instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2020-12817.
CVE ID: CVE-2020-12817 Date Updated: 2024-08-04T12:04:22.897Z Date Published: 2020-09-24T13:31:29 Description: An improper neutralization of input vulnerability in FortiAnalyzer before 6.4.1 and 6.2.5 may allow a remote authenticated attacker to inject script related HTML tags via Name parameter of Storage Connectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/advisory/FG-IR-20-054 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16152.
CVE ID: CVE-2020-16152 Date Updated: 2024-08-04T13:37:54.220Z Date Published: 2021-11-14T20:08:26 Description: The NetConfig UI administrative interface in Extreme Networks ExtremeWireless Aerohive HiveOS and IQ Engine through 10.0r8a allows attackers to execute PHP code as the root user via remote HTTP requests that insert this code into a log file and then traverse to that file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gtacknowledge.extremenetworks.com/articles/Vulnerability_Notice/VN-2020-001 - http://packetstormsecurity.com/files/164957/Aerohive-NetConfig-10.0r8a-Local-File-Inclusion-Remote-Code-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0513.
CVE ID: CVE-2014-0513 Date Updated: 2024-08-06T09:20:19.339Z Date Published: 2014-05-14T10:00:00 Description: Stack-based buffer overflow in Adobe Illustrator CS6 before 16.0.5 and 16.2.x before 16.2.2 allows remote attackers to execute arbitrary code via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://helpx.adobe.com/security/products/illustrator/apsb14-11.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30957.
CVE ID: CVE-2022-30957 Date Updated: 2024-08-03T07:03:39.880Z Date Published: 2022-05-17T14:06:27 Description: A missing permission check in Jenkins SSH Plugin 2.6.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2315 - http://www.openwall.com/lists/oss-security/2022/05/17/8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20005.
CVE ID: CVE-2021-20005 Date Updated: 2022-02-09T15:25:13 Date Published: 2022-02-09T15:25:13 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15542.
CVE ID: CVE-2019-15542 Date Updated: 2024-08-05T00:49:13.754Z Date Published: 2019-08-26T17:10:15 Description: An issue was discovered in the ammonia crate before 2.1.0 for Rust. There is uncontrolled recursion during HTML DOM tree serialization. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://rustsec.org/advisories/RUSTSEC-2019-0001.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-37425.
CVE ID: CVE-2021-37425 Date Updated: 2024-08-04T01:16:03.969Z Date Published: 2021-08-10T21:16:31 Description: Altova MobileTogether Server before 7.3 SP1 allows XXE attacks, such as an InfoSetChanges/Changes attack against /workflowmanagement, or reading mobiletogetherserver.cfg and then reading the certificate and private key. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses - https://www.redteam-pentesting.de/advisories/rt-sa-2021-002 - https://www.altova.com/mobiletogether - http://seclists.org/fulldisclosure/2021/Aug/12 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39434.
CVE ID: CVE-2024-39434 Date Updated: 2024-09-27T15:36:16.117Z Date Published: 2024-09-27T07:37:43.831Z Description: In drm service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.unisoc.com/en_us/secy/announcementDetail/1830802995705610241 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0178.
CVE ID: CVE-2021-0178 Date Updated: 2024-08-03T15:32:09.929Z Date Published: 2022-02-09T22:04:33 Description: Improper input validation in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4549.
CVE ID: CVE-2019-4549 Date Updated: 2024-09-16T22:36:36.724Z Date Published: 2019-10-02T14:45:30.435064Z Description: IBM Security Directory Server 6.4.0 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 165951. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/1077045 - https://exchange.xforce.ibmcloud.com/vulnerabilities/165951 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1983.
CVE ID: CVE-2011-1983 Date Updated: 2024-08-06T22:46:00.923Z Date Published: 2011-12-14T00:00:00 Description: Use-after-free vulnerability in Microsoft Office 2007 SP2 and SP3, Office 2010 Gold and SP1, and Office for Mac 2011 allows remote attackers to execute arbitrary code via a crafted Word document, aka "Word Use After Free Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14558 - http://www.us-cert.gov/cas/techalerts/TA11-347A.html - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-089 - http://www.securitytracker.com/id?1026409 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14197 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1540.
CVE ID: CVE-2008-1540 Date Updated: 2024-08-07T08:24:42.620Z Date Published: 2008-03-28T18:00:00 Description: SQL injection vulnerability in the Datsogallery (com_datsogallery) 1.3.1 module for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/28361 - https://exchange.xforce.ibmcloud.com/vulnerabilities/41348 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6410.
CVE ID: CVE-2008-6410 Date Updated: 2024-08-07T11:27:35.850Z Date Published: 2009-03-06T11:00:00 Description: Directory traversal vulnerability in show.php in ol'bookmarks manager 0.7.5 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the show parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/6543 - http://secunia.com/advisories/31706 - http://www.securityfocus.com/bid/31348 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1463.
CVE ID: CVE-2010-1463 Date Updated: 2024-08-07T01:28:40.694Z Date Published: 2010-04-16T19:00:00 Description: Multiple SQL injection vulnerabilities in WebAsyst Shop-Script FREE allow attackers to execute arbitrary SQL commands via the (1) add2cart, (2) c_id, (3) categoryID, (4) list_price, (5) name, (6) new_offer, (7) price, (8) product_code, (9) productID, (10) rating, and (11) save_product parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/510741/100/0/threaded - http://www.vupen.com/english/advisories/2010/0882 - http://www.vupen.com/english/research-web.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5413.
CVE ID: CVE-2008-5413 Date Updated: 2024-08-07T10:56:45.856Z Date Published: 2008-12-10T00:00:00 Description: PerfServlet in the PMI/Performance Tools component in IBM WebSphere Application Server (WAS) 7 before 7.0.0.1 allows attackers to obtain sensitive information by reading the (1) systemout.log and (2) ffdc files. NOTE: this is probably a duplicate of CVE-2009-0434. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2008/3370 - http://www.securityfocus.com/bid/32679 - http://www-01.ibm.com/support/docview.wss?uid=swg27014463 - http://www-1.ibm.com/support/docview.wss?uid=swg1PK63886 - http://www.vupen.com/english/advisories/2009/0423 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0095.
CVE ID: CVE-2018-0095 Date Updated: 2024-08-05T03:14:16.648Z Date Published: 2018-01-18T06:00:00 Description: A vulnerability in the administrative shell of Cisco AsyncOS on Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) could allow an authenticated, local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a privilege level of a guest user. The vulnerability is due to an incorrect networking configuration at the administrative shell CLI. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a set of crafted, malicious commands at the administrative shell. An exploit could allow the attacker to gain root access on the device. Cisco Bug IDs: CSCvb34303, CSCvb35726. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1040221 - http://www.securitytracker.com/id/1040222 - http://www.securityfocus.com/bid/102729 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-esasma No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0133.
CVE ID: CVE-2008-0133 Date Updated: 2024-08-07T07:32:23.912Z Date Published: 2008-01-08T19:00:00 Description: Multiple SQL injection vulnerabilities in Tribisur 2.1 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to cat_main.php and the (2) cat parameter to forum.php in a liste action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/28362 - https://exchange.xforce.ibmcloud.com/vulnerabilities/39443 - https://www.exploit-db.com/exploits/4840 - http://www.securityfocus.com/bid/27149 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1921.
CVE ID: CVE-2014-1921 Date Updated: 2024-08-06T09:58:16.165Z Date Published: 2014-02-14T15:00:00 Description: parcimonie before 0.8.1, when using a large keyring, sleeps for the same amount of time between fetches, which allows attackers to correlate key fetches via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gaffer.ptitcanardnoir.org/intrigeri/files/parcimonie/App-Parcimonie-0.8.1.tar.gz - http://seclists.org/oss-sec/2014/q1/308 - http://www.debian.org/security/2014/dsa-2860 - https://exchange.xforce.ibmcloud.com/vulnerabilities/91118 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738134 - http://www.securityfocus.com/bid/65505 - http://seclists.org/oss-sec/2014/q1/305 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7154.
CVE ID: CVE-2014-7154 Date Updated: 2024-08-06T12:40:19.112Z Date Published: 2014-10-02T14:00:00 Description: Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/61501 - http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html - http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140483.html - http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html - http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140418.html - http://www.debian.org/security/2014/dsa-3041 - http://xenbits.xen.org/xsa/advisory-104.html - http://secunia.com/advisories/61890 - http://security.gentoo.org/glsa/glsa-201412-42.xml - http://www.securitytracker.com/id/1030887 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2274.
CVE ID: CVE-2013-2274 Date Updated: 2024-08-06T15:27:41.143Z Date Published: 2013-03-20T16:00:00 Description: Puppet 2.6.x before 2.6.18 and Puppet Enterprise 1.2.x before 1.2.7 allows remote authenticated users to execute arbitrary code on the puppet master, or an agent with puppet kick enabled, via a crafted request for a report. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html - http://rhn.redhat.com/errata/RHSA-2013-0710.html - http://www.debian.org/security/2013/dsa-2643 - http://www.securityfocus.com/bid/58447 - https://puppetlabs.com/security/cve/cve-2013-2274/ - http://secunia.com/advisories/52596 - http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4280.
CVE ID: CVE-2019-4280 Date Updated: 2024-09-17T03:12:33.328Z Date Published: 2019-09-30T15:20:31.101283Z Description: IBM Sterling File Gateway 2.2.0.0 through 6.0.1.0 displays sensitive information in HTTP requests which could be used in further attacks against the system. IBM X-Force ID: 160503. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/957207 - https://exchange.xforce.ibmcloud.com/vulnerabilities/160503 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14561.
CVE ID: CVE-2019-14561 Date Updated: 2023-02-28T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20650.
CVE ID: CVE-2018-20650 Date Updated: 2024-08-05T12:05:17.794Z Date Published: 2019-01-01T16:00:00 Description: A reachable Object::dictLookup assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to the lack of a check for the dict data type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in pdfdetach. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.freedesktop.org/poppler/poppler/issues/704 - https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7 - http://www.securityfocus.com/bid/106459 - https://usn.ubuntu.com/3865-1/ - https://access.redhat.com/errata/RHSA-2019:2022 - https://access.redhat.com/errata/RHSA-2019:2713 - https://lists.debian.org/debian-lts-announce/2019/09/msg00033.html - https://lists.debian.org/debian-lts-announce/2020/11/msg00014.html - https://lists.debian.org/debian-lts-announce/2022/09/msg00030.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-23872.
CVE ID: CVE-2020-23872 Date Updated: 2024-08-04T15:05:11.388Z Date Published: 2021-11-10T21:25:49 Description: A NULL pointer dereference in the function TextPage::restoreState of pdf2xml v2.0 allows attackers to cause a denial of service (DoS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/kermitt2/pdf2xml/issues/10 - https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-45355.
CVE ID: CVE-2022-45355 Date Updated: 2024-08-03T14:09:56.662Z Date Published: 2023-03-29T18:35:28.901Z Description: Auth. (admin+) SQL Injection (SQLi) vulnerability in ThimPress WP Pipes plugin <= 1.33 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/wp-pipes/wordpress-wp-pipes-plugin-1-33-auth-sql-injection-sqli-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46502.
CVE ID: CVE-2023-46502 Date Updated: 2024-09-09T20:14:16.484Z Date Published: 2023-10-30T00:00:00 Description: An issue in openCRX v.5.2.2 allows a remote attacker to read internal files and execute server side request forgery attack via insecure DocumentBuilderFactory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/opencrx/opencrx/commit/ce7a71db0bb34ecbcb0e822d40598e410a48b399 - https://gist.github.com/spookhorror/9519fc66d3946e887e4a86c06ddbee0e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6466.
CVE ID: CVE-2012-6466 Date Updated: 2024-09-17T04:00:05.679Z Date Published: 2013-01-02T11:00:00Z Description: Opera before 12.10 does not properly handle incorrect size data in a WebP image, which allows remote attackers to obtain potentially sensitive information from process memory by using a crafted image as the fill pattern for a canvas. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.opera.com/support/kb/view/1035/ - http://www.opera.com/docs/changelogs/unified/1210/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10796.
CVE ID: CVE-2018-10796 Date Updated: 2024-08-05T07:46:46.714Z Date Published: 2018-05-07T14:00:00 Description: In 2345 Security Guard 3.7, the driver file (2345NetFirewall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x00222014. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345NetFirewall.sys-0x00222014 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-23659.
CVE ID: CVE-2022-23659 Date Updated: 2024-08-03T03:51:45.973Z Date Published: 2022-05-16T19:24:30 Description: A remote reflected cross site scripting (xss) vulnerability was discovered in Aruba ClearPass Policy Manager version(s): 6.10.4 and below, 6.9.9 and below, 6.8.9-HF2 and below, 6.7.x and below. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-007.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29221.
CVE ID: CVE-2021-29221 Date Updated: 2024-08-03T22:02:51.425Z Date Published: 2021-04-09T13:34:59 Description: A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation's directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with "erlsrv.exe" to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/erlang/otp/releases/tag/OTP-23.2.3 - https://deepsurface.com/deepsurface-security-advisory-local-privilege-escalation-in-erlang-on-windows-cve-2021-29221/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-17632.
CVE ID: CVE-2018-17632 Date Updated: 2024-08-05T10:54:10.512Z Date Published: 2019-01-24T04:00:00 Description: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the resolveNode event. The issue results from the lack of validation of the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6700. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.foxitsoftware.com/support/security-bulletins.php - https://www.zerodayinitiative.com/advisories/ZDI-18-1207/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21436.
CVE ID: CVE-2021-21436 Date Updated: 2024-09-17T04:00:11.454Z Date Published: 2021-02-08T10:55:20.229135Z Description: Agents are able to see and link Config Items without permissions, which are defined in General Catalog. This issue affects: OTRS AG OTRSCIsInCustomerFrontend 7.0.x version 7.0.14 and prior versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://otrs.com/release-notes/otrs-security-advisory-2021-04/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0989.
CVE ID: CVE-2010-0989 Date Updated: 2024-08-07T01:06:52.697Z Date Published: 2010-03-26T18:00:00 Description: Directory traversal vulnerability in delete.php in Pulse CMS before 1.2.3 allows remote authenticated users to delete arbitrary files via directory traversal sequences in the f parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.osvdb.org/63167 - http://www.securityfocus.com/archive/1/510307/100/0/threaded - http://secunia.com/secunia_research/2010-48/ - http://www.securityfocus.com/bid/38947 - http://secunia.com/advisories/39011 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7343.
CVE ID: CVE-2019-7343 Date Updated: 2024-09-16T22:09:01.257Z Date Published: 2019-02-04T19:00:00Z Description: Reflected - Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'newMonitor[Method]' parameter value in the view monitor (monitor.php) because proper filtration is omitted. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ZoneMinder/zoneminder/issues/2464 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11231.
CVE ID: CVE-2019-11231 Date Updated: 2024-08-04T22:48:09.013Z Date Published: 2019-05-22T17:05:50 Description: An issue was discovered in GetSimple CMS through 3.3.15. insufficient input sanitation in the theme-edit.php file allows upload of files with arbitrary content (PHP code, for example). This vulnerability is triggered by an authenticated user; however, authentication can be bypassed. According to the official documentation for installation step 10, an admin is required to upload all the files, including the .htaccess files, and run a health check. However, what is overlooked is that the Apache HTTP Server by default no longer enables the AllowOverride directive, leading to data/users/admin.xml password exposure. The passwords are hashed but this can be bypassed by starting with the data/other/authorization.xml API key. This allows one to target the session state, since they decided to roll their own implementation. The cookie_name is crafted information that can be leaked from the frontend (site name and version). If a someone leaks the API key and the admin username, then they can bypass authentication. To do so, they need to supply a cookie based on an SHA-1 computation of this known information. The vulnerability exists in the admin/theme-edit.php file. This file checks for forms submissions via POST requests, and for the csrf nonce. If the nonce sent is correct, then the file provided by the user is uploaded. There is a path traversal allowing write access outside the jailed themes directory root. Exploiting the traversal is not necessary because the .htaccess file is ignored. A contributing factor is that there isn't another check on the extension before saving the file, with the assumption that the parameter content is safe. This allows the creation of web accessible and executable files with arbitrary content. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ssd-disclosure.com/?p=3899&preview=true - http://packetstormsecurity.com/files/152961/GetSimpleCMS-3.3.15-Remote-Code-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-25520.
CVE ID: CVE-2021-25520 Date Updated: 2024-08-03T20:11:27.015Z Date Published: 2021-12-08T14:20:15 Description: Insecure caller check and input validation vulnerabilities in SearchKeyword deeplink logic prior to Samsung Internet 16.0.2 allows unstrusted applications to execute script codes in Samsung Internet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=12 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26999.
CVE ID: CVE-2022-26999 Date Updated: 2024-08-03T05:18:39.261Z Date Published: 2022-03-15T21:56:31 Description: Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the static ip settings function via the wan_ip_stat, wan_mask_stat, wan_gw_stat, and wan_dns1_stat parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_8/8.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16088.
CVE ID: CVE-2020-16088 Date Updated: 2024-08-04T13:37:54.200Z Date Published: 2020-07-28T11:46:41 Description: iked in OpenIKED, as used in OpenBSD through 6.7, allows authentication bypass because ca.c has the wrong logic for checking whether a public key matches. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.openiked.org/security.html - https://github.com/xcllnt/openiked/commits/master - https://ftp.openbsd.org/pub/OpenBSD/patches/6.7/common/014_iked.patch.sig - https://github.com/openbsd/src/commit/7afb2d41c6d373cf965285840b85c45011357115 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43923.
CVE ID: CVE-2022-43923 Date Updated: 2024-08-03T13:40:06.871Z Date Published: 2023-02-24T14:13:01.313Z Description: IBM Maximo Application Suite 8.8.0 and 8.9.0 stores potentially sensitive information that could be read by a local user. IBM X-Force ID: 241584. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6957654 - https://exchange.xforce.ibmcloud.com/vulnerabilities/241584 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4077.
CVE ID: CVE-2016-4077 Date Updated: 2024-08-06T00:17:30.668Z Date Published: 2016-04-25T10:00:00 Description: epan/reassemble.c in TShark in Wireshark 2.0.x before 2.0.3 relies on incorrect special-case handling of truncated Tvb data structures, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1035685 - https://code.google.com/p/google-security-research/issues/detail?id=651 - https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c5b2c1e8f40cee913bd70fcc00284483b3c92fcd - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11799 - http://www.wireshark.org/security/wnpa-sec-2016-20.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15780.
CVE ID: CVE-2020-15780 Date Updated: 2024-08-04T13:22:30.716Z Date Published: 2020-07-15T21:24:16 Description: An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh - https://www.openwall.com/lists/oss-security/2020/06/15/3 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7 - http://www.openwall.com/lists/oss-security/2020/07/20/7 - http://www.openwall.com/lists/oss-security/2020/07/29/3 - http://www.openwall.com/lists/oss-security/2020/07/30/3 - http://www.openwall.com/lists/oss-security/2020/07/30/2 - https://usn.ubuntu.com/4425-1/ - https://usn.ubuntu.com/4439-1/ - https://usn.ubuntu.com/4426-1/ - https://usn.ubuntu.com/4440-1/ - http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html - http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52536.
CVE ID: CVE-2023-52536 Date Updated: 2024-08-22T16:45:45.934Z Date Published: 2024-04-08T02:21:40.495Z Description: In faceid service, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.unisoc.com/en_us/secy/announcementDetail/1777148475750809602 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7340.
CVE ID: CVE-2014-7340 Date Updated: 2024-08-06T12:47:32.820Z Date Published: 2014-10-19T10:00:00 Description: The Old Bike Mart (aka com.magazinecloner.oldbike) application @7F08017E for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/197409 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38315.
CVE ID: CVE-2024-38315 Date Updated: 2024-09-16T15:16:30.485Z Date Published: 2024-09-16T15:05:49.347Z Description: IBM Aspera Shares 1.0 through 1.10.0 PL3 does not invalidate session after a password reset which could allow an authenticated user to impersonate another user on the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7168379 - https://exchange.xforce.ibmcloud.com/vulnerabilities/294742 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11422.
CVE ID: CVE-2017-11422 Date Updated: 2024-08-05T18:12:39.441Z Date Published: 2017-07-24T12:00:00 Description: Statamic framework before 2.6.0 does not correctly check a session's permissions when the methods from a user's class are called. Problematic methods include reset password, create new account, create new role, etc. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/rambo691/3714c8c09cf894d574d37c294711c49e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-24562.
CVE ID: CVE-2023-24562 Date Updated: 2024-08-02T11:03:18.854Z Date Published: 2023-02-14T10:36:40.716Z Description: A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-29041.
CVE ID: CVE-2022-29041 Date Updated: 2024-08-03T06:10:58.714Z Date Published: 2022-04-12T19:50:36 Description: Jenkins Jira Plugin 3.7 and earlier, except 3.6.1, does not escape the name and description of Jira Issue and Jira Release Version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3500.
CVE ID: CVE-2020-3500 Date Updated: 2024-09-17T03:13:38.418Z Date Published: 2020-08-17T18:00:26.607744Z Description: A vulnerability in the IPv6 implementation of Cisco StarOS could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet to an affected device with the goal of reaching the vulnerable section of the input buffer. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr5k-ipv6-dos-ce3zhF8m No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47155.
CVE ID: CVE-2021-47155 Date Updated: 2024-08-29T16:48:45.929Z Date Published: 2024-03-18T00:00:00 Description: The Net::IPV4Addr module 0.10 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/#net-ipv4addrhttpsmetacpanorgreleasenet-ipv4addr - https://metacpan.org/release/Net-IPv4Addr No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36055.
CVE ID: CVE-2024-36055 Date Updated: 2024-08-20T13:58:53.581Z Date Published: N/A Description: Hw64.sys in Marvin Test HW.exe before 5.0.5.0 allows unprivileged user-mode processes to arbitrarily map physical memory with read/write access via the MmMapIoSpace API (IOCTL 0x9c40a4f8, 0x9c40a4e8, 0x9c40a4c0, 0x9c40a4c4, 0x9c40a4ec, and seven others), leading to a denial of service (BSOD). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.marvintest.com/Downloads.aspx?prodId=12&search=package - https://www.marvintest.com/KnowledgeBase/KBArticle.aspx?ID=362 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32864.
CVE ID: CVE-2022-32864 Date Updated: 2024-08-03T07:54:03.162Z Date Published: 2022-09-20T00:00:00 Description: The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An app may be able to disclose kernel memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213446 - https://support.apple.com/en-us/HT213443 - https://support.apple.com/en-us/HT213445 - https://support.apple.com/en-us/HT213444 - https://support.apple.com/kb/HT213488 - https://support.apple.com/kb/HT213486 - https://support.apple.com/kb/HT213487 - http://seclists.org/fulldisclosure/2022/Oct/41 - http://seclists.org/fulldisclosure/2022/Oct/28 - http://seclists.org/fulldisclosure/2022/Oct/39 - http://seclists.org/fulldisclosure/2022/Oct/40 - http://seclists.org/fulldisclosure/2022/Oct/49 - http://seclists.org/fulldisclosure/2022/Oct/43 - http://seclists.org/fulldisclosure/2022/Oct/45 - http://seclists.org/fulldisclosure/2022/Oct/47 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0563.
CVE ID: CVE-2014-0563 Date Updated: 2024-08-06T09:20:19.888Z Date Published: 2014-09-17T10:00:00 Description: Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to cause a denial of service (memory corruption) via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/95998 - http://helpx.adobe.com/security/products/reader/apsb14-20.html - http://www.securityfocus.com/bid/69826 - http://www.securitytracker.com/id/1030853 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0867.
CVE ID: CVE-2009-0867 Date Updated: 2024-08-07T04:48:52.613Z Date Published: 2009-03-10T14:00:00 Description: The HRM-S service in Fujitsu Enhanced Support Facility 3.0 and 3.0.1 allows remote attackers to obtain (1) hardware and (2) software information via unspecified requests in a client connection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/48817 - http://www.securityfocus.com/bid/33831 - http://secunia.com/advisories/33974 - http://www.fujitsu.com/global/support/software/security/products-f/esf-200901e.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52670.
CVE ID: CVE-2023-52670 Date Updated: 2024-08-02T23:11:34.486Z Date Published: 2024-05-17T14:02:01.617Z Description: In the Linux kernel, the following vulnerability has been resolved: rpmsg: virtio: Free driver_override when rpmsg_remove() Free driver_override when rpmsg_remove(), otherwise the following memory leak will occur: unreferenced object 0xffff0000d55d7080 (size 128): comm "kworker/u8:2", pid 56, jiffies 4294893188 (age 214.272s) hex dump (first 32 bytes): 72 70 6d 73 67 5f 6e 73 00 00 00 00 00 00 00 00 rpmsg_ns........ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000009c94c9c1>] __kmem_cache_alloc_node+0x1f8/0x320 [<000000002300d89b>] __kmalloc_node_track_caller+0x44/0x70 [<00000000228a60c3>] kstrndup+0x4c/0x90 [<0000000077158695>] driver_set_override+0xd0/0x164 [<000000003e9c4ea5>] rpmsg_register_device_override+0x98/0x170 [<000000001c0c89a8>] rpmsg_ns_register_device+0x24/0x30 [<000000008bbf8fa2>] rpmsg_probe+0x2e0/0x3ec [<00000000e65a68df>] virtio_dev_probe+0x1c0/0x280 [<00000000443331cc>] really_probe+0xbc/0x2dc [<00000000391064b1>] __driver_probe_device+0x78/0xe0 [<00000000a41c9a5b>] driver_probe_device+0xd8/0x160 [<000000009c3bd5df>] __device_attach_driver+0xb8/0x140 [<0000000043cd7614>] bus_for_each_drv+0x7c/0xd4 [<000000003b929a36>] __device_attach+0x9c/0x19c [<00000000a94e0ba8>] device_initial_probe+0x14/0x20 [<000000003c999637>] bus_probe_device+0xa0/0xac No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/229ce47cbfdc7d3a9415eb676abbfb77d676cb08 - https://git.kernel.org/stable/c/dd50fe18c234bd5ff22f658f4d414e8fa8cd6a5d - https://git.kernel.org/stable/c/69ca89d80f2c8a1f5af429b955637beea7eead30 - https://git.kernel.org/stable/c/2d27a7b19cb354c6d04bcdc9239e261ff29858d6 - https://git.kernel.org/stable/c/f4bb1d5daf77b1a95a43277268adf0d1430c2346 - https://git.kernel.org/stable/c/4e6cef3fae5c164968118a13f3fe293700adc81a - https://git.kernel.org/stable/c/9a416d624e5fb7246ea97c11fbfea7e0e27abf43 - https://git.kernel.org/stable/c/d5362c37e1f8a40096452fc201c30e705750e687 - https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1499.004
The MITRE ATT&CK technique T1499.004: Application or System Exploitation is related to the vulnerability CVE-CVE-2018-8414. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2015-8928.
CVE ID: CVE-2015-8928 Date Updated: 2024-08-06T08:36:30.350Z Date Published: 2016-09-20T14:00:00 Description: The process_add_entry function in archive_read_support_format_mtree.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mtree file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ubuntu.com/usn/USN-3033-1 - http://rhn.redhat.com/errata/RHSA-2016-1844.html - http://www.securityfocus.com/bid/91337 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html - http://www.openwall.com/lists/oss-security/2016/06/17/2 - https://security.gentoo.org/glsa/201701-03 - http://www.openwall.com/lists/oss-security/2016/06/17/5 - http://www.debian.org/security/2016/dsa-3657 - https://github.com/libarchive/libarchive/issues/550 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11546.
CVE ID: CVE-2020-11546 Date Updated: 2024-08-04T11:35:13.184Z Date Published: 2020-07-14T19:16:21 Description: SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.to.com/advisory-superwebmailer-cve-2020-11546/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-51470.
CVE ID: CVE-2023-51470 Date Updated: 2024-08-02T22:32:10.306Z Date Published: 2023-12-29T12:55:43.526Z Description: Deserialization of Untrusted Data vulnerability in Jacques Malgrange Rencontre – Dating Site.This issue affects Rencontre – Dating Site: from n/a through 3.11.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/rencontre/wordpress-rencontre-plugin-3-11-1-authenticated-php-object-injection-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9777.
CVE ID: CVE-2020-9777 Date Updated: 2024-08-04T10:43:04.500Z Date Published: 2020-04-01T17:55:44 Description: An issue existed in the selection of video file by Mail. The issue was fixed by selecting the latest version of a video. This issue is fixed in iOS 13.4 and iPadOS 13.4. Cropped videos may not be shared properly via Mail. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT211102 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20524.
CVE ID: CVE-2018-20524 Date Updated: 2024-09-17T03:18:30.301Z Date Published: 2018-12-27T17:00:00Z Description: The Chat Anywhere extension 2.4.0 for Chrome allows XSS via crafted use of <<a> in a message, because a danmuWrapper DIV element in chatbox-only\danmu.js is outside the scope of a Content Security Policy (CSP). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vul.su.ki/posts/Chat_Anywhere_2.4.0_XSS.md/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1312.
CVE ID: CVE-2024-1312 Date Updated: 2024-08-01T18:33:25.383Z Date Published: 2024-02-08T12:38:03.062Z Description: A use-after-free flaw was found in the Linux kernel's Memory Management subsystem when a user wins two races at the same time with a fail in the mas_prev_slot function. This issue could allow a local user to crash the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/security/cve/CVE-2024-1312 - https://bugzilla.redhat.com/show_bug.cgi?id=2225569 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/mm/memory.c?h=v6.8-rc3&id=657b5146955eba331e01b9a6ae89ce2e716ba306 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8132.
CVE ID: CVE-2015-8132 Date Updated: 2015-11-25T15:57:01 Date Published: 2015-11-25T16:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2286.
CVE ID: CVE-2010-2286 Date Updated: 2024-08-07T02:25:07.679Z Date Published: 2010-06-15T01:00:00 Description: The SigComp Universal Decompressor Virtual Machine dissector in Wireshark 0.10.7 through 1.0.13 and 1.2.0 through 1.2.8 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html - http://www.wireshark.org/security/wnpa-sec-2010-05.html - http://secunia.com/advisories/43068 - http://www.vupen.com/english/advisories/2011/0212 - http://www.wireshark.org/security/wnpa-sec-2010-06.html - http://www.openwall.com/lists/oss-security/2010/06/11/1 - http://secunia.com/advisories/42877 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - http://www.vupen.com/english/advisories/2011/0076 - http://secunia.com/advisories/40112 - http://www.securityfocus.com/bid/40728 - http://www.vupen.com/english/advisories/2010/1418 - http://www.mandriva.com/security/advisories?name=MDVSA-2010:113 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11792 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-51518.
CVE ID: CVE-2023-51518 Date Updated: 2024-08-22T20:42:38.254Z Date Published: 2024-02-27T09:09:31.579Z Description: Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to pre-authentication deserialisation of untrusted data. Given a deserialisation gadjet, this could be leveraged as part of an exploit chain that could result in privilege escalation. Note that by default JMX endpoint is only bound locally. We recommend users to:  - Upgrade to a non-vulnerable Apache James version  - Run Apache James isolated from other processes (docker - dedicated virtual machine)  - If possible turn off JMX No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/wbdm61ch6l0kzjn6nnfmyqlng82qz0or No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24871.
CVE ID: CVE-2022-24871 Date Updated: 2024-08-03T04:29:00.197Z Date Published: 2022-04-20T19:05:11 Description: Shopware is an open commerce platform based on Symfony Framework and Vue. In affected versions an attacker can abuse the Admin SDK functionality on the server to read or update internal resources. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/shopware/platform/security/advisories/GHSA-7gm7-8q8v-9gf2 - https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c - https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38509.
CVE ID: CVE-2023-38509 Date Updated: 2024-08-02T17:46:55.866Z Date Published: 2023-07-27T18:53:31.259Z Description: XWiki Platform is a generic wiki platform. In org.xwiki.platform:xwiki-platform-livetable-ui starting with version 3.5-milestone-1 and prior to versions 14.10.9 and 15.3-rc-1, the mail obfuscation configuration was not fully taken into account and is was still possible by obfuscated emails. This has been patched in XWiki 14.10.9 and XWiki 15.3-rc-1. A workaround is to modify the page `XWiki.LiveTableResultsMacros` following the patch. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g9w4-prf3-m25g - https://github.com/xwiki/xwiki-platform/commit/1dfb6804d4d412794cbe0098d4972b8ac263df0 - https://github.com/xwiki/xwiki-platform/commit/1dfb6804d4d412794cbe0098d4972b8ac263df0c - https://jira.xwiki.org/browse/XWIKI-20601 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1229.
CVE ID: CVE-2024-1229 Date Updated: 2024-08-01T18:33:25.170Z Date Published: 2024-05-09T20:03:25.268Z Description: The SimpleShop plugin for WordPress is vulnerable to unauthorized disconnection from SimpleShop due to a missing capability check on the maybe_disconnect_simpleshop function in all versions up to, and including, 2.10.2. This makes it possible for unauthenticated attackers to disconnect the SimpleShop. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/4dc39c47-3b99-4e43-b25d-a025f3d228b5?source=cve - https://plugins.trac.wordpress.org/browser/simpleshop-cz/trunk/src/Settings.php?rev=3019145#L341 - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3080151%40simpleshop-cz&new=3080151%40simpleshop-cz&sfp_email=&sfph_mail= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5066.
CVE ID: CVE-2008-5066 Date Updated: 2024-08-07T10:40:17.050Z Date Published: 2008-11-13T17:00:00 Description: PHP remote file inclusion vulnerability in upload/admin/frontpage_right.php in Agares Media ThemeSiteScript 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the loadadminpage parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/6859 - http://www.vupen.com/english/advisories/2008/2959 - http://www.securityfocus.com/bid/31959 - http://securityreason.com/securityalert/4592 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13777.
CVE ID: CVE-2018-13777 Date Updated: 2024-08-05T09:14:47.112Z Date Published: 2018-07-09T06:00:00 Description: The mintToken function of a smart contract implementation for RRToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/BlockChainsSecurity/EtherTokens/tree/master/RRToken - https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-22725.
CVE ID: CVE-2024-22725 Date Updated: 2024-08-01T22:51:10.935Z Date Published: 2024-01-24T00:00:00 Description: Orthanc versions before 1.12.2 are affected by a reflected cross-site scripting (XSS) vulnerability. The vulnerability was present in the server's error reporting. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://orthanc.uclouvain.be/hg/orthanc/rev/505416b269a0 - https://orthanc.uclouvain.be/hg/orthanc/file/Orthanc-1.12.2/NEWS No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-20296.
CVE ID: CVE-2024-20296 Date Updated: 2024-08-01T21:59:41.103Z Date Published: 2024-07-17T16:28:22.193Z Description: A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit this vulnerability, an attacker would need at least valid Policy Admin credentials on the affected device. This vulnerability is due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit this vulnerability by uploading arbitrary files to an affected device. A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-krW2TxA9 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-44750.
CVE ID: CVE-2021-44750 Date Updated: 2024-08-04T04:32:13.070Z Date Published: 2022-03-09T11:38:29 Description: An arbitrary code execution vulnerability was found in the F-Secure Support Tool. A standard user can craft a special configuration file, which when run by administrator can execute any commands. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.f-secure.com/en/business/support-and-downloads/security-advisories - https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-44750 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-22061.
CVE ID: CVE-2023-22061 Date Updated: 2024-09-13T16:37:11.612Z Date Published: 2023-07-18T20:18:40.221Z Description: Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Visual Analyzer). The supported version that is affected is 6.4.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujul2023.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2020-12000
CVE-CVE-2020-12000 is a vulnerability in Ignition 8 Gateway. It is related to the MITRE ATT&CK technique T1133: External Remote Services. The vulnerability is classified as a exploitation_technique type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2015-5961.
CVE ID: CVE-2015-5961 Date Updated: 2024-08-06T07:06:34.908Z Date Published: 2015-08-08T00:00:00 Description: The COPPA error page in the Accounts setup dialog in Mozilla Firefox OS before 2.2 embeds content from an external web server URL into the System process, which allows man-in-the-middle attackers to bypass intended access restrictions by spoofing that server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1123433 - http://www.securityfocus.com/bid/76255 - http://www.mozilla.org/security/announce/2015/mfsa2015-75.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-45503.
CVE ID: CVE-2021-45503 Date Updated: 2024-08-04T04:39:21.197Z Date Published: 2021-12-26T01:02:51 Description: Certain NETGEAR devices are affected by authentication bypass. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000064127/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0474 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38075.
CVE ID: CVE-2023-38075 Date Updated: 2024-08-02T17:30:13.592Z Date Published: 2023-09-12T09:32:19.039Z Description: A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application contains a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-20842) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf - https://cert-portal.siemens.com/productcert/pdf/ssa-478780.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8944.
CVE ID: CVE-2016-8944 Date Updated: 2024-08-06T02:35:02.355Z Date Published: 2017-02-15T19:00:00 Description: IBM AIX 7.1 and 7.2 allows a local user to open a file with a specially crafted argument that would crash the system. IBM APARs: IV91488, IV91487, IV91456, IV90234. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc - http://www.securitytracker.com/id/1037759 - http://www.securityfocus.com/bid/95888 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30357.
CVE ID: CVE-2021-30357 Date Updated: 2024-08-03T22:32:40.631Z Date Published: 2021-06-08T13:31:53 Description: SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://supportcontent.checkpoint.com/solutions?id=sk173513 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0210.
CVE ID: CVE-2009-0210 Date Updated: 2024-08-07T04:24:18.324Z Date Published: 2009-02-08T22:00:00 Description: Buffer overflow in the MLF application in AREVA e-terrahabitat 5.7 and earlier allows remote attackers to execute arbitrary commands or cause a denial of service (system crash) via unspecified vectors, aka PD28578. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/500689/100/0/threaded - http://secunia.com/advisories/33837 - http://www.securityfocus.com/bid/33637 - http://www.kb.cert.org/vuls/id/337569 - http://www.scada-security.com/vulnerabilities/areva1.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2019-15976
CVE-CVE-2019-15976 is a vulnerability in Cisco Data Center Network Manager. It is related to the MITRE ATT&CK technique T1068: Exploitation for Privilege Escalation. The vulnerability is classified as a primary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2019 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2017-11765.
CVE ID: CVE-2017-11765 Date Updated: 2024-09-17T01:17:06.395Z Date Published: 2017-10-13T13:00:00Z Description: The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11784, CVE-2017-11785, and CVE-2017-11814. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1039526 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11765 - http://www.securityfocus.com/bid/101111 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5828.
CVE ID: CVE-2016-5828 Date Updated: 2024-08-06T01:15:10.708Z Date Published: 2016-06-27T10:00:00 Description: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ubuntu.com/usn/USN-3070-1 - http://www.openwall.com/lists/oss-security/2016/06/25/7 - http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html - https://patchwork.ozlabs.org/patch/636776/ - http://rhn.redhat.com/errata/RHSA-2016-2574.html - http://www.ubuntu.com/usn/USN-3070-3 - http://www.ubuntu.com/usn/USN-3070-2 - http://www.ubuntu.com/usn/USN-3071-1 - http://www.debian.org/security/2016/dsa-3616 - http://www.ubuntu.com/usn/USN-3070-4 - http://www.securityfocus.com/bid/91415 - http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html - http://www.ubuntu.com/usn/USN-3071-2 - http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5993.
CVE ID: CVE-2018-5993 Date Updated: 2024-08-05T05:47:56.231Z Date Published: 2018-02-17T07:00:00 Description: SQL Injection exists in the Aist through 2.0 component for Joomla! via the id parameter in a view=showvacancy request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exploit-db.com/exploits/44106 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0414.
CVE ID: CVE-2010-0414 Date Updated: 2024-08-07T00:45:12.273Z Date Published: 2010-02-11T20:00:00 Description: gnome-screensaver before 2.28.2 allows physically proximate attackers to bypass screen locking and access an unattended workstation by moving the mouse position to an external monitor and then disconnecting that monitor. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/38468 - http://www.osvdb.org/62219 - http://www.securityfocus.com/bid/38149 - http://www.ubuntu.com/usn/USN-898-1 - http://secunia.com/advisories/38532 - https://bugzilla.redhat.com/show_bug.cgi?id=562217 - http://git.gnome.org/browse/gnome-screensaver/commit/?id=a5f66339be6719c2b8fc478a1d5fc6545297d950 - http://secunia.com/advisories/38534 - http://git.gnome.org/browse/gnome-screensaver/commit/?id=dcca89b7ab6e1220815af38da246434b2e13fd9f - http://www.mandriva.com/security/advisories?name=MDVSA-2010:040 - https://bugzilla.gnome.org/show_bug.cgi?id=609337 - http://ftp.gnome.org/pub/GNOME/sources/gnome-screensaver/2.28/gnome-screensaver-2.28.2.news - http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034904.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23645.
CVE ID: CVE-2024-23645 Date Updated: 2024-08-01T23:06:25.359Z Date Published: 2024-02-01T15:24:57.438Z Description: GLPI is a Free Asset and IT Management Software package. A malicious URL can be used to execute XSS on reports pages. Upgrade to 10.0.12. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/glpi-project/glpi/security/advisories/GHSA-2gj5-qpff-ff3x - https://github.com/glpi-project/glpi/commit/6cf265936c4f6edf7dea7c78b12e46d75b94d9b0 - https://github.com/glpi-project/glpi/commit/fc1f6da9d158933b870ff374ed3a50ae98dcef4a - https://github.com/glpi-project/glpi/releases/tag/10.0.12 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3813.
CVE ID: CVE-2022-3813 Date Updated: 2024-08-03T01:20:58.490Z Date Published: 2022-11-01T00:00:00 Description: A vulnerability classified as problematic has been found in Axiomatic Bento4. This affects an unknown part of the component mp4edit. The manipulation leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212679. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/axiomatic-systems/Bento4/issues/792 - https://github.com/axiomatic-systems/Bento4/files/9726974/POC_mp4edit_728838793.zip - https://vuldb.com/?id.212679 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1895.
CVE ID: CVE-2024-1895 Date Updated: 2024-08-08T18:16:01.402Z Date Published: 2024-04-30T08:32:22.449Z Description: The Event Monster – Event Management, Tickets Booking, Upcoming Event plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.4 via deserialization via shortcode of untrusted input from a custom meta value. This makes it possible for authenticated attackers, with contributor access and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/41d7b3f1-a133-4678-b2d9-3f9951cbc005?source=cve - https://plugins.trac.wordpress.org/browser/event-monster/tags/1.3.3/shortcode.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21033.
CVE ID: CVE-2023-21033 Date Updated: 2024-08-02T09:21:34.109Z Date Published: 2023-03-24T00:00:00 Description: In addNetwork of WifiManager.java, there is a possible way to trigger a persistent DoS due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-244713323 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2023-03-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4567.
CVE ID: CVE-2016-4567 Date Updated: 2024-08-06T00:32:26.013Z Date Published: 2016-05-22T01:00:00 Description: Cross-site scripting (XSS) vulnerability in flash/FlashMediaElement.as in MediaElement.js before 2.21.0, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via an obfuscated form of the jsinitfunction parameter, as demonstrated by "jsinitfunctio%gn." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/johndyer/mediaelement/blob/master/changelog.md - http://www.openwall.com/lists/oss-security/2016/05/07/2 - https://codex.wordpress.org/Version_4.5.2 - http://www.securitytracker.com/id/1035818 - https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c - https://github.com/johndyer/mediaelement/commit/34834eef8ac830b9145df169ec22016a4350f06e - https://wpvulndb.com/vulnerabilities/8488 - https://wordpress.org/news/2016/05/wordpress-4-5-2/ - https://core.trac.wordpress.org/changeset/37371 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27851.
CVE ID: CVE-2020-27851 Date Updated: 2024-08-04T16:25:43.806Z Date Published: 2021-01-20T03:14:39 Description: Multiple stored HTML injection vulnerabilities in the "poll" and "quiz" features in an additional paid add-on of Rocketgenius Gravity Forms before 2.4.21 allows remote attackers to inject arbitrary HTML code via poll or quiz answers. This code is interpreted by users in a privileged role (Administrator, Editor, etc.). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.digital.security/advisories/cert-ds_advisory_cve-2020-27851.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33898.
CVE ID: CVE-2021-33898 Date Updated: 2024-08-04T00:05:52.264Z Date Published: 2021-06-06T22:28:22 Description: In Invoice Ninja before 4.4.0, there is an unsafe call to unserialize() in app/Ninja/Repositories/AccountRepository.php that may allow an attacker to deserialize arbitrary PHP classes. In certain contexts, this can result in remote code execution. The attacker's input must be hosted at http://www.geoplugin.net (cleartext HTTP), and thus a successful attack requires spoofing that site or obtaining control of it. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/invoiceninja/invoiceninja/issues/5909 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32038.
CVE ID: CVE-2023-32038 Date Updated: 2024-08-02T15:03:28.917Z Date Published: 2023-07-11T17:02:27.289Z Description: Microsoft ODBC Driver Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32038 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-37504.
CVE ID: CVE-2021-37504 Date Updated: 2024-08-04T01:22:59.369Z Date Published: 2022-02-25T18:15:47 Description: A cross-site scripting (XSS) vulnerability in the fileNameStr parameter of jQuery-Upload-File v4.0.11 allows attackers to execute arbitrary web scripts or HTML via a crafted file with a Javascript payload in the file name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js - http://hayageek.github.io/jQuery-Upload-File/4.0.11/jquery.uploadfile.min.js - http://hayageek.github.io/jQuery-Upload-File/4.0.11/uploadfile.css - http://haygeek.com - http://jquery-upload-file.com - https://github.com/hayageek/jquery-upload-file/blob/master/js/jquery.uploadfile.js#L469 - https://raw.githubusercontent.com/hayageek/jquery-upload-file/master/js/jquery.uploadfile.js No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15114.
CVE ID: CVE-2017-15114 Date Updated: 2024-08-05T19:50:16.095Z Date Published: 2017-11-27T16:00:00 Description: When libvirtd is configured by OSP director (tripleo-heat-templates) to use the TLS transport it defaults to the same certificate authority as all non-libvirtd services. As no additional authentication is configured this allows these services to connect to libvirtd (which is equivalent to root access). If a vulnerability exists in another service it could, combined with this flaw, be exploited to escalate privileges to gain control over compute nodes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.openstack.org/cgit/openstack/tripleo-heat-templates/commit/?id=994922a8ba996fe68d047df0e1486fa805dbea31 - http://www.securityfocus.com/bid/101971 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-26982.
CVE ID: CVE-2020-26982 Date Updated: 2024-08-04T16:03:23.179Z Date Published: 2021-01-12T20:18:34 Description: A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing CG4 and CGM files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11898) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf - https://www.zerodayinitiative.com/advisories/ZDI-21-052/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2196.
CVE ID: CVE-2018-2196 Date Updated: 2019-01-22T17:57:02 Date Published: 2019-01-22T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15471.
CVE ID: CVE-2019-15471 Date Updated: 2024-08-05T00:49:13.595Z Date Published: 2019-11-14T16:27:47 Description: The Xiaomi Mi Mix 2S Android device with a build fingerprint of Xiaomi/polaris/polaris:8.0.0/OPR1.170623.032/V9.5.19.0.ODGMIFA:user/release-keys contains a pre-installed app with a package name of com.qualcomm.qti.callenhancement app (versionCode=27, versionName=8.1.0) that allows other pre-installed apps to perform microphone audio recording via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that export their capabilities to other pre-installed app. This app allows a third-party app to use its open interface to record telephone calls to external storage. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.kryptowire.com/android-firmware-2019/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26251.
CVE ID: CVE-2022-26251 Date Updated: 2024-08-03T04:56:37.866Z Date Published: 2022-04-06T00:22:47 Description: The HTTP interface of Synaman v5.1 and below was discovered to allow authenticated attackers to execute arbitrary code and escalate privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://synaman.com - http://synametrics.com - https://www.bencteux.fr/posts/synaman/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15814.
CVE ID: CVE-2019-15814 Date Updated: 2024-08-05T00:56:22.474Z Date Published: 2019-09-04T13:50:05 Description: Multiple stored XSS vulnerabilities in Sentrifugo 3.2 could allow authenticated users to inject arbitrary web script or HTML. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/47324 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.