instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2017-3570.
CVE ID: CVE-2017-3570 Date Updated: 2024-08-05T14:30:57.978Z Date Published: 2017-04-24T19:00:00 Description: Vulnerability in the PeopleSoft Enterprise FSCM component of Oracle PeopleSoft Products (subcomponent: eSettlements). The supported version that is affected is 9.1. Easily "exploitable" vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise FSCM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise FSCM accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise FSCM accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/97906 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html - http://www.securitytracker.com/id/1038301 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8609.
CVE ID: CVE-2014-8609 Date Updated: 2024-08-06T13:26:02.504Z Date Published: 2014-12-15T17:27:00 Description: The addAccount method in src/com/android/settings/accounts/AddAccountSettings.java in the Settings application in Android before 5.0.0 does not properly create a PendingIntent, which allows attackers to use the SYSTEM uid for broadcasting an intent with arbitrary component, action, or category information via a third-party authenticator in a crafted application, aka Bug 17356824. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/129281/Android-Settings-Pendingintent-Leak.html - http://xteam.baidu.com/?p=158 - http://seclists.org/fulldisclosure/2014/Nov/81 - https://android.googlesource.com/platform/packages/apps/Settings/+/f5d3e74ecc2b973941d8adbe40c6b23094b5abb7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2709.
CVE ID: CVE-2022-2709 Date Updated: 2024-08-03T00:46:03.629Z Date Published: 2022-09-19T14:00:56 Description: The Float to Top Button WordPress plugin through 2.3.6 does not escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/1c551234-9c59-41a0-ab74-beea2d27df6b No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-4728.
CVE ID: CVE-2009-4728 Date Updated: 2024-08-07T07:17:25.611Z Date Published: 2010-03-18T18:00:00 Description: SQL injection vulnerability in the administrative interface in Questions Answered 1.3 allows remote attackers to execute arbitrary SQL commands via the username parameter. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/9341 - http://www.vupen.com/english/advisories/2009/2130 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26950.
CVE ID: CVE-2022-26950 Date Updated: 2024-08-03T05:18:38.345Z Date Published: 2022-03-29T23:33:23 Description: Archer 6.x through 6.9 P2 (6.9.0.2) is affected by an open redirect vulnerability. A remote unprivileged attacker may potentially redirect legitimate users to arbitrary web sites and conduct phishing attacks. The attacker could then steal the victims' credentials and silently authenticate them to the Archer application without the victims realizing an attack occurred. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.archerirm.community/t5/general-support-information/tkb-p/information-support - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9025.
CVE ID: CVE-2016-9025 Date Updated: 2024-08-06T02:35:02.305Z Date Published: 2020-12-31T02:11:12 Description: Exponent CMS before 2.6.0 has improper input validation in purchaseOrderController.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/exponentcms/exponent-cms/commit/a8efd9ca71fc9b8b843ad0910d435d237482ee31 - https://exponentcms.lighthouseapp.com/projects/61783/changesets/a8efd9ca71fc9b8b843ad0910d435d237482ee31 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26730.
CVE ID: CVE-2024-26730 Date Updated: 2024-09-11T17:33:21.224Z Date Published: 2024-04-03T17:00:18.186Z Description: In the Linux kernel, the following vulnerability has been resolved: hwmon: (nct6775) Fix access to temperature configuration registers The number of temperature configuration registers does not always match the total number of temperature registers. This can result in access errors reported if KASAN is enabled. BUG: KASAN: global-out-of-bounds in nct6775_probe+0x5654/0x6fe9 nct6775_core No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/f006c45a3ea424f8f6c8e4b9283bc245ce2a4d0f - https://git.kernel.org/stable/c/c196387820c9214c5ceaff56d77303c82514b8b1 - https://git.kernel.org/stable/c/d56e460e19ea8382f813eb489730248ec8d7eb73 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18894.
CVE ID: CVE-2018-18894 Date Updated: 2024-08-05T11:23:08.534Z Date Published: 2020-03-10T12:50:09 Description: Certain older Lexmark devices (C, M, X, and 6500e before 2018-12-18) contain a directory traversal vulnerability in the embedded web server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.lexmark.com/alerts - http://support.lexmark.com/index?page=content&id=TE906&locale=EN&userlocale=EN_US No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15712.
CVE ID: CVE-2017-15712 Date Updated: 2024-09-17T01:46:21.738Z Date Published: 2018-02-19T14:00:00Z Description: Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 4.3.0 and 5.0.0-beta1 to expose private files on the Oozie server process. The malicious user can construct a workflow XML file containing XML directives and configuration that reference sensitive files on the Oozie server host. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/103102 - https://lists.apache.org/thread.html/4606709264fe7cb0285e2a12aca2d01a06b14cd58791c9fc32abd216%40%3Cdev.oozie.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27633.
CVE ID: CVE-2020-27633 Date Updated: 2024-09-19T15:10:06.481Z Date Published: 2023-10-10T00:00:00 Description: In FNET 4.6.3, TCP ISNs are improperly random. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.forescout.com - https://www.cisa.gov/news-events/ics-advisories/icsa-21-042-01 - https://www.forescout.com/resources/numberjack-weak-isn-generation-in-embedded-tcpip-stacks/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-45897.
CVE ID: CVE-2021-45897 Date Updated: 2024-08-04T04:54:30.923Z Date Published: 2022-01-28T16:21:31 Description: SuiteCRM before 7.12.3 and 8.x before 8.0.2 allows remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.suitecrm.com/8.x/admin/releases/8.0/ - https://docs.suitecrm.com/admin/releases/7.12.x/ - https://github.com/manuelz120/CVE-2021-45897 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-16657.
CVE ID: CVE-2018-16657 Date Updated: 2024-08-05T10:32:53.033Z Date Published: 2018-09-07T14:00:00 Description: In Kamailio before 5.0.7 and 5.1.x before 5.1.4, a crafted SIP message with an invalid Via header causes a segmentation fault and crashes Kamailio. The reason is missing input validation in the crcitt_string_array core function for calculating a CRC hash for To tags. (An additional error is present in the check_via_address core function: this function also misses input validation.) This could result in denial of service and potentially the execution of arbitrary code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.debian.org/security/2018/dsa-4292 - https://lists.debian.org/debian-lts-announce/2018/09/msg00013.html - https://skalatan.de/blog/advisory-hw-2018-06 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-0095.
CVE ID: CVE-2012-0095 Date Updated: 2024-08-06T18:16:18.499Z Date Published: 2012-10-16T23:00:00 Description: Unspecified vulnerability in the Oracle Imaging and Process Management component in Oracle Fusion Middleware 10.1.3.6.0 allows remote authenticated users to affect confidentiality via unknown vectors related to Web, a different vulnerability than CVE-2012-0086 and CVE-2012-0108. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html - http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2133.
CVE ID: CVE-2010-2133 Date Updated: 2024-08-07T02:25:06.841Z Date Published: 2010-06-02T18:14:00 Description: SQL injection vulnerability in contact.php in My Little Forum allows remote attackers to execute arbitrary SQL commands via the id parameter, a different vector than CVE-2007-2942. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/56618 - http://www.securityfocus.com/bid/38485 - http://www.exploit-db.com/exploits/11616 - http://packetstormsecurity.org/1003-exploits/mlf-sql.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34463.
CVE ID: CVE-2024-34463 Date Updated: 2024-09-03T14:05:58.810Z Date Published: 2024-09-03T00:00:00 Description: BPL Personal Weighing Scale PWS-01BT IND/09/18/599 devices send sensitive information in unencrypted BLE packets. (The packet data also lacks authentication and integrity protection.) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.bplmedicaltechnologies.com/product-details/weighing-scales/personal-weighing-scale-pws-01bt/ - https://yashhchandna.medium.com/random-sunday-thought-turned-into-a-cve-09ca0c08343f - https://github.com/yash-chandna/CVE-2024-34463 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38651.
CVE ID: CVE-2023-38651 Date Updated: 2024-08-02T17:46:56.475Z Date Published: 2024-01-08T14:47:46.837Z Description: Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode times parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is zero. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1814 - https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24646.
CVE ID: CVE-2022-24646 Date Updated: 2024-08-03T04:13:57.044Z Date Published: 2022-02-10T22:39:12 Description: Hospital Management System v4.0 was discovered to contain a SQL injection vulnerability in /Hospital-Management-System-master/contact.php via the txtMsg parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/kishan0725/Hospital-Management-System/issues/18 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263 - https://www.nu11secur1ty.com/2022/02/cve-2022-24263.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2138.
CVE ID: CVE-2009-2138 Date Updated: 2024-08-07T05:36:21.019Z Date Published: 2009-06-19T19:00:00 Description: Multiple open redirect vulnerabilities in TBDev.NET 01-01-08 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via (1) the returnto parameter to login.php or (2) the returnto parameter in a delete action to news.php. NOTE: this can be leveraged for cross-site scripting (XSS) by redirecting to a data: URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://forum.intern0t.net/intern0t-advisories/1121-intern0t-tbdev-01-01-2008-multiple-vulnerabilities.html - https://www.exploit-db.com/exploits/8942 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10185.
CVE ID: CVE-2018-10185 Date Updated: 2024-09-17T00:50:28.889Z Date Published: 2018-04-17T19:00:00Z Description: An issue was discovered in TuziCMS v2.0.6. There is a CSRF vulnerability that can add an admin account, as demonstrated by a history.pushState call. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/yeyinshi/tuzicms/issues/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-12488.
CVE ID: CVE-2017-12488 Date Updated: 2024-09-16T17:29:11.798Z Date Published: 2018-02-15T22:00:00Z Description: A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1039152 - http://www.securityfocus.com/bid/100367 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1339.
CVE ID: CVE-2013-1339 Date Updated: 2024-08-06T14:57:05.048Z Date Published: 2013-06-12T01:00:00 Description: The Print Spooler in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly manage memory during deletion of printer connections, which allows remote authenticated users to execute arbitrary code via a crafted request, aka "Print Spooler Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16837 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-050 - http://www.us-cert.gov/ncas/alerts/TA13-168A No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9585.
CVE ID: CVE-2014-9585 Date Updated: 2024-08-06T13:47:41.817Z Date Published: 2015-01-09T21:00:00 Description: The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://git.kernel.org/?p=linux/kernel/git/tip/tip.git%3Ba=commit%3Bh=fbe1bf140671619508dfa575d74a185ae53c5dbb - http://www.ubuntu.com/usn/USN-2515-1 - http://www.debian.org/security/2015/dsa-3170 - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html - http://rhn.redhat.com/errata/RHSA-2015-1778.html - http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html - http://www.ubuntu.com/usn/USN-2514-1 - http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148480.html - http://www.openwall.com/lists/oss-security/2015/01/09/8 - http://www.ubuntu.com/usn/USN-2518-1 - http://rhn.redhat.com/errata/RHSA-2015-1787.html - http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html - http://www.mandriva.com/security/advisories?name=MDVSA-2015:058 - http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html - http://www.securityfocus.com/bid/71990 - http://www.openwall.com/lists/oss-security/2014/12/09/10 - http://www.ubuntu.com/usn/USN-2517-1 - http://v0ids3curity.blogspot.in/2014/12/return-to-vdso-using-elf-auxiliary.html - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html - http://www.ubuntu.com/usn/USN-2516-1 - http://www.ubuntu.com/usn/USN-2513-1 - http://git.kernel.org/?p=linux/kernel/git/luto/linux.git%3Ba=commit%3Bh=bc3b94c31d65e761ddfe150d02932c65971b74e2 - http://rhn.redhat.com/errata/RHSA-2015-1081.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33336.
CVE ID: CVE-2023-33336 Date Updated: 2024-08-02T15:39:36.135Z Date Published: 2023-06-30T00:00:00 Description: Reflected cross site scripting (XSS) vulnerability was discovered in Sophos Web Appliance v4.3.9.1 that allows for arbitrary code to be inputted via the double quotes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://inf0seq.github.io/cve/2023/04/30/Cross-site-scripting-%28XSS%29-in-Sophos-Web-Appliance-4.1.1-0.9.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1000013.
CVE ID: CVE-2015-1000013 Date Updated: 2024-08-06T08:58:26.519Z Date Published: 2016-10-06T14:00:00 Description: Remote file upload vulnerability in wordpress plugin csv2wpec-coupon v1.1 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vapidlabs.com/advisory.php?v=153 - http://www.securityfocus.com/bid/94497 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2642.
CVE ID: CVE-2015-2642 Date Updated: 2024-08-06T05:24:37.244Z Date Published: 2015-10-21T21:00:00 Description: Unspecified vulnerability in Oracle Sun Solaris 10 and 11.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Gzip. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html - http://www.securitytracker.com/id/1033881 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5826.
CVE ID: CVE-2019-5826 Date Updated: 2024-08-04T20:09:23.647Z Date Published: 2019-11-25T19:41:18 Description: Use after free in IndexedDB in Google Chrome prior to 73.0.3683.86 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html - https://crbug.com/941746 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2582.
CVE ID: CVE-2012-2582 Date Updated: 2024-08-06T19:34:25.836Z Date Published: 2012-08-23T10:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Open Ticket Request System (OTRS) Help Desk 2.4.x before 2.4.13, 3.0.x before 3.0.15, and 3.1.x before 3.1.9, and OTRS ITSM 2.1.x before 2.1.5, 3.0.x before 3.0.6, and 3.1.x before 3.1.6, allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with (1) a Cascading Style Sheets (CSS) expression property in the STYLE attribute of an arbitrary element or (2) UTF-7 text in an HTTP-EQUIV="CONTENT-TYPE" META element. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-updates/2012-09/msg00024.html - http://www.otrs.com/en/open-source/community-news/security-advisories/security-advisory-2012-01/ - http://www.kb.cert.org/vuls/id/582879 - http://secunia.com/advisories/50513 - http://www.debian.org/security/2012/dsa-2536 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1823.
CVE ID: CVE-2010-1823 Date Updated: 2024-08-07T01:35:53.660Z Date Published: 2010-09-24T18:00:00 Description: Use-after-free vulnerability in WebKit before r65958, as used in Google Chrome before 6.0.472.59, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger use of document APIs such as document.close during parsing, as demonstrated by a Cascading Style Sheets (CSS) file referencing an invalid SVG font, aka rdar problem 8442098. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/43068 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7405 - http://support.apple.com/kb/HT4981 - http://www.vupen.com/english/advisories/2011/0212 - http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html - https://bugs.webkit.org/show_bug.cgi?id=44533 - http://googlechromereleases.blogspot.com/2010/09/stable-beta-channel-updates_14.html - https://bugs.webkit.org/show_bug.cgi?id=43055 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - http://support.apple.com/kb/HT4808 - http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html - http://code.google.com/p/chromium/issues/detail?id=50250 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1619.
CVE ID: CVE-2024-1619 Date Updated: 2024-08-01T18:48:20.684Z Date Published: 2024-02-29T09:22:03.588Z Description: Kaspersky has fixed a security issue in the Kaspersky Security 8.0 for Linux Mail Server. The issue was that an attacker could potentially force an administrator to click on a malicious link to perform unauthorized actions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.kaspersky.com/vulnerability/list-of-advisories/12430#010224 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1912.
CVE ID: CVE-2023-1912 Date Updated: 2024-08-02T06:05:26.598Z Date Published: 2023-04-06T14:37:58.264Z Description: The Limit Login Attempts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its lock logging feature in versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator accesses the plugin's settings page. This only works when the plugin prioritizes use of the X-FORWARDED-FOR header, which can be configured in its settings. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/cb8c80fc-3b51-4003-b221-6f02e74bead0?source=cve - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=551920%40limit-login-attempts%2Ftags%2F1.7.1&new=2893850%40limit-login-attempts%2Ftags%2F1.7.2 - https://www.pluginvulnerabilities.com/2018/03/09/one-of-the-ten-most-popular-wordpress-plugins-isnt-needed-and-introduces-a-vulnerability-on-some-websites-using-it/ - http://packetstormsecurity.com/files/171824/WordPress-Limit-Login-Attempts-1.7.1-Cross-Site-Scripting.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2016-3714
CVE-CVE-2016-3714 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1204.001: Malicious Link. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2016 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2023-6457.
CVE ID: CVE-2023-6457 Date Updated: 2024-08-02T08:28:21.868Z Date Published: 2024-01-16T01:00:33.447Z Description: Incorrect Default Permissions vulnerability in Hitachi Tuning Manager on Windows (Hitachi Tuning Manager server component) allows local users to read and write specific files.This issue affects Hitachi Tuning Manager: before 8.8.5-04. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-104/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50314.
CVE ID: CVE-2023-50314 Date Updated: 2024-08-19T16:05:25.204Z Date Published: 2024-08-14T17:22:31.591Z Description: IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.8 could allow an attacker with access to the network to conduct spoofing attacks. An attacker could exploit this vulnerability using a certificate issued by a trusted authority to obtain sensitive information. IBM X-Force ID: 274713. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7165502 - https://exchange.xforce.ibmcloud.com/vulnerabilities/274713 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-7035.
CVE ID: CVE-2023-7035 Date Updated: 2024-08-02T08:50:07.910Z Date Published: 2023-12-21T14:31:04.796Z Description: A vulnerability was found in automad up to 1.10.9 and classified as problematic. Affected by this issue is some unknown functionality of the file packages\standard\templates\post.php of the component Setting Handler. The manipulation of the argument sitename leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248684. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.248684 - https://vuldb.com/?ctiid.248684 - https://github.com/screetsec/VDD/tree/main/Automad%20CMS/Stored%20Cross%20Site%20Scripting%20(XSS) No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7649.
CVE ID: CVE-2017-7649 Date Updated: 2024-09-16T17:34:17.160Z Date Published: 2017-09-11T16:00:00Z Description: The network enabled distribution of Kura before 2.1.0 takes control over the device's firewall setup but does not allow IPv6 firewall rules to be configured. Still the Equinox console port 5002 is left open, allowing to log into Kura without any user credentials over unencrypted telnet and executing commands using the Equinox "exec" command. As the process is running as "root" full control over the device can be acquired. IPv6 is also left in auto-configuration mode, accepting router advertisements automatically and assigns a MAC address based IPv6 address. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.eclipse.org/bugs/show_bug.cgi?id=514681 - https://github.com/eclipse/kura/issues/956 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-43340.
CVE ID: CVE-2024-43340 Date Updated: 2024-08-26T20:49:13.453Z Date Published: 2024-08-26T20:33:03.813Z Description: Cross-Site Request Forgery (CSRF) vulnerability in Nasirahmed Advanced Form Integration.This issue affects Advanced Form Integration: from n/a through 1.89.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/advanced-form-integration/wordpress-afi-the-easiest-integration-plugin-plugin-1-89-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38391.
CVE ID: CVE-2023-38391 Date Updated: 2024-09-06T15:41:54.188Z Date Published: 2023-11-03T23:07:33.642Z Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themesgrove Onepage Builder allows SQL Injection.This issue affects Onepage Builder: from n/a through 2.4.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/tx-onepager/wordpress-onepage-builder-easiest-landing-page-builder-for-wordpress-plugin-2-4-1-sql-injection?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38170.
CVE ID: CVE-2024-38170 Date Updated: 2024-09-19T21:53:08.399Z Date Published: 2024-08-13T17:30:26.788Z Description: Microsoft Excel Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38170 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39582.
CVE ID: CVE-2024-39582 Date Updated: 2024-09-10T13:12:02.943Z Date Published: 2024-09-10T09:04:50.035Z Description: Dell PowerScale InsightIQ, version 5.0, contain a Use of hard coded Credentials vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000228412/dsa-2024-360-security-update-for-dell-powerscale-insightiq-for-multiple-security-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2945.
CVE ID: CVE-2024-2945 Date Updated: 2024-08-01T19:32:42.230Z Date Published: 2024-03-27T03:00:05.068Z Description: A vulnerability was found in Campcodes Online Examination System 1.0. It has been classified as critical. Affected is an unknown function of the file /adminpanel/admin/facebox_modal/updateExaminee.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258036. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.258036 - https://vuldb.com/?ctiid.258036 - https://vuldb.com/?submit.304762 - https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%205.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-6563.
CVE ID: CVE-2020-6563 Date Updated: 2024-08-04T09:11:04.414Z Date Published: 2020-09-21T19:06:50 Description: Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html - https://crbug.com/1104628 - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00072.html - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00078.html - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00081.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EE7XWIZBME7JAY7N6CGPET4CLNHHEIVT/ - https://www.debian.org/security/2021/dsa-4824 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6912.
CVE ID: CVE-2015-6912 Date Updated: 2024-08-06T07:36:34.607Z Date Published: 2015-09-11T16:00:00 Description: Synology Video Station before 1.5-0763 allows remote attackers to execute arbitrary shell commands via shell metacharacters in the subtitle_codepage parameter to subtitle.cgi. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.securify.nl/advisory/SFY20150810/synology_video_station_command_injection_and_multiple_sql_injection_vulnerabilities.html - https://www.synology.com/en-global/releaseNote/VideoStation?model=DS715 - http://www.securityfocus.com/archive/1/536427/100/0/threaded - http://seclists.org/fulldisclosure/2015/Sep/31 - http://packetstormsecurity.com/files/133519/Synology-Video-Station-1.5-0757-Command-Injection-SQL-Injection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-23946.
CVE ID: CVE-2021-23946 Date Updated: 2023-02-21T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-1202.
CVE ID: CVE-2021-1202 Date Updated: 2024-09-17T01:46:19.772Z Date Published: 2021-01-13T21:15:26.832896Z Description: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-3629.
CVE ID: CVE-2017-3629 Date Updated: 2024-08-05T14:30:58.530Z Date Published: 2017-06-22T13:00:00 Description: Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/45625/ - http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-3629-3757403.html - https://www.exploit-db.com/exploits/42270/ - http://www.securityfocus.com/bid/99150 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4531.
CVE ID: CVE-2014-4531 Date Updated: 2024-08-06T11:20:26.308Z Date Published: 2014-07-02T18:00:00 Description: Cross-site scripting (XSS) vulnerability in main_page.php in the Game tabs plugin 0.4.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the n parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://codevigilant.com/disclosure/wp-plugin-game-tabs-a3-cross-site-scripting-xss No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4420.
CVE ID: CVE-2011-4420 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6073.
CVE ID: CVE-2008-6073 Date Updated: 2024-08-07T11:20:24.273Z Date Published: 2009-02-06T01:00:00 Description: StorageCrypt 2.0.1 does not properly encrypt disks, which allows local users to obtain sensitive information via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/30471 - https://exchange.xforce.ibmcloud.com/vulnerabilities/42905 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6412.
CVE ID: CVE-2015-6412 Date Updated: 2024-08-06T07:22:21.157Z Date Published: 2016-01-22T11:00:00 Description: Cisco Modular Encoding Platform D9036 Software before 02.04.70 has hardcoded (1) root and (2) guest passwords, which makes it easier for remote attackers to obtain access via an SSH session, aka Bug ID CSCut88070. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160120-d9036 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1115.
CVE ID: CVE-2012-1115 Date Updated: 2024-08-06T18:45:27.466Z Date Published: 2019-12-05T20:20:25 Description: A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the export, add_value_form, and dn parameters to cmd.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089328.html - https://security-tracker.debian.org/tracker/CVE-2012-1115 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1115 - http://www.openwall.com/lists/oss-security/2012/03/12/1 - http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089297.html - http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089313.html - http://www.openwall.com/lists/oss-security/2012/03/05/24 - http://www.openwall.com/lists/oss-security/2012/03/12/10 - http://www.securityfocus.com/bid/52255 - https://exchange.xforce.ibmcloud.com/vulnerabilities/73971 - https://exchange.xforce.ibmcloud.com/vulnerabilities/74357 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-48542.
CVE ID: CVE-2023-48542 Date Updated: 2024-08-02T21:30:35.443Z Date Published: 2023-12-15T10:16:49.768Z Description: Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19335.
CVE ID: CVE-2019-19335 Date Updated: 2024-08-05T02:16:46.713Z Date Published: 2020-03-18T15:45:41 Description: During installation of an OpenShift 4 cluster, the `openshift-install` command line tool creates an `auth` directory, with `kubeconfig` and `kubeadmin-password` files. Both files contain credentials used to authenticate to the OpenShift API server, and are incorrectly assigned word-readable permissions. ose-installer as shipped in Openshift 4.2 is vulnerable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19335 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-48840.
CVE ID: CVE-2023-48840 Date Updated: 2024-08-02T21:46:28.298Z Date Published: 2023-12-07T00:00:00 Description: A lack of rate limiting in pjActionAjaxSend in Appointment Scheduler 3.0 allows attackers to cause resource exhaustion. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.phpjabbers.com/appointment-scheduler/ - http://packetstormsecurity.com/files/176056 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-8353.
CVE ID: CVE-2017-8353 Date Updated: 2024-08-05T16:34:22.458Z Date Published: 2017-04-30T17:00:00 Description: In ImageMagick 7.0.5-5, the ReadPICTImage function in pict.c allows attackers to cause a denial of service (memory leak) via a crafted file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/98377 - https://github.com/ImageMagick/ImageMagick/issues/454 - http://www.debian.org/security/2017/dsa-3863 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14044.
CVE ID: CVE-2019-14044 Date Updated: 2024-08-05T00:05:44.252Z Date Published: 2020-02-07T05:00:37 Description: Out of bound access due to access of uninitialized memory segment in an array of pointers while normal camera open close in Snapdragon Consumer IOT, Snapdragon Mobile in QCS605, SDM439, SDM630, SDM636, SDM660, SDX24 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0910.
CVE ID: CVE-2020-0910 Date Updated: 2024-08-04T06:18:03.477Z Date Published: 2020-04-15T15:12:46 Description: A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0910 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4920.
CVE ID: CVE-2017-4920 Date Updated: 2024-09-16T22:09:24.189Z Date Published: 2017-12-05T21:00:00Z Description: The implementation of the OSPF protocol in VMware NSX-V Edge 6.2.x prior to 6.2.8 and NSX-V Edge 6.3.x prior to 6.3.3 doesn't correctly handle the link-state advertisement (LSA). A rogue LSA may exploit this issue resulting in continuous sending of LSAs between two routers eventually going in loop or loss of connectivity. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vmware.com/security/advisories/VMSA-2017-0014.html - http://www.securityfocus.com/bid/100277 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8587.
CVE ID: CVE-2019-8587 Date Updated: 2024-08-04T21:24:29.200Z Date Published: 2019-12-18T17:33:19 Description: Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT210118 - https://support.apple.com/HT210119 - https://support.apple.com/HT210120 - https://support.apple.com/HT210123 - https://support.apple.com/HT210124 - https://support.apple.com/HT210125 - https://support.apple.com/HT210212 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5335.
CVE ID: CVE-2017-5335 Date Updated: 2024-08-05T14:55:35.773Z Date Published: 2017-03-24T15:00:00 Description: The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2017/01/10/7 - https://access.redhat.com/errata/RHSA-2017:2292 - http://www.securitytracker.com/id/1037576 - http://www.openwall.com/lists/oss-security/2017/01/11/4 - https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=337 - http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html - http://rhn.redhat.com/errata/RHSA-2017-0574.html - https://security.gentoo.org/glsa/201702-04 - https://gnutls.org/security.html#GNUTLS-SA-2017-2 - https://gitlab.com/gnutls/gnutls/commit/49be4f7b82eba2363bb8d4090950dad976a77a3a - http://www.securityfocus.com/bid/95374 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38269.
CVE ID: CVE-2024-38269 Date Updated: 2024-09-24T13:43:24.309Z Date Published: 2024-09-24T01:38:14.149Z Description: An improper restriction of operations within the bounds of a memory buffer in the USB file-sharing handler of the Zyxel VMG8825-T50K firmware versions through 5.50(ABOM.8)C0 could allow an authenticated attacker with administrator privileges to cause potential memory corruptions, resulting in a thread crash on an affected device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-memory-corruption-vulnerabilities-in-some-dsl-ethernet-cpe-fiber-ont-wifi-extender-and-security-router-versions-09-24-2024 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15289.
CVE ID: CVE-2020-15289 Date Updated: 2021-03-17T12:25:58 Date Published: 2021-03-17T12:25:58 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2526.
CVE ID: CVE-2011-2526 Date Updated: 2024-08-06T23:00:34.252Z Date Published: 2011-07-14T23:00:00 Description: Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/45232 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19514 - http://svn.apache.org/viewvc?view=revision&revision=1145383 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:156 - http://www.debian.org/security/2012/dsa-2401 - http://rhn.redhat.com/errata/RHSA-2012-0325.html - http://secunia.com/advisories/48308 - http://marc.info/?l=bugtraq&m=136485229118404&w=2 - http://rhn.redhat.com/errata/RHSA-2012-0078.html - http://rhn.redhat.com/errata/RHSA-2012-0075.html - http://rhn.redhat.com/errata/RHSA-2012-0074.html - http://tomcat.apache.org/security-7.html - http://marc.info/?l=bugtraq&m=133469267822771&w=2 - http://svn.apache.org/viewvc?view=revision&revision=1146005 - http://svn.apache.org/viewvc?view=revision&revision=1145571 - http://marc.info/?l=bugtraq&m=132215163318824&w=2 - http://tomcat.apache.org/security-6.html - http://secunia.com/advisories/57126 - https://bugzilla.redhat.com/show_bug.cgi?id=720948 - http://marc.info/?l=bugtraq&m=133469267822771&w=2 - http://www.securityfocus.com/archive/1/518889/100/0/threaded - http://tomcat.apache.org/security-5.html - http://osvdb.org/73797 - http://marc.info/?l=bugtraq&m=132215163318824&w=2 - https://exchange.xforce.ibmcloud.com/vulnerabilities/68541 - http://marc.info/?l=bugtraq&m=136485229118404&w=2 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14573 - http://svn.apache.org/viewvc?view=revision&revision=1145694 - http://osvdb.org/73798 - http://rhn.redhat.com/errata/RHSA-2012-0076.html - http://www.securitytracker.com/id?1025788 - http://marc.info/?l=bugtraq&m=139344343412337&w=2 - http://rhn.redhat.com/errata/RHSA-2012-0077.html - http://www.securityfocus.com/bid/48667 - https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E - https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E - https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E - https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-37935.
CVE ID: CVE-2022-37935 Date Updated: 2024-08-03T10:37:42.602Z Date Published: 2023-02-18T01:27:45.128Z Description: HPE OneView for VMware vCenter, in certain circumstances, may disclose the “HPE OneView” Username and Password. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04449en_us No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-40085.
CVE ID: CVE-2021-40085 Date Updated: 2024-08-04T02:27:31.442Z Date Published: 2021-08-31T17:32:24 Description: An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.net/bugs/1939733 - http://www.openwall.com/lists/oss-security/2021/08/31/2 - https://security.openstack.org/ossa/OSSA-2021-005.html - https://lists.debian.org/debian-lts-announce/2021/10/msg00005.html - https://www.debian.org/security/2021/dsa-4983 - https://lists.debian.org/debian-lts-announce/2022/05/msg00038.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41917.
CVE ID: CVE-2023-41917 Date Updated: 2024-08-02T19:09:49.069Z Date Published: 2024-07-02T07:41:28.397Z Description: Inadequate input validation exposes the system to potential remote code execution (RCE) risks. Attackers can exploit this vulnerability by appending shell commands to the Speed-Measurement feature, enabling unauthorized code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2204.
CVE ID: CVE-2008-2204 Date Updated: 2024-08-07T08:49:59.051Z Date Published: 2008-05-14T17:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in admin/inc/header.php in Maian Search 1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) header, (2) header2, (3) header3, (4) header4, (5) header5, (6) header6, (7) header7, (8) header8, and (9) header9 parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/29032 - http://www.securityfocus.com/archive/1/491586/100/0/threaded - http://securityreason.com/securityalert/3883 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7277.
CVE ID: CVE-2015-7277 Date Updated: 2024-08-06T07:43:46.161Z Date Published: 2015-12-31T02:00:00 Description: The web administration interface on Amped Wireless R10000 devices with firmware 2.5.2.11 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/78818 - https://www.kb.cert.org/vuls/id/763576 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4948.
CVE ID: CVE-2011-4948 Date Updated: 2024-09-16T20:21:15.832Z Date Published: 2012-08-31T22:00:00Z Description: Directory traversal vulnerability in admin/remote.php in EGroupware Enterprise Line (EPL) before 11.1.20110804-1 and EGroupware Community Edition before 1.8.001.20110805 allows remote attackers to read arbitrary files via a ..%2f (encoded dot dot slash) in the type parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.egroupware.org/epl-changelog - http://www.autosectools.com/Advisory/eGroupware-1.8.001.20110421-Local-File-Inclusion-224 - http://packetstormsecurity.org/files/101676/eGroupware-1.8.001.20110421-Local-File-Inclusion.html - http://www.egroupware.org/changelog - http://www.securityfocus.com/bid/52770 - http://comments.gmane.org/gmane.comp.web.egroupware.german/33144 - http://www.openwall.com/lists/oss-security/2012/03/29/1 - http://www.openwall.com/lists/oss-security/2012/03/30/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6680.
CVE ID: CVE-2014-6680 Date Updated: 2024-08-06T12:24:35.451Z Date Published: 2014-09-23T10:00:00 Description: The superheroquiz (aka com.davidhey.superheroquiz) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/365841 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32743.
CVE ID: CVE-2021-32743 Date Updated: 2024-08-03T23:33:54.856Z Date Published: 2021-07-15T16:05:12 Description: Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions prior to 2.11.10 and from version 2.12.0 through version 2.12.4, some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection (every released version) exposes the password of the user used to connect to the database. IcingaDB (added in 2.12.0) exposes the password used to connect to the Redis server. ElasticsearchWriter (added in 2.8.0)exposes the password used to connect to the Elasticsearch server. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. Starting with the 2.11.10 and 2.12.5 releases, these passwords are no longer exposed via the API. As a workaround, API user permissions can be restricted to not allow querying of any affected objects, either by explicitly listing only the required object types for object query permissions, or by applying a filter rule. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7 - https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/ - https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4226.
CVE ID: CVE-2021-4226 Date Updated: 2024-08-03T17:16:04.258Z Date Published: 2022-12-15T17:14:40.696Z Description: RSFirewall tries to identify the original IP address by looking at different HTTP headers. A bypass is possible due to the way it is implemented. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/c0ed80c8-ebbf-4ed9-b02f-31660097c352 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-44091.
CVE ID: CVE-2023-44091 Date Updated: 2024-08-02T19:52:11.930Z Date Published: 2024-03-19T16:31:38.932Z Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pandora FMS on all allows SQL Injection. This ulnerability allowed SQL injections to be made even if authentication failed.This issue affects Pandora FMS: from 700 through <776. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27024.
CVE ID: CVE-2024-27024 Date Updated: 2024-09-11T17:33:36.432Z Date Published: 2024-05-01T12:49:24.696Z Description: In the Linux kernel, the following vulnerability has been resolved: net/rds: fix WARNING in rds_conn_connect_if_down If connection isn't established yet, get_mr() will fail, trigger connection after get_mr(). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/786854141057751bc08eb26f1b02e97c1631c8f4 - https://git.kernel.org/stable/c/997efea2bf3a4adb96c306b9ad6a91442237bf5b - https://git.kernel.org/stable/c/9dfc15a10dfd44f8ff7f27488651cb5be6af83c2 - https://git.kernel.org/stable/c/b562ebe21ed9adcf42242797dd6cb75beef12bf0 - https://git.kernel.org/stable/c/998fd719e6d6468b930ac0c44552ea9ff8b07b80 - https://git.kernel.org/stable/c/2b505d05280739ce31d5708da840f42df827cb85 - https://git.kernel.org/stable/c/907761307469adecb02461a14120e9a1812a5fb1 - https://git.kernel.org/stable/c/c055fc00c07be1f0df7375ab0036cebd1106ed38 - https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14558.
CVE ID: CVE-2018-14558 Date Updated: 2024-08-05T09:29:51.678Z Date Published: 2018-10-30T18:00:00 Description: An issue was discovered on Tenda AC7 devices with firmware through V15.03.06.44_CN(AC7), AC9 devices with firmware through V15.03.05.19(6318)_CN(AC9), and AC10 devices with firmware through V15.03.06.23_CN(AC10). A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted goform/setUsbUnload request. This occurs because the "formsetUsbUnload" function executes a dosystemCmd function with untrusted input. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-01/Tenda.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3005.
CVE ID: CVE-2016-3005 Date Updated: 2024-08-05T23:40:14.494Z Date Published: 2016-09-01T10:00:00 Description: Cross-site scripting (XSS) vulnerability in the Web UI in IBM Connections 4.0 through CR4, 4.5 through CR5, 5.0 before CR4, and 5.5 before CR1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2016-2995, CVE-2016-2997, and CVE-2016-3010. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21988991 - http://www-01.ibm.com/support/docview.wss?uid=swg1LO89929 - http://www.securityfocus.com/bid/92581 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-5072.
CVE ID: CVE-2009-5072 Date Updated: 2024-09-16T16:17:55.713Z Date Published: 2011-04-21T10:00:00Z Description: Memory leak in the ldap_explode_dn function in IBM Tivoli Directory Server (TDS) 6.0 before 6.0.0.61 (aka 6.0.0.8-TIV-ITDS-IF0003) allows remote authenticated users to cause a denial of service (memory consumption) via an empty string argument. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=swg1IO11407 - http://www.ibm.com/support/docview.wss?uid=swg24029672 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2020-13125
CVE-CVE-2020-13125 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1203: Exploitation for Client Execution. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2018-6765.
CVE ID: CVE-2018-6765 Date Updated: 2024-08-05T06:10:11.366Z Date Published: 2018-03-27T17:00:00 Description: Swisscom MySwisscomAssistant 2.17.1.1065 contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system. This vulnerability exists due to the way .dll files are loaded. It allows an attacker to load a .dll of the attacker's choosing that could execute arbitrary code without the user's knowledge. The specific flaw exists within the handling of several DLLs (dwmapi.dll, IPHLPAPI.DLL, WindowsCodecs.dll, RpcRtRemote.dll, CRYPTSP.dll, rasadhlp.dll, DNSAPI.dll, ntmarta.dll, netbios.dll, olepro32.dll, security.dll, winhttp.dll, WINSTA.dll) loaded by the MySwisscomAssistant_Setup.exe process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2018-6765_myswisscomassistant.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-2968.
CVE ID: CVE-2020-2968 Date Updated: 2024-09-26T20:35:05.620Z Date Published: 2020-07-15T17:34:36 Description: Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via multiple protocols to compromise Java VM. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java VM, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java VM. CVSS 3.1 Base Score 8.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujul2020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6390.
CVE ID: CVE-2008-6390 Date Updated: 2024-08-07T11:27:35.862Z Date Published: 2009-03-02T19:00:00 Description: SQL injection vulnerability in login.asp in Ocean12 Membership Manager Pro allows remote attackers to execute arbitrary SQL commands via the Password parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.osvdb.org/50318 - http://secunia.com/advisories/32893 - https://www.exploit-db.com/exploits/7254 - https://exchange.xforce.ibmcloud.com/vulnerabilities/46959 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21787.
CVE ID: CVE-2023-21787 Date Updated: 2024-08-02T09:51:51.084Z Date Published: 2023-01-10T00:00:00 Description: 3D Builder Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21787 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5217.
CVE ID: CVE-2024-5217 Date Updated: 2024-08-01T21:03:11.097Z Date Published: 2024-07-10T16:28:32.649Z Description: ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313 - https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293 - https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27612.
CVE ID: CVE-2023-27612 Date Updated: 2024-08-02T12:16:36.419Z Date Published: 2023-06-22T07:55:24.614Z Description: Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Paul Ryley Site Reviews plugin <= 6.5.1 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/site-reviews/wordpress-site-reviews-plugin-6-5-1-cross-site-scripting-xss-vulnerability-2?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-29167.
CVE ID: CVE-2023-29167 Date Updated: 2024-08-02T14:00:15.971Z Date Published: 2023-06-13T00:00:00 Description: Out-of-bound reads vulnerability exists in FRENIC RHC Loader v1.1.0.3. If a user opens a specially crafted FNE file, sensitive information on the system where the affected product is installed may be disclosed or arbitrary code may be executed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en - https://jvn.jp/en/vu/JVNVU97809354/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12248.
CVE ID: CVE-2019-12248 Date Updated: 2024-08-04T23:17:39.008Z Date Published: 2019-06-17T00:00:00 Description: An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.7, Community Edition 6.0.x through 6.0.19, and Community Edition 5.0.x through 5.0.36. An attacker could send a malicious email to an OTRS system. If a logged-in agent user quotes it, the email could cause the browser to load external image resources. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.otrs.com/category/release-and-security-notes-en/ - https://lists.debian.org/debian-lts-announce/2019/06/msg00004.html - http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html - https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9296.
CVE ID: CVE-2016-9296 Date Updated: 2024-08-06T02:42:11.265Z Date Published: 2016-11-12T02:19:00 Description: A null pointer dereference bug affects the 16.02 and many old versions of p7zip. A lack of null pointer check for the variable folders.PackPositions in function CInArchive::ReadAndDecodePackedStreams in CPP/7zip/Archive/7z/7zIn.cpp, as used in the 7z.so library and in 7z applications, will cause a crash and a denial of service when decoding malformed 7z files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/94294 - https://sourceforge.net/p/p7zip/bugs/185/ - https://sourceforge.net/p/p7zip/discussion/383043/thread/648d34db/ - https://github.com/yangke/7zip-null-pointer-dereference No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-13299.
CVE ID: CVE-2019-13299 Date Updated: 2024-08-04T23:49:24.506Z Date Published: 2019-07-05T00:52:07 Description: ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ImageMagick/ImageMagick/issues/1610 - https://github.com/ImageMagick/ImageMagick/commit/8187d2d8fd010d2d6b1a3a8edd935beec404dddc - http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2935.
CVE ID: CVE-2014-2935 Date Updated: 2024-08-06T10:28:46.248Z Date Published: 2014-05-08T10:00:00 Description: costview3/xmlrpc_server/xmlrpc.php in CostView in Caldera 9.20 allows remote attackers to execute arbitrary commands via shell metacharacters in a methodCall element in a PHP XMLRPC request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/67252 - http://www.kb.cert.org/vuls/id/693092 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8948.
CVE ID: CVE-2018-8948 Date Updated: 2024-09-16T23:40:44.968Z Date Published: 2018-03-23T17:00:00Z Description: In MISP before 2.4.89, app/View/Events/resolved_attributes.ctp has multiple XSS issues via a malicious MISP module. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/MISP/MISP/commit/01924cd948dbceb8391be671dab672e9f4a0ffe8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3206.
CVE ID: CVE-2008-3206 Date Updated: 2024-08-07T09:28:41.687Z Date Published: 2008-07-18T15:00:00 Description: SQL injection vulnerability in browse.groups.php in Yuhhu Pubs Black Cat allows remote attackers to execute arbitrary SQL commands via the category parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/31077 - http://www.securityfocus.com/archive/1/494319/100/0/threaded - http://www.securityfocus.com/bid/30221 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43782 - http://securityreason.com/securityalert/4008 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5665.
CVE ID: CVE-2008-5665 Date Updated: 2024-08-07T11:04:43.534Z Date Published: 2008-12-18T21:00:00 Description: SQL injection vulnerability in index.php in the xhresim module in XOOPS allows remote attackers to execute arbitrary SQL commands via the no parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/45863 - http://www.securityfocus.com/bid/31749 - https://www.exploit-db.com/exploits/6748 - http://securityreason.com/securityalert/4784 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15669.
CVE ID: CVE-2018-15669 Date Updated: 2024-08-05T10:01:54.529Z Date Published: 2018-08-21T23:00:00 Description: An issue was discovered in Bloop Airmail 3 3.5.9 for macOS. Its primary WebView instance implements "webView:decidePolicyForNavigationAction:request:frame:decisionListener:" such that requests from HTMLIFrameElements are blacklisted. However, other sub-classes of HTMLFrameOwnerElements are not forbidden by the policy. An attacker may abuse HTML plug-in elements within an email to trigger frame navigation requests that bypass this filter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://versprite.com/advisories/airmail-3-for-mac-3/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-3847.
CVE ID: CVE-2021-3847 Date Updated: 2024-08-03T17:09:09.608Z Date Published: 2022-04-01T22:17:29 Description: An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to escalate their privileges on the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=2009704 - https://www.openwall.com/lists/oss-security/2021/10/14/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-25068.
CVE ID: CVE-2019-25068 Date Updated: 2024-08-05T03:00:19.045Z Date Published: 2022-06-09T13:10:31 Description: A vulnerability classified as critical was found in Axios Italia Axios RE 1.7.0/7.0.0. This vulnerability affects unknown code of the file REDefault.aspx of the component Connection Handler. The manipulation of the argument DBIDX leads to privilege escalation. The attack can be initiated remotely. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.139528 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12129.
CVE ID: CVE-2020-12129 Date Updated: 2024-08-04T11:48:58.303Z Date Published: 2020-04-23T23:05:49 Description: The AirDisk Pro app 5.5.3 for iOS allows XSS via the createFolder parameter of the Create Folder function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vulnerability-lab.com/get_content.php?id=2203 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20243.
CVE ID: CVE-2023-20243 Date Updated: 2024-08-02T09:05:36.120Z Date Published: 2023-09-06T17:01:47.096Z Description: A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause the affected system to stop processing RADIUS packets. This vulnerability is due to improper handling of certain RADIUS accounting requests. An attacker could exploit this vulnerability by sending a crafted authentication request to a network access device (NAD) that uses Cisco ISE for authentication, authorization, and accounting (AAA). This would eventually result in the NAD sending a RADIUS accounting request packet to Cisco ISE. An attacker could also exploit this vulnerability by sending a crafted RADIUS accounting request packet to Cisco ISE directly if the RADIUS shared secret is known. A successful exploit could allow the attacker to cause the RADIUS process to unexpectedly restart, resulting in authentication or authorization timeouts and denying legitimate users access to the network or service. Clients already authenticated to the network would not be affected. Note: To recover the ability to process RADIUS packets, a manual restart of the affected Policy Service Node (PSN) may be required. For more information, see the Details ["#details"] section of this advisory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-radius-dos-W7cNn7gt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-31030.
CVE ID: CVE-2023-31030 Date Updated: 2024-08-02T14:45:24.992Z Date Published: 2024-01-12T18:31:34.210Z Description: NVIDIA DGX A100 BMC contains a vulnerability in the host KVM daemon, where an unauthenticated attacker may cause a stack overflow by sending a specially crafted network packet. A successful exploit of this vulnerability may lead to arbitrary code execution, denial of service, information disclosure, and data tampering. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nvidia.custhelp.com/app/answers/detail/a_id/5510 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26356.
CVE ID: CVE-2021-26356 Date Updated: 2024-08-03T20:26:24.804Z Date Published: 2023-05-09T18:58:48.108Z Description: A TOCTOU in ASP bootloader may allow an attacker to tamper with the SPI ROM following data read to memory potentially resulting in S3 data corruption and information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 - https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6394.
CVE ID: CVE-2013-6394 Date Updated: 2024-08-06T17:39:01.749Z Date Published: 2013-12-13T18:00:00 Description: Percona XtraBackup before 2.1.6 uses a constant string for the initialization vector (IV), which makes it easier for local users to defeat cryptographic protection mechanisms and conduct plaintext attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-updates/2013-12/msg00052.html - http://www.percona.com/doc/percona-xtrabackup/2.1/release-notes/2.1/2.1.6.html - http://lists.opensuse.org/opensuse-updates/2014-02/msg00044.html - http://www.openwall.com/lists/oss-security/2013/11/26/11 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7820.
CVE ID: CVE-2014-7820 Date Updated: 2020-11-05T22:14:17 Date Published: 2020-11-05T22:14:17 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.