instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2016-7460.
CVE ID: CVE-2016-7460 Date Updated: 2024-08-06T01:57:47.684Z Date Published: 2016-12-29T09:02:00 Description: The Single Sign-On feature in VMware vCenter Server 5.5 before U3e and 6.0 before U2a and vRealize Automation 6.x before 6.2.5 allows remote attackers to read arbitrary files or cause a denial of service via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/94485 - http://www.securitytracker.com/id/1037329 - http://www.securitytracker.com/id/1037327 - http://www.vmware.com/security/advisories/VMSA-2016-0022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1087.002 : Domain Account
Name: Domain Account ID: T1087.002 URL: https://attack.mitre.org/techniques/T1087/002 Platforms: Linux, macOS, Windows Kill Chain Phases: Discovery Description: Adversaries may attempt to get a listing of domain accounts. This information can help adversaries determine which domain accounts exist to aid in follow-on behavior such as targeting specific accounts which possess particular privileges. Commands such as `net user /domain` and `net group /domain` of the [Net](S0039) utility, `dscacheutil -q group`on macOS, and `ldapsearch` on Linux can list domain users and groups. [PowerShell](T1059.001) cmdlets including `Get-ADUser` and `Get-ADGroupMember` may enumerate members of Active Directory groups.(Citation: CrowdStrike StellarParticle January 2022) Data Sources: Process: Process Creation, Command: Command Execution, Process: OS API Execution, Network Traffic: Network Traffic Content, Group: Group Enumeration Detection: System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](T1047) and [PowerShell](T1059.001).
Provide detailed information about CVE-2022-4598.
CVE ID: CVE-2022-4598 Date Updated: 2024-08-03T01:41:45.793Z Date Published: 2022-12-18T00:00:00 Description: A vulnerability has been found in Shoplazza LifeStyle 1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/api/theme-edit/ of the component Announcement Handler. The manipulation of the argument Text/Mobile Text leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-216193 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://seclists.org/fulldisclosure/2022/Dec/11 - https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt - https://vuldb.com/?id.216193 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2116.
CVE ID: CVE-2008-2116 Date Updated: 2024-08-07T08:49:58.265Z Date Published: 2008-05-08T16:00:00 Description: Multiple directory traversal vulnerabilities in editor.php in ScriptsEZ.net Power Editor 2.0 allow remote attackers to read arbitrary local files via a .. (dot dot) in the (1) te and (2) dir parameters in a tempedit action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/29063 - https://www.exploit-db.com/exploits/5549 - https://exchange.xforce.ibmcloud.com/vulnerabilities/42222 - http://www.securityfocus.com/archive/1/491702/100/0/threaded - http://securityreason.com/securityalert/3864 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40647.
CVE ID: CVE-2023-40647 Date Updated: 2024-09-19T18:18:39.752Z Date Published: 2023-10-08T03:36:02.894Z Description: In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5324.
CVE ID: CVE-2013-5324 Date Updated: 2024-08-06T17:06:52.318Z Date Published: 2013-09-11T23:00:00 Description: Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK & Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3362, and CVE-2013-3363. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00001.html - http://www.adobe.com/support/security/bulletins/apsb13-21.html - http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00002.html - http://rhn.redhat.com/errata/RHSA-2013-1256.html - http://lists.opensuse.org/opensuse-updates/2013-09/msg00040.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1553.005 : Mark-of-the-Web Bypass
Name: Mark-of-the-Web Bypass ID: T1553.005 URL: https://attack.mitre.org/techniques/T1553/005 Platforms: Windows Kill Chain Phases: Defense Evasion Description: Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls. In Windows, when files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named `Zone.Identifier` with a specific value known as the MOTW.(Citation: Microsoft Zone.Identifier 2020) Files that are tagged with MOTW are protected and cannot perform certain actions. For example, starting in MS Office 10, if a MS Office file has the MOTW, it will open in Protected View. Executables tagged with the MOTW will be processed by Windows Defender SmartScreen that compares files with an allowlist of well-known executables. If the file is not known/trusted, SmartScreen will prevent the execution and warn the user not to run it.(Citation: Beek Use of VHD Dec 2020)(Citation: Outflank MotW 2020)(Citation: Intezer Russian APT Dec 2020) Adversaries may abuse container files such as compressed/archive (.arj, .gzip) and/or disk image (.iso, .vhd) file formats to deliver malicious payloads that may not be tagged with MOTW. Container files downloaded from the Internet will be marked with MOTW but the files within may not inherit the MOTW after the container files are extracted and/or mounted. MOTW is a NTFS feature and many container files do not support NTFS alternative data streams. After a container file is extracted and/or mounted, the files contained within them may be treated as local files on disk and run without protections.(Citation: Beek Use of VHD Dec 2020)(Citation: Outflank MotW 2020) Data Sources: File: File Metadata, File: File Creation Detection: Monitor compressed/archive and image files downloaded from the Internet as the contents may not be tagged with the MOTW. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities.(Citation: Disable automount for ISO)
Provide detailed information about CVE-2016-10878.
CVE ID: CVE-2016-10878 Date Updated: 2024-08-06T03:38:56.641Z Date Published: 2019-08-12T14:52:38 Description: The wp-google-map-plugin plugin before 3.1.2 for WordPress has XSS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/wp-google-map-plugin/#developers - https://wpvulndb.com/vulnerabilities/9741 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6189.
CVE ID: CVE-2014-6189 Date Updated: 2024-08-06T12:10:13.232Z Date Published: 2017-08-22T15:00:00 Description: Cross-site scripting (XSS) vulnerability in IBM Security Network Protection 3100, 4100, 5100, and 7100 devices with firmware 5.2 before 5.2.0.0-ISS-XGS-All-Models-Hotfix-FP0008 and 5.3 before 5.3.0.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21697248 - http://www.securityfocus.com/bid/73940 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30297.
CVE ID: CVE-2021-30297 Date Updated: 2024-08-03T22:32:40.426Z Date Published: 2021-10-20T06:31:43 Description: Possible out of bound read due to improper validation of packet length while handling data transfer in VR service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-30809.
CVE ID: CVE-2024-30809 Date Updated: 2024-08-02T01:39:00.888Z Date Published: 2024-04-02T00:00:00 Description: An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free in Ap4Sample.h in AP4_Sample::GetOffset() const, leading to a Denial of Service (DoS), as demonstrated by mp42ts. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/axiomatic-systems/Bento4/issues/937 - https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-30809 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4275.
CVE ID: CVE-2018-4275 Date Updated: 2024-08-05T05:11:22.332Z Date Published: 2019-04-03T17:43:13 Description: A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/kb/HT208938 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28110.
CVE ID: CVE-2024-28110 Date Updated: 2024-08-02T00:48:48.810Z Date Published: 2024-03-06T21:12:26.991Z Description: Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. Version 2.15.2 patches this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/cloudevents/sdk-go/security/advisories/GHSA-5pf6-2qwx-pxm2 - https://github.com/cloudevents/sdk-go/commit/de2f28370b0d2a0f64f92c0c6139fa4b8a7c3851 - https://github.com/cloudevents/sdk-go/blob/67e389964131d55d65cd14b4eb32d57a47312695/v2/protocol/http/protocol.go#L104-L110 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4974.
CVE ID: CVE-2014-4974 Date Updated: 2024-08-06T11:34:36.494Z Date Published: 2014-11-04T16:00:00 Description: The ESET Personal Firewall NDIS filter (EpFwNdis.sys) kernel mode driver, aka Personal Firewall module before Build 1212 (20140609), as used in multiple ESET products 5.0 through 7.0, allows local users to obtain sensitive information from kernel memory via crafted IOCTL calls. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-4974/ - http://seclists.org/fulldisclosure/2014/Oct/118 - http://packetstormsecurity.com/files/128874/ESET-7.0-Kernel-Memory-Leak.html - http://www.securityfocus.com/bid/70770 - https://exchange.xforce.ibmcloud.com/vulnerabilities/98312 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-25557.
CVE ID: CVE-2020-25557 Date Updated: 2024-08-04T15:33:05.689Z Date Published: 2020-11-13T15:25:13 Description: In CMSuno 1.6.2, an attacker can inject malicious PHP code as a "username" while changing his/her username & password. After that, when attacker logs in to the application, attacker's code will be run. As a result of this vulnerability, authenticated user can run command on the server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fatihhcelik.blogspot.com/2020/09/cmsuno-162-remote-code-execution.html - http://packetstormsecurity.com/files/161162/CMSUno-1.6.2-Remote-Code-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46744.
CVE ID: CVE-2021-46744 Date Updated: 2024-09-16T23:46:24.093Z Date Published: 2022-05-11T16:40:21.925600Z Description: An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033 - http://www.openwall.com/lists/oss-security/2022/08/08/6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46744.
CVE ID: CVE-2023-46744 Date Updated: 2024-09-04T15:24:18.995Z Date Published: 2023-11-07T17:22:25.951Z Description: Squidex is an open source headless CMS and content management hub. In affected versions a stored Cross-Site Scripting (XSS) vulnerability enables privilege escalation of authenticated users. The SVG element filtering mechanism intended to stop XSS attacks through uploaded SVG images, is insufficient resulting to stored XSS attacks. Squidex allows the CMS contributors to be granted the permission of uploading an SVG asset. When the asset is uploaded, a filtering mechanism is performed to validate that the SVG does not contain malicious code. The validation logic consists of traversing the HTML nodes in the DOM. In order for the validation to succeed, 2 conditions must be met: 1. No HTML tags included in a "blacklist" called "InvalidSvgElements" are present. This list only contains the element "script". and 2. No attributes of HTML tags begin with "on" (i.e. onerror, onclick) (line 65). If either of the 2 conditions is not satisfied, validation fails and the file/asset is not uploaded. However it is possible to bypass the above filtering mechanism and execute arbitrary JavaScript code by introducing other HTML elements such as an <iframe> element with a "src" attribute containing a "javascript:" value. Authenticated adversaries with the "assets.create" permission, can leverage this vulnerability to upload a malicious SVG as an asset, targeting any registered user that will attempt to open/view the asset through the Squidex CMS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Squidex/squidex/security/advisories/GHSA-xfr4-qg2v-7v5m No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-28976.
CVE ID: CVE-2020-28976 Date Updated: 2024-08-04T16:48:00.549Z Date Published: 2020-11-30T13:14:45 Description: The Canto plugin 1.3.0 for WordPress contains a blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/detail.php?subdomain=SSRF. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/CantoDAM/Canto-Wordpress-Plugin - https://www.canto.com/integrations/wordpress/ - https://wordpress.org/plugins/canto/#developers - https://gist.github.com/p4nk4jv/87aebd999ce4b28063943480e95fd9e0 - http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31151.
CVE ID: CVE-2021-31151 Date Updated: 2021-08-24T19:08:15 Date Published: 2021-08-24T19:08:15 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4899.
CVE ID: CVE-2010-4899 Date Updated: 2024-08-07T04:02:30.453Z Date Published: 2011-10-08T10:00:00 Description: SQL injection vulnerability in c.php in CMS WebManager-Pro before 8.1 allows remote attackers to execute arbitrary SQL commands via the id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/42951 - http://securityreason.com/securityalert/8438 - http://www.securityfocus.com/archive/1/513485/100/0/threaded - http://packetstormsecurity.org/1009-exploits/webmanagerpro-sql.txt - http://websecurity.com.ua/4146/ - https://exchange.xforce.ibmcloud.com/vulnerabilities/61593 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10358.
CVE ID: CVE-2017-10358 Date Updated: 2024-08-05T17:41:55.021Z Date Published: 2017-10-19T17:00:00 Description: Vulnerability in the Oracle Hyperion Financial Reporting component of Oracle Hyperion (subcomponent: Workspace). The supported version that is affected is 11.1.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hyperion Financial Reporting. While the vulnerability is in Oracle Hyperion Financial Reporting, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hyperion Financial Reporting accessible data as well as unauthorized read access to a subset of Oracle Hyperion Financial Reporting accessible data. CVSS 3.0 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1039595 - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - http://www.securityfocus.com/bid/101306 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29894.
CVE ID: CVE-2021-29894 Date Updated: 2024-09-16T20:52:47.440Z Date Published: 2021-09-30T16:20:18.227248Z Description: IBM Cloud Pak for Security (CP4S) 1.7.0.0, 1.7.1.0, 1.7.2.0, and 1.8.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 207320. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6493729 - https://exchange.xforce.ibmcloud.com/vulnerabilities/207320 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18092.
CVE ID: CVE-2018-18092 Date Updated: 2023-02-27T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18352.
CVE ID: CVE-2017-18352 Date Updated: 2024-08-05T21:20:50.363Z Date Published: 2018-12-17T06:00:00 Description: Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.chromium.org/p/chromium/issues/detail?id=759111 - https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e - https://github.com/GoogleChrome/rendertron/pull/88 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1871.
CVE ID: CVE-2018-1871 Date Updated: 2024-09-16T17:38:49.342Z Date Published: 2018-12-06T14:00:00Z Description: IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.0.0, 3.0.2, and 3.0.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 151329. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=ibm10743123 - http://www.securityfocus.com/bid/106149 - https://exchange.xforce.ibmcloud.com/vulnerabilities/151329 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-0724.
CVE ID: CVE-2022-0724 Date Updated: 2024-08-02T23:40:03.544Z Date Published: 2022-02-23T10:45:11 Description: Insecure Storage of Sensitive Information in GitHub repository microweber/microweber prior to 1.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062 - https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1190
The MITRE ATT&CK technique T1190: Exploit Public-Facing Application is related to the vulnerability CVE-CVE-2020-3387. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as exploitation_technique.
Provide detailed information about CVE-2023-28206.
CVE ID: CVE-2023-28206 Date Updated: 2024-08-02T12:30:24.667Z Date Published: 2023-04-10T00:00:00 Description: An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1, iOS 15.7.5 and iPadOS 15.7.5, macOS Big Sur 11.7.6. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213723 - https://support.apple.com/en-us/HT213725 - https://support.apple.com/en-us/HT213724 - https://support.apple.com/en-us/HT213721 - https://support.apple.com/en-us/HT213720 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17253.
CVE ID: CVE-2017-17253 Date Updated: 2024-08-05T20:44:00.120Z Date Published: 2018-04-24T15:00:00 Description: Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0054.
CVE ID: CVE-2019-0054 Date Updated: 2024-09-17T00:36:21.418Z Date Published: 2019-10-09T19:26:17.333372Z Description: An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.juniper.net/JSA10952 - https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-identification-overview.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15850.
CVE ID: CVE-2017-15850 Date Updated: 2024-09-16T23:20:46.121Z Date Published: 2018-01-10T22:00:00Z Description: In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, userspace can read values from audio codec registers. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2018-01-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5854.
CVE ID: CVE-2008-5854 Date Updated: 2024-08-07T11:04:44.738Z Date Published: 2009-01-06T17:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in login.php in myPHPscripts Login Session 2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) ls_user and (2) ls_email parameters (aka the User form) in an ls_register action. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://securityreason.com/securityalert/4873 - https://www.exploit-db.com/exploits/7526 - http://www.securityfocus.com/bid/32941 - http://secunia.com/advisories/33253 - https://exchange.xforce.ibmcloud.com/vulnerabilities/47501 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8104.
CVE ID: CVE-2019-8104 Date Updated: 2024-08-04T21:10:32.529Z Date Published: 2019-08-20T20:28:32 Description: Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-41.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-21264.
CVE ID: CVE-2022-21264 Date Updated: 2024-09-24T20:30:04.517Z Date Published: 2022-01-19T11:22:33 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujan2022.html - https://security.netapp.com/advisory/ntap-20220121-0008/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7596.
CVE ID: CVE-2014-7596 Date Updated: 2024-08-06T12:56:11.426Z Date Published: 2014-10-20T10:00:00 Description: The Paramore (aka uk.co.pixelkicks.paramore) application 2.3.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/455161 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18875.
CVE ID: CVE-2018-18875 Date Updated: 2024-08-05T11:23:08.317Z Date Published: 2019-06-18T14:29:39 Description: In firmware version MS_2.6.9900 of Columbia Weather MicroServer, a stored Cross-site scripting (XSS) vulnerability allows remote authenticated users to inject arbitrary web script via changestationname.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://applied-risk.com/labs/advisories - https://ics-cert.us-cert.gov/advisories/ICSA-19-078-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5477.
CVE ID: CVE-2015-5477 Date Updated: 2024-08-06T06:50:02.071Z Date Published: 2015-07-29T14:00:00 Description: named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html - http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04789415 - https://kb.juniper.net/JSA10783 - http://rhn.redhat.com/errata/RHSA-2015-1513.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00044.html - https://security.netapp.com/advisory/ntap-20160114-0001/ - https://kb.isc.org/article/AA-01438 - http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163015.html - http://marc.info/?l=bugtraq&m=144017354030745&w=2 - http://marc.info/?l=bugtraq&m=144294073801304&w=2 - http://rhn.redhat.com/errata/RHSA-2016-0079.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05095918 - http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718 - http://rhn.redhat.com/errata/RHSA-2015-1514.html - http://www.ubuntu.com/usn/USN-2693-1 - https://support.apple.com/kb/HT205032 - http://www.securitytracker.com/id/1033100 - https://kb.isc.org/article/AA-01307 - http://www.securityfocus.com/bid/76092 - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00045.html - http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00001.html - http://marc.info/?l=bugtraq&m=144294073801304&w=2 - https://www.exploit-db.com/exploits/37721/ - http://rhn.redhat.com/errata/RHSA-2015-1515.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00048.html - https://security.gentoo.org/glsa/201510-01 - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html - http://marc.info/?l=bugtraq&m=144181171013996&w=2 - http://marc.info/?l=bugtraq&m=144017354030745&w=2 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480 - http://www.debian.org/security/2015/dsa-3319 - http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163007.html - http://marc.info/?l=bugtraq&m=144000632319155&w=2 - http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163006.html - https://www.exploit-db.com/exploits/37723/ - https://kb.isc.org/article/AA-01305 - http://rhn.redhat.com/errata/RHSA-2016-0078.html - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html - https://kb.isc.org/article/AA-01306 - https://kc.mcafee.com/corporate/index?page=content&id=SB10126 - https://kb.isc.org/article/AA-01272 - http://marc.info/?l=bugtraq&m=144000632319155&w=2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50730.
CVE ID: CVE-2023-50730 Date Updated: 2024-08-02T22:16:47.266Z Date Published: 2023-12-22T20:36:11.402Z Description: Grackle is a GraphQL server written in functional Scala, built on the Typelevel stack. The GraphQL specification requires that GraphQL fragments must not form cycles, either directly or indirectly. Prior to Grackle version 0.18.0, that requirement wasn't checked, and queries with cyclic fragments would have been accepted for type checking and compilation. The attempted compilation of such fragments would result in a JVM `StackOverflowError` being thrown. Some knowledge of an applications GraphQL schema would be required to construct such a query, however no knowledge of any application-specific performance or other behavioural characteristics would be needed. Grackle uses the cats-parse library for parsing GraphQL queries. Prior to version 0.18.0, Grackle made use of the cats-parse `recursive` operator. However, `recursive` is not currently stack safe. `recursive` was used in three places in the parser: nested selection sets, nested input values (lists and objects), and nested list type declarations. Consequently, queries with deeply nested selection sets, input values or list types could be constructed which exploited this, causing a JVM `StackOverflowException` to be thrown during parsing. Because this happens very early in query processing, no specific knowledge of an applications GraphQL schema would be required to construct such a query. The possibility of small queries resulting in stack overflow is a potential denial of service vulnerability. This potentially affects all applications using Grackle which have untrusted users. Both stack overflow issues have been resolved in the v0.18.0 release of Grackle. As a workaround, users could interpose a sanitizing layer in between untrusted input and Grackle query processing. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/typelevel/grackle/security/advisories/GHSA-g56x-7j6w-g8r8 - https://github.com/typelevel/grackle/commit/56e244b91659cf385df590fc6c46695b6f36cbfd - https://github.com/typelevel/grackle/releases/tag/v0.18.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6529.
CVE ID: CVE-2013-6529 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1893.
CVE ID: CVE-2014-1893 Date Updated: 2024-08-06T09:58:15.946Z Date Published: 2014-04-01T01:00:00 Description: Multiple integer overflows in the (1) FLASK_GETBOOL and (2) FLASK_SETBOOL suboperations in the flask hypercall in Xen 4.1.x, 3.3.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1891, CVE-2014-1892, and CVE-2014-1894. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html - http://www.openwall.com/lists/oss-security/2014/02/10/8 - http://xenbits.xen.org/xsa/advisory-84.html - http://www.openwall.com/lists/oss-security/2014/02/07/4 - http://security.gentoo.org/glsa/glsa-201407-03.xml - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html - http://www.openwall.com/lists/oss-security/2014/02/07/12 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7401.
CVE ID: CVE-2016-7401 Date Updated: 2024-08-06T01:57:47.529Z Date Published: 2016-10-03T18:00:00 Description: The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2016/dsa-3678 - http://rhn.redhat.com/errata/RHSA-2016-2040.html - http://rhn.redhat.com/errata/RHSA-2016-2043.html - http://www.securitytracker.com/id/1036899 - http://rhn.redhat.com/errata/RHSA-2016-2041.html - https://www.djangoproject.com/weblog/2016/sep/26/security-releases/ - http://rhn.redhat.com/errata/RHSA-2016-2042.html - http://www.ubuntu.com/usn/USN-3089-1 - http://www.securityfocus.com/bid/93182 - http://rhn.redhat.com/errata/RHSA-2016-2038.html - http://rhn.redhat.com/errata/RHSA-2016-2039.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9529.
CVE ID: CVE-2014-9529 Date Updated: 2024-08-06T13:47:41.340Z Date Published: 2015-01-09T21:00:00 Description: Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html - http://www.ubuntu.com/usn/USN-2515-1 - https://exchange.xforce.ibmcloud.com/vulnerabilities/99641 - http://www.openwall.com/lists/oss-security/2015/01/06/10 - http://www.ubuntu.com/usn/USN-2512-1 - http://www.ubuntu.com/usn/USN-2514-1 - http://rhn.redhat.com/errata/RHSA-2015-1138.html - http://www.ubuntu.com/usn/USN-2518-1 - http://rhn.redhat.com/errata/RHSA-2015-0864.html - https://bugzilla.redhat.com/show_bug.cgi?id=1179813 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:058 - http://www.securityfocus.com/bid/71880 - http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html - http://www.securitytracker.com/id/1036763 - https://github.com/torvalds/linux/commit/a3a8784454692dd72e5d5d34dcdab17b4420e74c - http://www.ubuntu.com/usn/USN-2517-1 - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html - http://www.debian.org/security/2015/dsa-3128 - http://www.ubuntu.com/usn/USN-2516-1 - http://rhn.redhat.com/errata/RHSA-2015-1137.html - http://www.ubuntu.com/usn/USN-2513-1 - http://www.ubuntu.com/usn/USN-2511-1 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a3a8784454692dd72e5d5d34dcdab17b4420e74c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4188.
CVE ID: CVE-2010-4188 Date Updated: 2024-08-07T03:34:37.536Z Date Published: 2011-02-10T15:00:00 Description: The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with an IFWV chunk with a size field of 0, which is used in the calculation of a file offset and causes invalid data to be used as a loop counter, triggering a heap-based buffer overflow, a different vulnerability than CVE-2010-2587 and CVE-2010-2588. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2011/0335 - http://www.adobe.com/support/security/bulletins/apsb11-01.html - http://www.securityfocus.com/bid/46319 - http://www.securitytracker.com/id?1025056 - http://www.securityfocus.com/archive/1/516332/100/0/threaded - http://dvlabs.tippingpoint.com/advisory/TPTI-11-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4330.
CVE ID: CVE-2008-4330 Date Updated: 2024-08-07T10:08:35.103Z Date Published: 2008-09-30T17:00:00 Description: Directory traversal vulnerability in index.php in LanSuite 3.3.2 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the design parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/45583 - http://www.securityfocus.com/bid/31402 - https://www.exploit-db.com/exploits/6562 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33305.
CVE ID: CVE-2022-33305 Date Updated: 2024-08-03T08:01:20.537Z Date Published: 2023-05-02T05:08:47.586Z Description: Transient DOS due to NULL pointer dereference in Modem while sending invalid messages in DCCH. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/may-2023-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-36001.
CVE ID: CVE-2021-36001 Date Updated: 2024-09-16T16:47:55.476Z Date Published: 2021-08-20T18:10:18.437063Z Description: Adobe Character Animator version 4.2 (and earlier) is affected by an out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/in/security/products/character_animator/apsb21-59.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4634.
CVE ID: CVE-2024-4634 Date Updated: 2024-08-01T20:47:41.292Z Date Published: 2024-05-16T11:05:29.590Z Description: The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘hfe_svg_mime_types’ function in versions up to, and including, 1.6.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/f44bb823-bbf3-413b-82b5-a351609270bf?source=cve - https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.28/inc/widgets-manager/class-widgets-loader.php#L156 - https://plugins.trac.wordpress.org/changeset/3086402/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2531.
CVE ID: CVE-2010-2531 Date Updated: 2024-08-07T02:39:37.384Z Date Published: 2010-08-20T20:00:00 Description: The var_export function in PHP 5.2 before 5.2.14 and 5.3 before 5.3.3 flushes the output buffer to the user when certain fatal errors occur, even if display_errors is off, which allows remote attackers to obtain sensitive information by causing the application to exceed limits for memory, execution time, or recursion. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/kb/HT4435 - http://marc.info/?l=bugtraq&m=133469208622507&w=2 - http://marc.info/?l=bugtraq&m=130331363227777&w=2 - http://www.openwall.com/lists/oss-security/2010/07/16/3 - http://svn.php.net/viewvc/php/php-src/trunk/ext/standard/tests/general_functions/var_export_error2.phpt?view=log&pathrev=301143 - https://bugzilla.redhat.com/show_bug.cgi?id=617673 - http://www.debian.org/security/2011/dsa-2266 - http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - http://www.redhat.com/support/errata/RHSA-2010-0919.html - http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html - http://www.openwall.com/lists/oss-security/2010/07/13/1 - http://www.php.net/archive/2010.php#id2010-07-22-2 - http://marc.info/?l=bugtraq&m=133469208622507&w=2 - http://support.apple.com/kb/HT4312 - http://secunia.com/advisories/42410 - http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html - http://marc.info/?l=bugtraq&m=130331363227777&w=2 - http://www.php.net/archive/2010.php#id2010-07-22-1 - http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html - http://www.vupen.com/english/advisories/2010/3081 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40316.
CVE ID: CVE-2022-40316 Date Updated: 2024-08-03T12:14:40.203Z Date Published: 2022-09-30T16:37:12 Description: The H5P activity attempts report did not filter by groups, which in separate groups mode could reveal information to non-editing teachers about attempts/users in groups they should not have access to. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=2128151 - https://moodle.org/mod/forum/discuss.php?d=438395 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34707.
CVE ID: CVE-2024-34707 Date Updated: 2024-08-02T02:59:22.584Z Date Published: 2024-05-13T19:22:41.202Z Description: Nautobot is a Network Source of Truth and Network Automation Platform. A Nautobot user with admin privileges can modify the `BANNER_TOP`, `BANNER_BOTTOM`, and `BANNER_LOGIN` configuration settings via the `/admin/constance/config/` endpoint. Normally these settings are used to provide custom banner text at the top and bottom of all Nautobot web pages (or specifically on the login page in the case of `BANNER_LOGIN`) but it was reported that an admin user can make use of these settings to inject arbitrary HTML, potentially exposing Nautobot users to security issues such as cross-site scripting (stored XSS). The vulnerability is fixed in Nautobot 1.6.22 and 2.2.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hr-4v48-fjv3 - https://github.com/nautobot/nautobot/pull/5697 - https://github.com/nautobot/nautobot/pull/5698 - https://github.com/nautobot/nautobot/commit/4f0a66bd6307bfe0e0acb899233e0d4ad516f51c - https://github.com/nautobot/nautobot/commit/f640aedc69c848d3d1be57f0300fc40033ff6423 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-29172.
CVE ID: CVE-2022-29172 Date Updated: 2024-08-03T06:17:53.986Z Date Published: 2022-05-05T22:50:09 Description: Auth0 is an authentication broker that supports both social and enterprise identity providers, including Active Directory, LDAP, Google Apps, and Salesforce. In versions before `11.33.0`, when the “additional signup fields” feature [is configured](https://github.com/auth0/lock#additional-sign-up-fields), a malicious actor can inject invalidated HTML code into these additional fields, which is then stored in the service `user_metdata` payload (using the `name` property). Verification emails, when applicable, are generated using this metadata. It is therefor possible for an actor to craft a malicious link by injecting HTML, which is then rendered as the recipient's name within the delivered email template. You are impacted by this vulnerability if you are using `auth0-lock` version `11.32.2` or lower and are using the “additional signup fields” feature in your application. Upgrade to version `11.33.0`. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/auth0/lock/security/advisories/GHSA-7ww6-75fj-jcj7 - https://github.com/auth0/lock/commit/79ae557d331274b114848150f19832ae341771b1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8948.
CVE ID: CVE-2020-8948 Date Updated: 2024-08-04T10:12:11.004Z Date Published: 2020-04-15T15:17:23 Description: The Sierra Wireless Windows Mobile Broadband Driver Packages (MBDP) before build 5043 allows an unprivileged user to overwrite arbitrary files in arbitrary folders using hard links. An unprivileged user could leverage this vulnerability to execute arbitrary code with system privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://danishcyberdefence.dk/blog/sierra_wireless - https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---swi-psa-2020-002-cve-2020-8948/#sthash.ByZB8ifG.dpbs No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40070.
CVE ID: CVE-2022-40070 Date Updated: 2024-08-03T12:14:39.482Z Date Published: 2022-09-19T14:36:51 Description: Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via bin/httpd, function: formSetFirewallCfg. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-47080.
CVE ID: CVE-2023-47080 Date Updated: 2024-08-02T21:01:22.659Z Date Published: 2023-12-13T13:15:59.384Z Description: Adobe Substance 3D Stager versions 2.1.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/substance3d_stager/apsb23-73.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28331.
CVE ID: CVE-2023-28331 Date Updated: 2024-08-02T12:38:25.143Z Date Published: 2023-03-23T00:00:00 Description: Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=2179418 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/ - https://moodle.org/mod/forum/discuss.php?d=445063 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18791.
CVE ID: CVE-2017-18791 Date Updated: 2024-08-05T21:37:43.530Z Date Published: 2020-04-21T18:50:13 Description: Certain NETGEAR devices are affected by CSRF. This affects R6050/JR6150 before 1.0.1.7, PR2000 before 1.0.0.17, R6220 before 1.1.0.50, WNDR3700v5 before 1.1.0.48, JNR1010v2 before 1.1.0.40, JWNR2010v5 before 1.1.0.40, WNR1000v4 before 1.1.0.40, WNR2020 before 1.1.0.40, WNR2050 before 1.1.0.40, WNR614 before 1.1.0.40, WNR618 before 1.1.0.40, and D7000 before 1.0.1.50. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000049371/Security-Advisory-for-Cross-Site-Request-Forgery-Vulnerability-on-D7000-and-Some-Routers-PSV-2017-0386 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31072.
CVE ID: CVE-2021-31072 Date Updated: 2021-08-24T18:52:47 Date Published: 2021-08-24T18:52:47 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5380.
CVE ID: CVE-2018-5380 Date Updated: 2024-09-17T01:05:46.243Z Date Published: 2018-02-19T13:00:00Z Description: The Quagga BGP daemon (bgpd) prior to version 1.2.3 can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://usn.ubuntu.com/3573-1/ - https://www.debian.org/security/2018/dsa-4115 - http://savannah.nongnu.org/forum/forum.php?forum_id=9095 - https://security.gentoo.org/glsa/201804-17 - https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html - https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1550.txt - http://www.kb.cert.org/vuls/id/940439 - https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-43980.
CVE ID: CVE-2023-43980 Date Updated: 2024-09-23T16:14:23.439Z Date Published: 2023-10-02T00:00:00 Description: Presto Changeo testsitecreator up to v1.1.1 was discovered to contain a SQL injection vulnerability via the component disable_json.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.presto-changeo.com/prestashop/home/158-test-site-creator.html - https://security.friendsofpresta.org/modules/2023/09/28/testsitecreator-89.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4615.
CVE ID: CVE-2012-4615 Date Updated: 2024-08-06T20:42:54.579Z Date Published: 2012-11-27T21:00:00 Description: EMC Smarts Network Configuration Manager (NCM) before 9.1 uses a hardcoded encryption key for the storage of credentials, which allows local users to obtain sensitive information via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/87878 - http://www.securitytracker.com/id?1027812 - http://secunia.com/advisories/51408 - http://archives.neohapsis.com/archives/bugtraq/2012-11/0095.html - http://www.securityfocus.com/bid/56682 - http://packetstormsecurity.org/files/118358/EMC-Smarts-Network-Configuration-Manager-Bypass.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19880.
CVE ID: CVE-2019-19880 Date Updated: 2024-08-05T02:32:09.358Z Date Published: 2019-12-18T05:07:13 Description: exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/sqlite/sqlite/commit/75e95e1fcd52d3ec8282edb75ac8cd0814095d54 - https://security.netapp.com/advisory/ntap-20200114-0001/ - http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html - http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html - https://access.redhat.com/errata/RHSA-2020:0514 - http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html - https://www.debian.org/security/2020/dsa-4638 - https://usn.ubuntu.com/4298-1/ - https://www.oracle.com/security-alerts/cpuapr2020.html - https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4244.
CVE ID: CVE-2014-4244 Date Updated: 2024-08-06T11:12:34.089Z Date Published: 2014-07-17T10:00:00 Description: Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and JRockit R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2014/dsa-2987 - http://www-01.ibm.com/support/docview.wss?uid=swg21685178 - http://www.securityfocus.com/bid/68624 - http://secunia.com/advisories/60129 - http://secunia.com/advisories/62314 - http://secunia.com/advisories/58830 - https://exchange.xforce.ibmcloud.com/vulnerabilities/94605 - http://www-01.ibm.com/support/docview.wss?uid=swg21681966 - http://www-01.ibm.com/support/docview.wss?uid=swg21681379 - http://secunia.com/advisories/61050 - http://www.vmware.com/security/advisories/VMSA-2014-0012.html - http://marc.info/?l=bugtraq&m=140852886808946&w=2 - http://www.debian.org/security/2014/dsa-2980 - http://www.securitytracker.com/id/1030577 - http://secunia.com/advisories/61254 - http://www-01.ibm.com/support/docview.wss?uid=swg21685242 - http://secunia.com/advisories/59987 - http://secunia.com/advisories/60335 - http://www-01.ibm.com/support/docview.wss?uid=swg21683429 - http://marc.info/?l=bugtraq&m=140852886808946&w=2 - http://marc.info/?l=bugtraq&m=140852974709252&w=2 - http://secunia.com/advisories/60831 - http://secunia.com/advisories/60846 - http://secunia.com/advisories/61846 - http://secunia.com/advisories/60812 - http://secunia.com/advisories/61264 - http://secunia.com/advisories/60890 - http://secunia.com/advisories/61469 - http://www.ibm.com/support/docview.wss?uid=swg21683518 - http://www.securityfocus.com/archive/1/534161/100/0/threaded - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html - http://secunia.com/advisories/61215 - http://secunia.com/advisories/60002 - http://secunia.com/advisories/61294 - http://secunia.com/advisories/59986 - http://www-01.ibm.com/support/docview.wss?uid=swg21689593 - http://rhn.redhat.com/errata/RHSA-2015-0264.html - http://secunia.com/advisories/60245 - http://secunia.com/advisories/61417 - http://secunia.com/advisories/60817 - http://secunia.com/advisories/59924 - http://secunia.com/advisories/61577 - https://access.redhat.com/errata/RHSA-2014:0908 - http://secunia.com/advisories/61278 - http://secunia.com/advisories/60497 - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html - http://marc.info/?l=bugtraq&m=140852974709252&w=2 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - http://secunia.com/advisories/60485 - http://secunia.com/advisories/59680 - http://www-01.ibm.com/support/docview.wss?uid=swg21683438 - http://www-01.ibm.com/support/docview.wss?uid=swg21686383 - http://www-01.ibm.com/support/docview.wss?uid=swg21683484 - http://seclists.org/fulldisclosure/2014/Dec/23 - http://www-01.ibm.com/support/docview.wss?uid=swg21680334 - http://www-01.ibm.com/support/docview.wss?uid=swg21688893 - http://secunia.com/advisories/60622 - http://secunia.com/advisories/61293 - https://www.ibm.com/support/docview.wss?uid=swg21680418 - https://kc.mcafee.com/corporate/index?page=content&id=SB10083 - http://www-01.ibm.com/support/docview.wss?uid=swg21685121 - http://secunia.com/advisories/60081 - http://secunia.com/advisories/60032 - http://www-01.ibm.com/support/docview.wss?uid=swg21686142 - http://www-01.ibm.com/support/docview.wss?uid=swg21685122 - https://access.redhat.com/errata/RHSA-2014:0902 - http://secunia.com/advisories/60326 - http://secunia.com/advisories/59985 - http://secunia.com/advisories/61640 - http://www-01.ibm.com/support/docview.wss?uid=swg21683338 - http://secunia.com/advisories/59503 - http://www-01.ibm.com/support/docview.wss?uid=swg21686824 - http://security.gentoo.org/glsa/glsa-201502-12.xml - http://secunia.com/advisories/60317 - http://secunia.com/advisories/60031 - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html - http://secunia.com/advisories/59404 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33327.
CVE ID: CVE-2021-33327 Date Updated: 2024-08-03T23:50:41.434Z Date Published: 2021-08-03T18:46:02 Description: The Portlet Configuration module in Liferay Portal 7.2.0 through 7.3.3, and Liferay DXP 7.0 fix pack pack 93 and 94, 7.1 fix pack 18, and 7.2 before fix pack 8, does not properly check user permission, which allows remote authenticated users to view the Guest and User role even if "Role Visibility" is enabled. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/120747840 - https://issues.liferay.com/browse/LPE-17075 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1000217.
CVE ID: CVE-2017-1000217 Date Updated: 2024-09-16T16:53:27.170Z Date Published: 2017-11-17T22:00:00Z Description: Opencast 2.3.2 and older versions are vulnerable to script injections through media and metadata in the player and media module resulting in arbitrary code execution, fixed in 2.3.3 and 3.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://groups.google.com/a/opencast.org/forum/#%21topic/security-notices/sCpt0pIPEFg No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0957.
CVE ID: CVE-2013-0957 Date Updated: 2024-08-06T14:41:48.360Z Date Published: 2013-09-19T10:00:00 Description: Data Protection in Apple iOS before 7 allows attackers to bypass intended limits on incorrect passcode entry, and consequently avoid a configured Erase Data setting, by leveraging the presence of an app in the third-party sandbox. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1029054 - http://support.apple.com/kb/HT5934 - http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20876.
CVE ID: CVE-2018-20876 Date Updated: 2024-08-05T12:12:29.775Z Date Published: 2019-08-01T12:43:05 Description: cPanel before 74.0.8 allows self XSS in the Site Software Moderation interface (SEC-434). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://documentation.cpanel.net/display/CL/74+Change+Log No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2458.
CVE ID: CVE-2017-2458 Date Updated: 2024-08-05T13:55:05.977Z Date Published: 2017-04-02T01:36:00 Description: An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "Keyboards" component. A buffer overflow allows attackers to execute arbitrary code in a privileged context via a crafted app. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/97137 - https://support.apple.com/HT207601 - https://support.apple.com/HT207615 - http://www.securitytracker.com/id/1038138 - https://support.apple.com/HT207602 - https://support.apple.com/HT207617 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15639.
CVE ID: CVE-2018-15639 Date Updated: 2023-05-12T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1010091.
CVE ID: CVE-2019-1010091 Date Updated: 2024-08-05T03:07:18.162Z Date Published: 2019-07-17T16:35:10 Description: tinymce 4.7.11, 4.7.12 is affected by: CWE-79: Improper Neutralization of Input During Web Page Generation. The impact is: JavaScript code execution. The component is: Media element. The attack vector is: The victim must paste malicious content to media element's embed tab. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tinymce/tinymce/issues/4394 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32730.
CVE ID: CVE-2021-32730 Date Updated: 2024-08-03T23:33:55.828Z Date Published: 2021-07-01T17:30:13 Description: XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A cross-site request forgery vulnerability exists in versions prior to 12.10.5, and in versions 13.0 through 13.1. It's possible for forge an URL that, when accessed by an admin, will reset the password of any user in XWiki. The problem has been patched in XWiki 12.10.5 and 13.2RC1. As a workaround, it is possible to apply the patch manually by modifying the `register_macros.vm` template. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v9j2-q4q5-cxh4 - https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257 - https://jira.xwiki.org/browse/XWIKI-18315 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-23375.
CVE ID: CVE-2022-23375 Date Updated: 2024-08-03T03:36:20.404Z Date Published: 2022-02-19T15:43:09 Description: WikiDocs version 0.1.18 has an authenticated remote code execution vulnerability. An attacker can upload a malicious file using the image upload form through index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wikidocs.it/ - https://demo.wikidocs.it/ - https://github.com/Zavy86/WikiDocs - https://github.com/Zavy86/WikiDocs/issues/28 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39873.
CVE ID: CVE-2021-39873 Date Updated: 2024-08-04T02:20:33.651Z Date Published: 2021-10-04T16:43:24 Description: In all versions of GitLab CE/EE, there exists a content spoofing vulnerability which may be leveraged by attackers to trick users into visiting a malicious website by spoofing the content in an error response. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab/-/issues/27241 - https://hackerone.com/reports/504961 - https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39873.json No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-13294.
CVE ID: CVE-2019-13294 Date Updated: 2024-08-04T23:49:24.798Z Date Published: 2019-07-04T22:09:54 Description: AROX School-ERP Pro has a command execution vulnerability. import_stud.php and upload_fille.php do not have session control. Therefore an unauthenticated user can execute a command on the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/46999 - http://www.pentest.com.tr/exploits/AROX-School-ERP-Pro-Unauthenticated-RCE-Metasploit.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5596.
CVE ID: CVE-2016-5596 Date Updated: 2024-08-06T01:07:58.971Z Date Published: 2016-10-25T14:00:00 Description: Unspecified vulnerability in the Oracle CRM Technical Foundation component in Oracle E-Business Suite 12.1.1 through 12.1.3 and 12.2.3 through 12.2.6 allows remote authenticated users to affect confidentiality via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/93762 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - http://www.securitytracker.com/id/1037038 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41711.
CVE ID: CVE-2023-41711 Date Updated: 2024-09-13T15:38:30.661Z Date Published: 2023-10-17T22:20:36.619Z Description: SonicOS post-authentication Stack-Based Buffer Overflow Vulnerability in the sonicwall.exp, prefs.exp URL endpoints lead to a firewall crash. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-10019.
CVE ID: CVE-2020-10019 Date Updated: 2024-09-17T02:12:14.643Z Date Published: 2020-05-11T22:26:11.452886Z Description: USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25 - https://github.com/zephyrproject-rtos/zephyr/pull/23190 - https://github.com/zephyrproject-rtos/zephyr/pull/23457 - https://github.com/zephyrproject-rtos/zephyr/pull/23460 - https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10019 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3852.
CVE ID: CVE-2023-3852 Date Updated: 2024-08-02T07:08:50.411Z Date Published: 2023-07-23T22:00:04.288Z Description: A vulnerability was found in OpenRapid RapidCMS up to 1.3.1. It has been declared as critical. This vulnerability affects unknown code of the file /admin/upload.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-235204. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.235204 - https://vuldb.com/?ctiid.235204 - https://github.com/OpenRapid/rapidcms/issues/1 - https://github.com/OpenRapid/rapidcms/commit/4dff387283060961c362d50105ff8da8ea40bcbe No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30793.
CVE ID: CVE-2021-30793 Date Updated: 2024-08-03T22:40:32.190Z Date Published: 2021-09-08T13:49:12 Description: A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. An application may be able to execute arbitrary code with kernel privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT212602 - https://support.apple.com/en-us/HT212600 - https://support.apple.com/en-us/HT212603 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7759.
CVE ID: CVE-2018-7759 Date Updated: 2024-08-05T06:37:57.979Z Date Published: 2018-04-18T20:00:00 Description: A buffer overflow vulnerability exists in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200. The buffer overflow vulnerability is caused by the length of the source string specified (instead of the buffer size) as the number of bytes to be copied. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.schneider-electric.com/en/download/document/SEVD-2018-081-02/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47330.
CVE ID: CVE-2021-47330 Date Updated: 2024-09-11T17:33:52.086Z Date Published: 2024-05-21T14:35:41.789Z Description: In the Linux kernel, the following vulnerability has been resolved: tty: serial: 8250: serial_cs: Fix a memory leak in error handling path In the probe function, if the final 'serial_config()' fails, 'info' is leaking. Add a resource handling path to free this memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c - https://git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc - https://git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584 - https://git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461 - https://git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67 - https://git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32 - https://git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2 - https://git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5 - https://git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11901.
CVE ID: CVE-2018-11901 Date Updated: 2021-11-23T19:58:56 Date Published: 2021-11-23T19:58:56 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27479.
CVE ID: CVE-2021-27479 Date Updated: 2024-08-03T20:48:17.358Z Date Published: 2021-06-16T12:16:36 Description: ZOLL Defibrillator Dashboard, v prior to 2.2,The affected product’s web application could allow a low privilege user to inject parameters to contain malicious scripts to be executed by higher privilege users. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://us-cert.cisa.gov/ics/advisories/icsma-21-161-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7830.
CVE ID: CVE-2020-7830 Date Updated: 2024-09-16T18:13:01.375Z Date Published: 2020-09-02T19:10:09.309227Z Description: RAONWIZ v2018.0.2.50 and earlier versions contains a vulnerability that could allow remote files to be downloaded by lack of validation. Vulnerabilities in downloading with Kupload agent allow files to be downloaded to arbitrary paths due to insufficient verification of extensions and download paths. This issue affects: RAONWIZ RAON KUpload 2018.0.2.50 versions and earlier. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35582 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33668.
CVE ID: CVE-2021-33668 Date Updated: 2024-08-03T23:58:22.420Z Date Published: 2021-06-09T12:02:26 Description: Due to improper input sanitization, specially crafted LDAP queries can be injected by an unauthenticated user. This could partially impact the confidentiality of the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/SAP/scimono/security/advisories/GHSA-wg9g-w4fg-3qqc No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1529 : System Shutdown/Reboot
Name: System Shutdown/Reboot ID: T1529 URL: https://attack.mitre.org/techniques/T1529 Platforms: Linux, macOS, Windows, Network Kill Chain Phases: Impact Description: Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating systems may contain commands to initiate a shutdown/reboot of a machine or network device. In some cases, these commands may also be used to initiate a shutdown/reboot of a remote computer or network device via [Network Device CLI](T1059.008) (e.g. `reload`).(Citation: Microsoft Shutdown Oct 2017)(Citation: alert_TA18_106A) Shutting down or rebooting systems may disrupt access to computer resources for legitimate users while also impeding incident response/recovery. Adversaries may attempt to shutdown/reboot a system after impacting it in other ways, such as [Disk Structure Wipe](T1561.002) or [Inhibit System Recovery](T1490), to hasten the intended effects on system availability.(Citation: Talos Nyetya June 2017)(Citation: Talos Olympic Destroyer 2018) Data Sources: Process: Process Creation, Sensor Health: Host Status, Command: Command Execution Detection: Use process monitoring to monitor the execution and command line parameters of binaries involved in shutting down or rebooting systems. Windows event logs may also designate activity associated with a shutdown/reboot, ex. Event ID 1074 and 6006. Unexpected or unauthorized commands from network cli on network devices may also be associated with shutdown/reboot, e.g. the `reload` command.
Provide detailed information about CVE-2020-8125.
CVE ID: CVE-2020-8125 Date Updated: 2024-08-04T09:48:25.907Z Date Published: 2020-02-04T19:08:56 Description: Flaw in input validation in npm package klona version 1.1.0 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using klona. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/778414 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27659.
CVE ID: CVE-2020-27659 Date Updated: 2024-09-17T04:00:17.636Z Date Published: 2020-11-30T09:30:15.481484Z Description: Multiple cross-site scripting (XSS) vulnerabilities in Synology SafeAccess before 1.2.3-0234 allow remote attackers to inject arbitrary web script or HTML via the (1) domain or (2) profile parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.synology.com/security/advisory/Synology_SA_20_25 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1087 - https://github.com/thomasfady/Synology_SA_20_25 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7469.
CVE ID: CVE-2018-7469 Date Updated: 2024-08-05T06:24:11.963Z Date Published: 2018-02-28T15:00:00 Description: PHP Scripts Mall Entrepreneur Job Portal Script 2.0.9 has XSS via the p_name (aka Edit Category Name) field to admin/categories_industry.php (aka Categories - Industry Type). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://neetech18.blogspot.in/2018/02/stored-xss-vulnerability-in-php-scripts.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7606.
CVE ID: CVE-2016-7606 Date Updated: 2024-08-06T02:04:55.622Z Date Published: 2017-02-20T08:35:00 Description: An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT207487 - https://support.apple.com/HT207422 - http://www.securityfocus.com/bid/94905 - http://www.securitytracker.com/id/1037469 - https://support.apple.com/HT207423 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4083.
CVE ID: CVE-2016-4083 Date Updated: 2024-08-06T00:17:31.171Z Date Published: 2016-04-25T10:00:00 Description: epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.3 does not ensure that data is available before array allocation, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1035685 - http://www.wireshark.org/security/wnpa-sec-2016-27.html - https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=66417b17b3570b163a16ca81f71ce5bcb10548d2 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12341 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1138.
CVE ID: CVE-2012-1138 Date Updated: 2024-08-06T18:45:27.576Z Date Published: 2012-04-25T10:00:00 Description: FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/48797 - http://secunia.com/advisories/48508 - http://secunia.com/advisories/48822 - http://www.mandriva.com/security/advisories?name=MDVSA-2012:057 - http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html - http://support.apple.com/kb/HT5503 - http://www.securityfocus.com/bid/52318 - http://www.ubuntu.com/usn/USN-1403-1 - https://bugzilla.mozilla.org/show_bug.cgi?id=733512 - http://secunia.com/advisories/48918 - http://www.openwall.com/lists/oss-security/2012/03/06/16 - http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html - http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html - http://secunia.com/advisories/48973 - http://www.mozilla.org/security/announce/2012/mfsa2012-21.html - http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html - http://www.securitytracker.com/id?1026765 - http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html - http://secunia.com/advisories/48951 - https://bugzilla.redhat.com/show_bug.cgi?id=800597 - http://security.gentoo.org/glsa/glsa-201204-04.xml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40684.
CVE ID: CVE-2022-40684 Date Updated: 2024-08-03T12:21:46.541Z Date Published: 2022-10-18T00:00:00 Description: An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/psirt/FG-IR-22-377 - http://packetstormsecurity.com/files/169431/Fortinet-FortiOS-FortiProxy-FortiSwitchManager-Authentication-Bypass.html - http://packetstormsecurity.com/files/171515/Fortinet-7.2.1-Authentication-Bypass.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20584.
CVE ID: CVE-2018-20584 Date Updated: 2024-08-05T12:05:17.688Z Date Published: 2018-12-30T05:00:00 Description: JasPer 2.0.14 allows remote attackers to cause a denial of service (application hang) via an attempted conversion to the jp2 format. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.debian.org/debian-lts-announce/2019/01/msg00003.html - http://www.securityfocus.com/bid/106356 - https://github.com/mdadams/jasper/issues/192 - https://security.gentoo.org/glsa/201908-03 - https://www.oracle.com/security-alerts/cpuapr2020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26208.
CVE ID: CVE-2024-26208 Date Updated: 2024-08-01T23:59:32.833Z Date Published: 2024-04-09T17:00:59.823Z Description: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26208 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-27614.
CVE ID: CVE-2022-27614 Date Updated: 2024-09-17T03:48:14.077Z Date Published: 2022-07-28T06:55:12.139529Z Description: Exposure of sensitive information to an unauthorized actor vulnerability in web server in Synology Media Server before 1.8.1-2876 allows remote attackers to obtain sensitive information via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.synology.com/security/advisory/Synology_SA_20_24 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2043.
CVE ID: CVE-2014-2043 Date Updated: 2024-08-06T09:58:16.236Z Date Published: 2014-03-13T14:00:00 Description: SQL injection vulnerability in Resources/System/Templates/Data.aspx in Procentia IntelliPen before 1.1.18.1658 allows remote authenticated users to execute arbitrary SQL commands via the value parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2014/Mar/103 - http://www.securityfocus.com/archive/1/531426/100/0/threaded - https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2043 - http://www.exploit-db.com/exploits/32212 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11719.
CVE ID: CVE-2019-11719 Date Updated: 2024-08-04T23:03:32.425Z Date Published: 2019-07-23T13:17:46 Description: When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2019-21/ - https://www.mozilla.org/security/advisories/mfsa2019-22/ - https://www.mozilla.org/security/advisories/mfsa2019-23/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1540541 - http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html - http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html - https://access.redhat.com/errata/RHSA-2019:1951 - https://security.gentoo.org/glsa/201908-12 - https://security.gentoo.org/glsa/201908-20 - http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html - http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html - http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html - https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6774.
CVE ID: CVE-2017-6774 Date Updated: 2024-09-17T03:49:16.049Z Date Published: 2017-08-17T20:00:00Z Description: A vulnerability in Cisco ASR 5000 Series Aggregated Services Routers running the Cisco StarOS operating system could allow an authenticated, remote attacker to overwrite or modify sensitive system files. The vulnerability is due to the inclusion of sensitive system files within specific FTP subdirectories. An attacker could exploit this vulnerability by overwriting sensitive configuration files through FTP. An exploit could allow the attacker to overwrite configuration files on an affected system. Cisco Bug IDs: CSCvd47739. Known Affected Releases: 21.0.v0.65839. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-staros2 - http://www.securityfocus.com/bid/100386 - http://www.securitytracker.com/id/1039182 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4333.
CVE ID: CVE-2023-4333 Date Updated: 2024-09-24T14:43:56.277Z Date Published: 2023-08-15T18:25:37.222Z Description: Broadcom RAID Controller web interface doesn’t enforce SSL cipher ordering by server No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.broadcom.com/support/resources/product-security-center No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1122.
CVE ID: CVE-2008-1122 Date Updated: 2024-08-07T08:08:57.595Z Date Published: 2008-03-03T22:00:00 Description: SQL injection vulnerability in the downloads module in Koobi Pro 5.7 allows remote attackers to execute arbitrary SQL commands via the categ parameter to index.php. NOTE: it was later reported that this also affects Koobi CMS 4.2.4, 4.2.5, and 4.3.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/40903 - https://www.exploit-db.com/exploits/5198 - http://www.securityfocus.com/bid/28031 - http://www.securityfocus.com/archive/1/490886/100/0/threaded - https://www.exploit-db.com/exploits/5447 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.