.gov/control_systems/pdf/ICSA-11-361-01.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1212
The MITRE ATT&CK technique T1212: Exploitation for Credential Access is related to the vulnerability CVE-CVE-2016-6415. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2008-4692.
CVE ID: CVE-2008-4692 Date Updated: 2024-08-07T10:24:20.983Z Date Published: 2008-10-22T17:00:00 Description: The Native Managed Provider for .NET component in IBM DB2 8 before FP17, 9.1 before FP6, and 9.5 before FP2, when a definer cannot maintain objects, preserves views and triggers without marking them inoperative or dropping them, which has unknown impact and attack vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/46021 - ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT - http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22306 - http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22307 - http://secunia.com/advisories/31787 - http://www-01.ibm.com/support/docview.wss?uid=swg1IZ22287 - http://www.vupen.com/english/advisories/2008/2893 - http://www-01.ibm.com/support/docview.wss?uid=swg27013892 - http://secunia.com/advisories/32368 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1155.
CVE ID: CVE-2010-1155 Date Updated: 2024-08-07T01:14:06.324Z Date Published: 2010-04-16T19:00:00 Description: Irssi before 0.8.15, when SSL is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) field or a Subject Alternative Name field of the X.509 certificate, which allows man-in-the-middle attackers to spoof IRC servers via an arbitrary certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://marc.info/?l=oss-security&m=127110132019166&w=2 - http://marc.info/?l=oss-security&m=127116251220784&w=2 - http://www.vupen.com/english/advisories/2010/0856 - http://www.vupen.com/english/advisories/2010/1110 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57790 - http://www.vupen.com/english/advisories/2010/1107 - http://www.vupen.com/english/advisories/2010/0987 - http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html - http://marc.info/?l=oss-security&m=127119240204394&w=2 - http://secunia.com/advisories/39620 - http://secunia.com/advisories/39365 - http://www.ubuntu.com/usn/USN-929-1 - http://irssi.org/news - http://marc.info/?l=oss-security&m=127098845125270&w=2 - http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.497301 - http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041054.html - http://github.com/ensc/irssi-proxy/commit/85bbc05b21678e80423815d2ef1dfe26208491ab - http://irssi.org/news/ChangeLog - http://secunia.com/advisories/39797 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-40806.
CVE ID: CVE-2024-40806 Date Updated: 2024-08-02T04:39:54.736Z Date Published: 2024-07-29T22:16:31.042Z Description: An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing a maliciously crafted file may lead to unexpected app termination. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT214117 - https://support.apple.com/en-us/HT214116 - https://support.apple.com/en-us/HT214120 - https://support.apple.com/en-us/HT214124 - https://support.apple.com/en-us/HT214119 - https://support.apple.com/en-us/HT214123 - https://support.apple.com/en-us/HT214122 - https://support.apple.com/en-us/HT214118 - http://seclists.org/fulldisclosure/2024/Jul/16 - http://seclists.org/fulldisclosure/2024/Jul/23 - http://seclists.org/fulldisclosure/2024/Jul/21 - http://seclists.org/fulldisclosure/2024/Jul/20 - http://seclists.org/fulldisclosure/2024/Jul/17 - http://seclists.org/fulldisclosure/2024/Jul/22 - http://seclists.org/fulldisclosure/2024/Jul/18 - http://seclists.org/fulldisclosure/2024/Jul/19 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0288.
CVE ID: CVE-2014-0288 Date Updated: 2024-08-06T09:13:09.786Z Date Published: 2014-02-12T02:00:00 Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0270, CVE-2014-0273, and CVE-2014-0274. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-010 - http://www.securitytracker.com/id/1029741 - http://secunia.com/advisories/56796 - http://www.securityfocus.com/bid/65388 - http://osvdb.org/103186 - https://exchange.xforce.ibmcloud.com/vulnerabilities/90778 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18297.
CVE ID: CVE-2019-18297 Date Updated: 2024-08-05T01:47:14.109Z Date Published: 2019-12-12T19:08:47 Description: A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and low privileges could gain root privileges by sending specifically crafted packets to a named pipe. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf - http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41270.
CVE ID: CVE-2021-41270 Date Updated: 2024-08-04T03:08:31.658Z Date Published: 2021-11-24T19:05:11 Description: Symfony/Serializer handles serializing and deserializing data structures for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Symfony versions 4.1.0 before 4.4.35 and versions 5.0.0 before 5.3.12 are vulnerable to CSV injection, also known as formula injection. In Symfony 4.1, maintainers added the opt-in `csv_escape_formulas` option in the `CsvEncoder`, to prefix all cells starting with `=`, `+`, `-` or `@` with a tab `\t`. Since then, OWASP added 2 chars in that list: Tab (0x09) and Carriage return (0x0D). This makes the previous prefix char (Tab `\t`) part of the vulnerable characters, and OWASP suggests using the single quote `'` for prefixing the value. Starting with versions 4.4.34 and 5.3.12, Symfony now follows the OWASP recommendations and uses the single quote `'` to prefix formulas and add the prefix to cells starting by `\t`, `\r` as well as `=`, `+`, `-` and `@`. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/symfony/symfony/pull/44243 - https://github.com/symfony/symfony/releases/tag/v5.3.12 - https://github.com/symfony/symfony/security/advisories/GHSA-2xhg-w2g5-w95x - https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QSREFD2TJT5LWKM6S4MD3W26NQQ5WJUP/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BPT4SF6SIXFMZARDWED5T32J7JEH3EP/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6104.
CVE ID: CVE-2018-6104 Date Updated: 2024-08-05T05:54:53.096Z Date Published: 2018-12-04T17:00:00 Description: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html - https://security.gentoo.org/glsa/201804-22 - https://crbug.com/820068 - https://www.debian.org/security/2018/dsa-4182 - http://www.securityfocus.com/bid/103917 - https://access.redhat.com/errata/RHSA-2018:1195 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41336.
CVE ID: CVE-2021-41336 Date Updated: 2024-08-04T03:08:32.159Z Date Published: 2021-10-13T00:27:51 Description: Windows Kernel Information Disclosure Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41336 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4427.
CVE ID: CVE-2019-4427 Date Updated: 2024-09-16T17:39:13.204Z Date Published: 2020-02-12T16:10:17.298812Z Description: IBM Cloud CLI 0.6.0 through 0.16.1 windows installers are signed using SHA1 certificate. An attacker might be able to exploit the weak algorithm to generate a installer with malicious software inside. IBM X-Force ID: 162773. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/1356087 - https://exchange.xforce.ibmcloud.com/vulnerabilities/162773 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8808.
CVE ID: CVE-2019-8808 Date Updated: 2024-08-04T21:31:37.255Z Date Published: 2019-12-18T17:33:24 Description: Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT210724 - https://support.apple.com/HT210721 - https://support.apple.com/HT210726 - https://support.apple.com/HT210723 - https://support.apple.com/HT210725 - https://security.gentoo.org/glsa/202003-22 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16757.
CVE ID: CVE-2020-16757 Date Updated: 2021-12-20T22:51:09 Date Published: 2021-12-20T22:51:09 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1920.
CVE ID: CVE-2013-1920 Date Updated: 2024-08-06T15:20:37.149Z Date Published: 2013-04-12T22:00:00 Description: Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html - http://secunia.com/advisories/55082 - http://security.gentoo.org/glsa/glsa-201309-24.xml - http://lists.xen.org/archives/html/xen-announce/2013-04/msg00000.html - http://osvdb.org/92050 - https://exchange.xforce.ibmcloud.com/vulnerabilities/83226 - http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html - http://secunia.com/advisories/52857 - http://www.securityfocus.com/bid/58880 - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html - http://www.securitytracker.com/id/1028388 - http://www.openwall.com/lists/oss-security/2013/04/04/7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5193.
CVE ID: CVE-2012-5193 Date Updated: 2024-08-06T20:58:03.165Z Date Published: 2019-11-13T20:31:51 Description: Multiple cross-site scripting (XSS) vulnerabilities in Bitweaver 2.8.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the path info to (1) stats/index.php or (2) newsletters/edition.php or the (3) username parameter to users/remind_password.php, (4) days parameter to stats/index.php, (5) login parameter to users/register.php, or (6) highlight parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/twsl2012-016-multiple-vulnerabilities-in-bitweaver/ - https://www.exploit-db.com/exploits/22216 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32782.
CVE ID: CVE-2023-32782 Date Updated: 2024-08-02T15:25:37.024Z Date Published: 2023-08-09T00:00:00 Description: A command injection was identified in PRTG 23.2.84.1566 and earlier versions in the Dicom C-ECHO sensor where an authenticated user with write permissions could abuse the debug option to write new files that could potentially get executed by the EXE/Script sensor. The severity of this vulnerability is high and received a score of 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.paessler.com/prtg/history/stable - https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6543.
CVE ID: CVE-2014-6543 Date Updated: 2024-08-06T12:17:24.361Z Date Published: 2014-10-15T22:03:00 Description: Unspecified vulnerability in the Agile PLM component in Oracle Supply Chain Products Suite 9.3.3 allows remote authenticated users to affect confidentiality and integrity via vectors related to ITEM (Item & BOM). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1031043 - http://www.securityfocus.com/bid/70545 - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html - http://secunia.com/advisories/61724 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31873.
CVE ID: CVE-2021-31873 Date Updated: 2024-08-03T23:10:30.261Z Date Published: 2021-04-30T00:00:00 Description: An issue was discovered in klibc before 2.0.9. Additions in the malloc() function may result in an integer overflow and a subsequent heap buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kernel.org/pub/linux/libs/klibc/2.0/ - https://lists.zytor.com/archives/klibc/2021-April/004593.html - https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=a31ae8c508fc8d1bca4f57e9f9f88127572d5202 - http://www.openwall.com/lists/oss-security/2021/04/30/1 - https://lists.debian.org/debian-lts-announce/2021/06/msg00025.html - https://github.com/huolinjue/klibc/commit/a31ae8c508fc8d1bca4f57e9f9f88127572d5202 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39432.
CVE ID: CVE-2024-39432 Date Updated: 2024-09-27T15:40:31.593Z Date Published: 2024-09-27T07:37:41.899Z Description: In UMTS RLC driver, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with System execution privileges needed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.unisoc.com/en_us/secy/announcementDetail/1830802995705610241 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18996.
CVE ID: CVE-2019-18996 Date Updated: 2024-08-05T02:02:39.897Z Date Published: 2019-12-18T20:24:44 Description: Path settings in HMIStudio component of ABB PB610 Panel Builder 600 versions 2.8.0.424 and earlier accept DLLs outside of the program directory, potentially allowing an attacker with access to the local file system the execution of code in the application’s context. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://search.abb.com/library/Download.aspx?DocumentID=3ADR010466&LanguageCode=en&DocumentPartId=&Action=Launch No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16665.
CVE ID: CVE-2017-16665 Date Updated: 2024-09-17T00:26:54.973Z Date Published: 2017-11-08T17:00:00Z Description: RemObjects Remoting SDK 9 1.0.0.0 for Delphi is vulnerable to a reflected Cross Site Scripting (XSS) attack via the service parameter to the /soap URI, triggering an invalid attempt to generate WSDL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talk.remobjects.com/t/reflected-cross-site-scripting-xss-vulnerability/14662 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14295.
CVE ID: CVE-2019-14295 Date Updated: 2024-08-05T00:12:43.398Z Date Published: 2019-07-27T18:40:33 Description: An Integer overflow in the getElfSections function in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an allocation of excessive memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/upx/upx/issues/286 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MOCJ43HTM45GZCAQ2FLEBDNBM76V22RG/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T52JATXV6NTPTMGXCRGT37H6KXERYNZN/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36927.
CVE ID: CVE-2022-36927 Date Updated: 2024-08-03T10:14:29.437Z Date Published: 2023-01-09T00:00:00 Description: Zoom Rooms for macOS clients before version 5.11.3 contain a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability to escalate their privileges to root. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://explore.zoom.us/en/trust/security/security-bulletin/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39348.
CVE ID: CVE-2024-39348 Date Updated: 2024-08-02T04:26:14.241Z Date Published: 2024-06-28T06:30:57.973Z Description: Download of code without integrity check vulnerability in AirPrint functionality in Synology Router Manager (SRM) before 1.2.5-8227-11 and 1.3.1-9346-8 allows man-in-the-middle attackers to execute arbitrary code via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.synology.com/en-global/security/advisory/Synology_SA_23_16 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-44163.
CVE ID: CVE-2024-44163 Date Updated: 2024-09-17T14:04:22.011Z Date Published: 2024-09-16T23:23:06.694Z Description: The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. A malicious application may be able to access private information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/121234 - https://support.apple.com/en-us/121238 - https://support.apple.com/en-us/121247 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0164.
CVE ID: CVE-2015-0164 Date Updated: 2017-09-15T14:57:01 Date Published: 2017-09-15T15:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9823.
CVE ID: CVE-2014-9823 Date Updated: 2024-08-06T13:55:04.454Z Date Published: 2017-03-30T15:00:00 Description: Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9819. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1343479 - https://anonscm.debian.org/cgit/collab-maint/imagemagick.git/commit/?h=debian-patches/6.8.9.9-4-for-upstream&id=09561d37839dbfa04e017eea14811312985095d8 - http://www.openwall.com/lists/oss-security/2016/06/02/13 - http://www.openwall.com/lists/oss-security/2014/12/24/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-30112.
CVE ID: CVE-2024-30112 Date Updated: 2024-08-02T01:25:02.998Z Date Published: 2024-06-25T21:28:23.078Z Description: HCL Connections is vulnerable to a cross-site scripting attack where an attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user which leads to executing malicious script code. This may let the attacker steal cookie-based authentication credentials and comprise user's account then launch other attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0114148 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6752.
CVE ID: CVE-2019-6752 Date Updated: 2024-08-04T20:31:04.216Z Date Published: 2019-06-03T18:15:01 Description: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit PhantomPDF 9.3.10826. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7620. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.foxitsoftware.com/support/security-bulletins.php - https://www.zerodayinitiative.com/advisories/ZDI-19-426/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-30034.
CVE ID: CVE-2024-30034 Date Updated: 2024-08-02T01:25:00.644Z Date Published: 2024-05-14T16:57:24.224Z Description: Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30034 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0067.
CVE ID: CVE-2016-0067 Date Updated: 2024-08-05T22:08:13.227Z Date Published: 2016-02-10T11:00:00 Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0060, CVE-2016-0061, CVE-2016-0063, and CVE-2016-0072. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1034971 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-009 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-23240.
CVE ID: CVE-2021-23240 Date Updated: 2024-08-03T19:05:54.546Z Date Published: 2021-01-12T08:17:44 Description: selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2021-23240 - https://www.sudo.ws/stable.html#1.9.5 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE42Y35SMJOLONAIBNYNFC7J44UUZ2Y6/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMY4VSSBIND7VAYSN6T7XIWJRWG4GBB3/ - https://security.gentoo.org/glsa/202101-33 - https://security.netapp.com/advisory/ntap-20210129-0010/ - https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E - https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6374.
CVE ID: CVE-2016-6374 Date Updated: 2024-08-06T01:29:19.558Z Date Published: 2016-09-22T22:00:00 Description: Cisco Cloud Services Platform (CSP) 2100 2.0 allows remote attackers to execute arbitrary code via a crafted dnslookup command in an HTTP request, aka Bug ID CSCuz89093. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/93095 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-csp2100-2 - http://www.securitytracker.com/id/1036864 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5526.
CVE ID: CVE-2014-5526 Date Updated: 2024-08-06T11:48:49.559Z Date Published: 2014-09-09T01:00:00 Description: The Inmobi library for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/571145 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39137.
CVE ID: CVE-2023-39137 Date Updated: 2024-10-01T20:18:40.264Z Date Published: 2023-08-30T00:00:00 Description: An issue in Archive v3.3.7 allows attackers to spoof zip filenames which can lead to inconsistent filename parsing. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/brendan-duncan/archive/issues/266 - https://www.rapid7.com/db/modules/exploit/windows/fileformat/winrar_name_spoofing/ - https://blog.ostorlab.co/zip-packages-exploitation.html - https://ostorlab.co/vulndb/advisory/OVE-2023-3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-13132.
CVE ID: CVE-2017-13132 Date Updated: 2024-08-05T18:58:12.522Z Date Published: 2017-08-23T03:00:00 Description: In ImageMagick 7.0.6-8, the WritePDFImage function in coders/pdf.c operates on an incorrect data structure in the "dump uncompressed PseudoColor packets" step, which allows attackers to cause a denial of service (assertion failure in WriteBlobStream in MagickCore/blob.c) via a crafted file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ImageMagick/ImageMagick/issues/674 - https://security.gentoo.org/glsa/201711-07 - http://www.securityfocus.com/bid/100458 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12199.
CVE ID: CVE-2018-12199 Date Updated: 2024-09-16T23:51:24.944Z Date Published: 2019-03-14T20:00:00Z Description: Buffer overflow in an OS component in Intel CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 and Intel TXE version before 3.1.60 or 4.0.10 may allow a privileged user to potentially execute arbitrary code via physical access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html - https://security.netapp.com/advisory/ntap-20190318-0001/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-5031.
CVE ID: CVE-2010-5031 Date Updated: 2024-08-07T04:09:38.983Z Date Published: 2011-11-02T21:00:00 Description: Cross-site scripting (XSS) vulnerability in index.php in fileNice 1.1 allows remote attackers to inject arbitrary web script or HTML via the sstring parameter (aka the Search Box). NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/40624 - http://secunia.com/advisories/40077 - http://packetstormsecurity.org/1006-exploits/filenicescript-xss.txt - http://securityreason.com/securityalert/8519 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27298.
CVE ID: CVE-2023-27298 Date Updated: 2024-08-02T12:09:42.961Z Date Published: 2023-05-10T13:17:26.434Z Description: Uncontrolled search path in the WULT software maintained by Intel(R) before version 1.0.0 (commit id 592300b) may allow an unauthenticated user to potentially enable escalation of privilege via network access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00853.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-8770.
CVE ID: CVE-2024-8770 Date Updated: 2024-09-23T20:37:07.272Z Date Published: 2024-09-23T20:09:01.746Z Description: A Cross-Site Scripting (XSS) vulnerability was identified in the repository transfer feature of GitHub Enterprise Server, which allows attackers to steal sensitive user information via social engineering. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in version 3.10.17, 3.11.15, 3.12.9, 3.13.4, and 3.14.1. This vulnerability was reported via the GitHub Bug Bounty program. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.1 - https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.4 - https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.9 - https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.15 - https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.17 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38497.
CVE ID: CVE-2021-38497 Date Updated: 2024-08-04T01:44:22.835Z Date Published: 2021-11-03T00:03:22 Description: Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2021-47/ - https://www.mozilla.org/security/advisories/mfsa2021-45/ - https://www.mozilla.org/security/advisories/mfsa2021-43/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1726621 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-36591.
CVE ID: CVE-2023-36591 Date Updated: 2024-08-02T16:52:53.510Z Date Published: 2023-10-10T17:07:49.634Z Description: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36591 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6881.
CVE ID: CVE-2023-6881 Date Updated: 2024-08-02T08:42:08.232Z Date Published: 2024-02-20T18:25:19.453Z Description: Possible buffer overflow in is_mount_point No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-mh67-4h3q-p437 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8092.
CVE ID: CVE-2014-8092 Date Updated: 2024-08-06T13:10:50.212Z Date Published: 2014-12-10T15:00:00 Description: Multiple integer overflows in X.Org X Window System (aka X11 or X) X11R1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) ProcPutImage, (2) GetHosts, (3) RegionSizeof, or (4) REQUEST_FIXED_SIZE function, which triggers an out-of-bounds read or write. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2014/dsa-3095 - http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/ - http://www.securityfocus.com/bid/71595 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html - http://advisories.mageia.org/MGASA-2014-0532.html - https://security.gentoo.org/glsa/201504-06 - http://secunia.com/advisories/62292 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:119 - http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html - http://secunia.com/advisories/61947 - http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0625.
CVE ID: CVE-2008-0625 Date Updated: 2024-08-07T07:54:22.776Z Date Published: 2008-02-06T20:00:00 Description: Buffer overflow in the MediaGrid ActiveX control (mediagrid.dll) in Yahoo! Music Jukebox 2.2.2.56 allows remote attackers to execute arbitrary code via a long argument to the AddBitmap method. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/340860 - http://www.securityfocus.com/bid/27578 - https://www.exploit-db.com/exploits/5052 - http://secunia.com/advisories/28757 - http://www.securitytracker.com/id?1019298 - http://www.vupen.com/english/advisories/2008/0396/references No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3739.
CVE ID: CVE-2008-3739 Date Updated: 2024-08-07T09:52:59.531Z Date Published: 2008-08-27T20:00:00 Description: Cross-site scripting (XSS) vulnerability in (1) System Consultants La!Cooda WIZ 1.4.0 and earlier and (2) SpaceTag LacoodaST 2.1.3 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly involving upload of files containing XSS sequences. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jvn.jp/en/jp/JVN52557009/index.html - http://www.securityfocus.com/bid/30791 - http://jvn.jp/en/jp/JVN27417220/index.html - http://secunia.com/advisories/31574 - https://exchange.xforce.ibmcloud.com/vulnerabilities/44593 - http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000048.html - http://wiz.syscon.co.jp/Details.htm - http://secunia.com/advisories/31582 - http://www.spacetag.jp/modules/products/index.php?id=54 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1379.
CVE ID: CVE-2023-1379 Date Updated: 2024-08-02T05:49:10.354Z Date Published: 2023-03-15T15:10:28.308Z Description: A vulnerability was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file addmem.php of the component POST Parameter Handler. The manipulation of the argument firstname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223127. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.223127 - https://vuldb.com/?ctiid.223127 - https://github.com/AureliusLia/bug_report/blob/main/vendors/Skynidnine/Friendly%20Island%20Pizza%20Website%20and%20Ordering%20System/SQLi-1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16400.
CVE ID: CVE-2019-16400 Date Updated: 2024-08-05T01:17:39.589Z Date Published: 2019-11-06T22:12:26 Description: Samsung Galaxy S8 plus (Android version: 8.0.0, Build Number: R16NW.G955USQU5CRG3, Baseband Vendor: Qualcomm Snapdragon 835, Baseband: G955USQU5CRG3), Samsung Galaxy S3 (Android version: 4.3, Build Number: JSS15J.I9300XXUGND5, Baseband Vendor: Samsung Exynos 4412, Baseband: I9300XXUGNA8), and Samsung Galaxy Note 2 (Android version: 4.3, Build Number: JSS15J.I9300XUGND5, Baseband Vendor: Samsung Exynos 4412, Baseband: N7100DDUFND1) devices allow attackers to send AT commands over Bluetooth, resulting in several Denial of Service (DoS) attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.openconf.org/acsac2019/modules/request.php?module=oc_program&action=summary.php&id=210 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-1091.
CVE ID: CVE-2016-1091 Date Updated: 2024-08-05T22:48:12.077Z Date Published: 2016-10-13T19:00:00 Description: Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1089, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6949, CVE-2016-6952, CVE-2016-6953, CVE-2016-6961, CVE-2016-6962, CVE-2016-6963, CVE-2016-6964, CVE-2016-6965, CVE-2016-6967, CVE-2016-6968, CVE-2016-6969, CVE-2016-6971, CVE-2016-6979, CVE-2016-6988, and CVE-2016-6993. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1036986 - http://www.securityfocus.com/bid/93491 - https://helpx.adobe.com/security/products/acrobat/apsb16-33.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3407.
CVE ID: CVE-2015-3407 Date Updated: 2024-08-06T05:47:57.529Z Date Published: 2015-05-19T18:00:00 Description: Module::Signature before 0.74 allows remote attackers to bypass signature verification for files via a signature file that does not list the files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://metacpan.org/changes/distribution/Module-Signature - http://www.debian.org/security/2015/dsa-3261 - http://www.openwall.com/lists/oss-security/2015/04/07/1 - https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d1c7bc85372f - http://www.openwall.com/lists/oss-security/2015/04/23/17 - http://ubuntu.com/usn/usn-2607-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-22283.
CVE ID: CVE-2024-22283 Date Updated: 2024-08-01T22:43:34.263Z Date Published: 2024-01-26T23:11:52.228Z Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Delhivery Delhivery Logistics Courier.This issue affects Delhivery Logistics Courier: from n/a through 1.0.107. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/delhivery-logistics-courier/wordpress-delhivery-logistics-courier-plugin-1-0-107-subscriber-sql-injection-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3580.
CVE ID: CVE-2010-3580 Date Updated: 2024-08-07T03:11:44.566Z Date Published: 2010-10-14T17:00:00 Description: Unspecified vulnerability in Oracle OpenSolaris allows local users to affect availability via unknown vectors related to Kernel/File System. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html - http://www.us-cert.gov/cas/techalerts/TA10-287A.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10120.
CVE ID: CVE-2016-10120 Date Updated: 2024-08-06T03:14:41.299Z Date Published: 2017-04-13T14:00:00 Description: Firejail uses 0777 permissions when mounting (1) /dev, (2) /dev/shm, (3) /var/tmp, or (4) /var/lock, which allows local users to gain privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2017/01/05/4 - http://www.openwall.com/lists/oss-security/2017/01/06/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24231.
CVE ID: CVE-2022-24231 Date Updated: 2024-08-03T04:07:01.664Z Date Published: 2022-04-05T01:18:41 Description: Simple Student Information System v1.0 was discovered to contain a SQL injection vulnerability via add/Student. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/nsparker1337/OpenSource/blob/main/Blind_XSS - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Student-Information No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-29011.
CVE ID: CVE-2023-29011 Date Updated: 2024-08-02T14:00:14.373Z Date Published: 2023-04-25T20:40:30.247Z Description: Git for Windows, the Windows port of Git, ships with an executable called `connect.exe`, which implements a SOCKS5 proxy that can be used to connect e.g. to SSH servers via proxies when certain ports are blocked for outgoing connections. The location of `connect.exe`'s config file is hard-coded as `/etc/connectrc` which will typically be interpreted as `C:\etc\connectrc`. Since `C:\etc` can be created by any authenticated user, this makes `connect.exe` susceptible to malicious files being placed there by other users on the same multi-user machine. The problem has been patched in Git for Windows v2.40.1. As a workaround, create the folder `etc` on all drives where Git commands are run, and remove read/write access from those folders. Alternatively, watch out for malicious `<drive>:\etc\connectrc` files on multi-user machines. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/git-for-windows/git/security/advisories/GHSA-g4fv-xjqw-q7jm - https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-21217.
CVE ID: CVE-2022-21217 Date Updated: 2024-08-03T02:31:59.875Z Date Published: 2022-01-28T19:10:09 Description: An out-of-bounds write vulnerability exists in the device TestEmail functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted network request can lead to an out-of-bounds write. An attacker can send an HTTP request to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1445 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12488.
CVE ID: CVE-2020-12488 Date Updated: 2024-09-16T22:25:02.702Z Date Published: 2021-11-10T15:49:58.016162Z Description: The attacker can access the sensitive information stored within the jovi Smart Scene module by entering carefully constructed commands without requesting permission. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vivo.com/en/support/security-advisory-detail?id=5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-7054.
CVE ID: CVE-2023-7054 Date Updated: 2024-08-02T08:50:07.632Z Date Published: 2023-12-22T02:00:05.157Z Description: A vulnerability was found in PHPGurukul Online Notes Sharing System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /user/add-notes.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248741 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.248741 - https://vuldb.com/?ctiid.248741 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/notes_malicious_fileupload.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-21302.
CVE ID: CVE-2022-21302 Date Updated: 2024-09-24T20:26:06.098Z Date Published: 2022-01-19T11:23:50 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujan2022.html - https://security.netapp.com/advisory/ntap-20220121-0008/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1186.
CVE ID: CVE-2009-1186 Date Updated: 2024-08-07T05:04:49.306Z Date Published: 2009-04-17T14:00:00 Description: Buffer overflow in the util_path_encode function in udev/lib/libudev-util.c in udev before 1.4.1 allows local users to cause a denial of service (service outage) via vectors that trigger a call with crafted arguments. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/502752/100/0/threaded - http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0063 - http://secunia.com/advisories/34801 - http://www.securitytracker.com/id?1022068 - http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00006.html - https://bugzilla.redhat.com/show_bug.cgi?id=495052 - http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.446399 - https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00462.html - http://www.debian.org/security/2009/dsa-1772 - http://www.gentoo.org/security/en/glsa/glsa-200904-18.xml - https://launchpad.net/bugs/cve/2009-1186 - http://www.mandriva.com/security/advisories?name=MDVSA-2009:103 - http://secunia.com/advisories/34776 - http://secunia.com/advisories/34731 - http://secunia.com/advisories/34753 - http://secunia.com/advisories/34785 - http://secunia.com/advisories/34787 - https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00463.html - http://www.securityfocus.com/bid/34539 - http://www.vupen.com/english/advisories/2009/1053 - http://www.ubuntu.com/usn/usn-758-1 - http://secunia.com/advisories/34771 - http://secunia.com/advisories/34750 - http://wiki.rpath.com/Advisories:rPSA-2009-0063 - http://git.kernel.org/?p=linux/hotplug/udev.git%3Ba=commitdiff%3Bh=662c3110803bd8c1aedacc36788e6fd028944314 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1299.
CVE ID: CVE-2019-1299 Date Updated: 2024-08-04T18:13:30.369Z Date Published: 2019-09-11T21:25:01 Description: An information disclosure vulnerability exists when Microsoft Edge based on Edge HTML improperly handles objects in memory, aka 'Microsoft Edge based on Edge HTML Information Disclosure Vulnerability'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1299 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-17046.
CVE ID: CVE-2018-17046 Date Updated: 2024-08-05T10:39:59.161Z Date Published: 2018-09-14T07:00:00 Description: translate man before 2018-08-21 has XSS via containers/outputBox/outputBox.vue and store/index.js. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/magic-FE/translate-man/issues/49 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13563.
CVE ID: CVE-2018-13563 Date Updated: 2024-08-05T09:07:52.100Z Date Published: 2018-07-09T06:00:00 Description: The mintToken function of a smart contract implementation for UPayToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md - https://github.com/BlockChainsSecurity/EtherTokens/tree/master/UPayToken No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1003.004 : LSA Secrets
Name: LSA Secrets ID: T1003.004 URL: https://attack.mitre.org/techniques/T1003/004 Platforms: Windows Kill Chain Phases: Credential Access Description: Adversaries with SYSTEM access to a host may attempt to access Local Security Authority (LSA) secrets, which can contain a variety of different credential materials, such as credentials for service accounts.(Citation: Passcape LSA Secrets)(Citation: Microsoft AD Admin Tier Model)(Citation: Tilbury Windows Credentials) LSA secrets are stored in the registry at `HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets`. LSA secrets can also be dumped from memory.(Citation: ired Dumping LSA Secrets) [Reg](S0075) can be used to extract from the Registry. [Mimikatz](S0002) can be used to extract secrets from memory.(Citation: ired Dumping LSA Secrets) Data Sources: Windows Registry: Windows Registry Key Access, Command: Command Execution Detection: Monitor processes and command-line arguments for program execution that may be indicative of credential dumping. Remote access tools may contain built-in features or incorporate existing tools like Mimikatz. PowerShell scripts also exist that contain credential dumping functionality, such as PowerSploit's Invoke-Mimikatz module,(Citation: Powersploit) which may require additional logging features to be configured in the operating system to collect necessary information for analysis.
Provide detailed information about CVE-2022-40680.
CVE ID: CVE-2022-40680 Date Updated: 2024-08-03T12:21:46.588Z Date Published: 2022-12-06T16:00:38.136Z Description: A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiOS 6.0.7 - 6.0.15, 6.2.2 - 6.2.12, 6.4.0 - 6.4.9 and 7.0.0 - 7.0.3 allows a privileged attacker to execute unauthorized code or commands via storing malicious payloads in replacement messages. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/psirt/FG-IR-21-248 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41338.
CVE ID: CVE-2023-41338 Date Updated: 2024-09-26T14:05:03.642Z Date Published: 2023-09-08T18:17:18.044Z Description: Fiber is an Express inspired web framework built in the go language. Versions of gofiber prior to 2.49.2 did not properly restrict access to localhost. This issue impacts users of our project who rely on the `ctx.IsFromLocal` method to restrict access to localhost requests. If exploited, it could allow unauthorized access to resources intended only for localhost. Setting `X-Forwarded-For: 127.0.0.1` in a request from a foreign host, will result in true for `ctx.IsFromLocal`. Access is limited to the scope of the affected process. This issue has been patched in version `2.49.2` with commit `b8c9ede6`. Users are advised to upgrade. There are no known workarounds to remediate this vulnerability without upgrading to the patched version. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364f - https://github.com/gofiber/fiber/commit/b8c9ede6efa231116c4bd8bb9d5e03eac1cb76dc - https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For - https://docs.gofiber.io/api/ctx#isfromlocal No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9839.
CVE ID: CVE-2020-9839 Date Updated: 2024-08-04T10:43:05.374Z Date Published: 2020-06-09T16:16:12 Description: A race condition was addressed with improved state handling. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5. An application may be able to gain elevated privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT211168 - https://support.apple.com/HT211170 - https://support.apple.com/HT211171 - https://support.apple.com/HT211175 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41706.
CVE ID: CVE-2023-41706 Date Updated: 2024-08-02T19:01:35.419Z Date Published: 2024-02-12T08:15:24.085Z Description: Processing time of drive search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing of user-defined drive search expressions is not limited No publicly available exploits are known. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6259_7.10.6_2023-12-11.pdf - https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0007.json No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22370.
CVE ID: CVE-2022-22370 Date Updated: 2024-09-16T16:33:20.269Z Date Published: 2022-07-08T17:45:19.536069Z Description: IBM Security Verify Access 10.0.0.0, 10.0.1.0, 10.0.2.0, and 10.0.3.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 221194. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6601725 - https://exchange.xforce.ibmcloud.com/vulnerabilities/221194 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1592.
CVE ID: CVE-2019-1592 Date Updated: 2024-09-16T16:28:02.287Z Date Published: 2019-05-03T14:50:17.826817Z Description: A vulnerability in the background operations functionality of Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an authenticated, local attacker to gain elevated privileges as root on an affected device. The vulnerability is due to insufficient validation of user-supplied files on an affected device. An attacker could exploit this vulnerability by logging in to the CLI of the affected device and creating a crafted file in a specific directory on the filesystem. A successful exploit could allow the attacker to execute arbitrary operating system commands as root on an affected device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-hw-clock-util No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1854.
CVE ID: CVE-2019-1854 Date Updated: 2024-09-16T17:23:26.732Z Date Published: 2019-05-03T16:35:14.448900Z Description: A vulnerability in the management web interface of Cisco Expressway Series could allow an authenticated, remote attacker to perform a directory traversal attack against an affected device. The vulnerability is due to insufficient input validation on the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to bypass security restrictions and access the web interface of a Cisco Unified Communications Manager associated with the affected device. Valid credentials would still be required to access the Cisco Unified Communications Manager interface. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-expressway-traversal - http://www.securityfocus.com/bid/108154 - http://seclists.org/fulldisclosure/2019/May/28 - https://seclists.org/bugtraq/2019/May/49 - http://packetstormsecurity.com/files/152963/Cisco-Expressway-Gateway-11.5.1-Directory-Traversal.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22266.
CVE ID: CVE-2022-22266 Date Updated: 2024-08-03T03:07:50.211Z Date Published: 2022-01-07T22:39:12 Description: (Applicable to China models only) Unprotected WifiEvaluationService in TencentWifiSecurity application prior to SMR Jan-2022 Release 1 allows untrusted applications to get WiFi information without proper permission. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2817.
CVE ID: CVE-2016-2817 Date Updated: 2024-08-05T23:32:21.317Z Date Published: 2016-04-30T17:00:00 Description: The WebExtension sandbox feature in browser/components/extensions/ext-tabs.js in Mozilla Firefox before 46.0 does not properly restrict principal inheritance during chrome.tabs.create and chrome.tabs.update API calls, which allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted extension that accesses a (1) javascript: or (2) data: URL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html - http://www.securitytracker.com/id/1035692 - http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html - http://www.ubuntu.com/usn/USN-2936-2 - https://security.gentoo.org/glsa/201701-15 - http://www.ubuntu.com/usn/USN-2936-1 - https://bugzilla.mozilla.org/show_bug.cgi?id=1227462 - http://www.ubuntu.com/usn/USN-2936-3 - http://www.mozilla.org/security/announce/2016/mfsa2016-46.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-47624.
CVE ID: CVE-2023-47624 Date Updated: 2024-08-02T21:16:42.103Z Date Published: 2023-12-13T21:09:00.688Z Description: Audiobookshelf is a self-hosted audiobook and podcast server. In versions 2.4.3 and prior, any user (regardless of their permissions) may be able to read files from the local file system due to a path traversal in the `/hls` endpoint. This issue may lead to Information Disclosure. As of time of publication, no patches are available. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/ - https://github.com/advplyr/audiobookshelf/blob/d7b2476473ef1934eedec41425837cddf2d4b13e/server/routers/HlsRouter.js#L32 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.