instruction stringlengths 49 63 ⌀ | input stringlengths 0 69 | output stringlengths 221 18.7k |
|---|---|---|
Provide detailed information about CVE-2016-7460. | CVE ID: CVE-2016-7460
Date Updated: 2024-08-06T01:57:47.684Z
Date Published: 2016-12-29T09:02:00
Description:
The Single Sign-On feature in VMware vCenter Server 5.5 before U3e and 6.0 before U2a and vRealize Automation 6.x before 6.2.5 allows remote attackers to read arbitrary files or cause a denial of service via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/94485
- http://www.securitytracker.com/id/1037329
- http://www.securitytracker.com/id/1037327
- http://www.vmware.com/security/advisories/VMSA-2016-0022.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide information about the following MITRE ATT&CK technique: | T1087.002 : Domain Account | Name: Domain Account
ID: T1087.002
URL: https://attack.mitre.org/techniques/T1087/002
Platforms: Linux, macOS, Windows
Kill Chain Phases: Discovery
Description: Adversaries may attempt to get a listing of domain accounts. This information can help adversaries determine which domain accounts exist to aid in follow-on behavior such as targeting specific accounts which possess particular privileges.
Commands such as `net user /domain` and `net group /domain` of the [Net](S0039) utility, `dscacheutil -q group`on macOS, and `ldapsearch` on Linux can list domain users and groups. [PowerShell](T1059.001) cmdlets including `Get-ADUser` and `Get-ADGroupMember` may enumerate members of Active Directory groups.(Citation: CrowdStrike StellarParticle January 2022)
Data Sources: Process: Process Creation, Command: Command Execution, Process: OS API Execution, Network Traffic: Network Traffic Content, Group: Group Enumeration
Detection: System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.
Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as [Windows Management Instrumentation](T1047) and [PowerShell](T1059.001).
|
Provide detailed information about CVE-2022-4598. | CVE ID: CVE-2022-4598
Date Updated: 2024-08-03T01:41:45.793Z
Date Published: 2022-12-18T00:00:00
Description:
A vulnerability has been found in Shoplazza LifeStyle 1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/api/theme-edit/ of the component Announcement Handler. The manipulation of the argument Text/Mobile Text leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-216193 was assigned to this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://seclists.org/fulldisclosure/2022/Dec/11
- https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt
- https://vuldb.com/?id.216193
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-2116. | CVE ID: CVE-2008-2116
Date Updated: 2024-08-07T08:49:58.265Z
Date Published: 2008-05-08T16:00:00
Description:
Multiple directory traversal vulnerabilities in editor.php in ScriptsEZ.net Power Editor 2.0 allow remote attackers to read arbitrary local files via a .. (dot dot) in the (1) te and (2) dir parameters in a tempedit action.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/29063
- https://www.exploit-db.com/exploits/5549
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42222
- http://www.securityfocus.com/archive/1/491702/100/0/threaded
- http://securityreason.com/securityalert/3864
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-40647. | CVE ID: CVE-2023-40647
Date Updated: 2024-09-19T18:18:39.752Z
Date Published: 2023-10-08T03:36:02.894Z
Description:
In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-5324. | CVE ID: CVE-2013-5324
Date Updated: 2024-08-06T17:06:52.318Z
Date Published: 2013-09-11T23:00:00
Description:
Adobe Flash Player before 11.7.700.242 and 11.8.x before 11.8.800.168 on Windows and Mac OS X, before 11.2.202.310 on Linux, before 11.1.111.73 on Android 2.x and 3.x, and before 11.1.115.81 on Android 4.x; Adobe AIR before 3.8.0.1430; and Adobe AIR SDK & Compiler before 3.8.0.1430 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3361, CVE-2013-3362, and CVE-2013-3363.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00001.html
- http://www.adobe.com/support/security/bulletins/apsb13-21.html
- http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2013-1256.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00040.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide information about the following MITRE ATT&CK technique: | T1553.005 : Mark-of-the-Web Bypass | Name: Mark-of-the-Web Bypass
ID: T1553.005
URL: https://attack.mitre.org/techniques/T1553/005
Platforms: Windows
Kill Chain Phases: Defense Evasion
Description: Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls. In Windows, when files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named `Zone.Identifier` with a specific value known as the MOTW.(Citation: Microsoft Zone.Identifier 2020) Files that are tagged with MOTW are protected and cannot perform certain actions. For example, starting in MS Office 10, if a MS Office file has the MOTW, it will open in Protected View. Executables tagged with the MOTW will be processed by Windows Defender SmartScreen that compares files with an allowlist of well-known executables. If the file is not known/trusted, SmartScreen will prevent the execution and warn the user not to run it.(Citation: Beek Use of VHD Dec 2020)(Citation: Outflank MotW 2020)(Citation: Intezer Russian APT Dec 2020)
Adversaries may abuse container files such as compressed/archive (.arj, .gzip) and/or disk image (.iso, .vhd) file formats to deliver malicious payloads that may not be tagged with MOTW. Container files downloaded from the Internet will be marked with MOTW but the files within may not inherit the MOTW after the container files are extracted and/or mounted. MOTW is a NTFS feature and many container files do not support NTFS alternative data streams. After a container file is extracted and/or mounted, the files contained within them may be treated as local files on disk and run without protections.(Citation: Beek Use of VHD Dec 2020)(Citation: Outflank MotW 2020)
Data Sources: File: File Metadata, File: File Creation
Detection: Monitor compressed/archive and image files downloaded from the Internet as the contents may not be tagged with the MOTW. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities.(Citation: Disable automount for ISO) |
Provide detailed information about CVE-2016-10878. | CVE ID: CVE-2016-10878
Date Updated: 2024-08-06T03:38:56.641Z
Date Published: 2019-08-12T14:52:38
Description:
The wp-google-map-plugin plugin before 3.1.2 for WordPress has XSS.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wordpress.org/plugins/wp-google-map-plugin/#developers
- https://wpvulndb.com/vulnerabilities/9741
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-6189. | CVE ID: CVE-2014-6189
Date Updated: 2024-08-06T12:10:13.232Z
Date Published: 2017-08-22T15:00:00
Description:
Cross-site scripting (XSS) vulnerability in IBM Security Network Protection 3100, 4100, 5100, and 7100 devices with firmware 5.2 before 5.2.0.0-ISS-XGS-All-Models-Hotfix-FP0008 and 5.3 before 5.3.0.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg21697248
- http://www.securityfocus.com/bid/73940
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-30297. | CVE ID: CVE-2021-30297
Date Updated: 2024-08-03T22:32:40.426Z
Date Published: 2021-10-20T06:31:43
Description:
Possible out of bound read due to improper validation of packet length while handling data transfer in VR service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/october-2021-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-30809. | CVE ID: CVE-2024-30809
Date Updated: 2024-08-02T01:39:00.888Z
Date Published: 2024-04-02T00:00:00
Description:
An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free in Ap4Sample.h in AP4_Sample::GetOffset() const, leading to a Denial of Service (DoS), as demonstrated by mp42ts.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/axiomatic-systems/Bento4/issues/937
- https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-30809
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-4275. | CVE ID: CVE-2018-4275
Date Updated: 2024-08-05T05:11:22.332Z
Date Published: 2019-04-03T17:43:13
Description:
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/kb/HT208938
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-28110. | CVE ID: CVE-2024-28110
Date Updated: 2024-08-02T00:48:48.810Z
Date Published: 2024-03-06T21:12:26.991Z
Description:
Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. Version 2.15.2 patches this issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/cloudevents/sdk-go/security/advisories/GHSA-5pf6-2qwx-pxm2
- https://github.com/cloudevents/sdk-go/commit/de2f28370b0d2a0f64f92c0c6139fa4b8a7c3851
- https://github.com/cloudevents/sdk-go/blob/67e389964131d55d65cd14b4eb32d57a47312695/v2/protocol/http/protocol.go#L104-L110
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-4974. | CVE ID: CVE-2014-4974
Date Updated: 2024-08-06T11:34:36.494Z
Date Published: 2014-11-04T16:00:00
Description:
The ESET Personal Firewall NDIS filter (EpFwNdis.sys) kernel mode driver, aka Personal Firewall module before Build 1212 (20140609), as used in multiple ESET products 5.0 through 7.0, allows local users to obtain sensitive information from kernel memory via crafted IOCTL calls.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-4974/
- http://seclists.org/fulldisclosure/2014/Oct/118
- http://packetstormsecurity.com/files/128874/ESET-7.0-Kernel-Memory-Leak.html
- http://www.securityfocus.com/bid/70770
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98312
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-25557. | CVE ID: CVE-2020-25557
Date Updated: 2024-08-04T15:33:05.689Z
Date Published: 2020-11-13T15:25:13
Description:
In CMSuno 1.6.2, an attacker can inject malicious PHP code as a "username" while changing his/her username & password. After that, when attacker logs in to the application, attacker's code will be run. As a result of this vulnerability, authenticated user can run command on the server.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://fatihhcelik.blogspot.com/2020/09/cmsuno-162-remote-code-execution.html
- http://packetstormsecurity.com/files/161162/CMSUno-1.6.2-Remote-Code-Execution.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-46744. | CVE ID: CVE-2021-46744
Date Updated: 2024-09-16T23:46:24.093Z
Date Published: 2022-05-11T16:40:21.925600Z
Description:
An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033
- http://www.openwall.com/lists/oss-security/2022/08/08/6
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-46744. | CVE ID: CVE-2023-46744
Date Updated: 2024-09-04T15:24:18.995Z
Date Published: 2023-11-07T17:22:25.951Z
Description:
Squidex is an open source headless CMS and content management hub. In affected versions a stored Cross-Site Scripting (XSS) vulnerability enables privilege escalation of authenticated users. The SVG element filtering mechanism intended to stop XSS attacks through uploaded SVG images, is insufficient resulting to stored XSS attacks. Squidex allows the CMS contributors to be granted the permission of uploading an SVG asset. When the asset is uploaded, a filtering mechanism is performed to validate that the SVG does not contain malicious code. The validation logic consists of traversing the HTML nodes in the DOM. In order for the validation to succeed, 2 conditions must be met: 1. No HTML tags included in a "blacklist" called "InvalidSvgElements" are present. This list only contains the element "script". and 2. No attributes of HTML tags begin with "on" (i.e. onerror, onclick) (line 65). If either of the 2 conditions is not satisfied, validation fails and the file/asset is not uploaded. However it is possible to bypass the above filtering mechanism and execute arbitrary JavaScript code by introducing other HTML elements such as an <iframe> element with a "src" attribute containing a "javascript:" value. Authenticated adversaries with the "assets.create" permission, can leverage this vulnerability to upload a malicious SVG as an asset, targeting any registered user that will attempt to open/view the asset through the Squidex CMS.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/Squidex/squidex/security/advisories/GHSA-xfr4-qg2v-7v5m
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-28976. | CVE ID: CVE-2020-28976
Date Updated: 2024-08-04T16:48:00.549Z
Date Published: 2020-11-30T13:14:45
Description:
The Canto plugin 1.3.0 for WordPress contains a blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/detail.php?subdomain=SSRF.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/CantoDAM/Canto-Wordpress-Plugin
- https://www.canto.com/integrations/wordpress/
- https://wordpress.org/plugins/canto/#developers
- https://gist.github.com/p4nk4jv/87aebd999ce4b28063943480e95fd9e0
- http://packetstormsecurity.com/files/160358/WordPress-Canto-1.3.0-Server-Side-Request-Forgery.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-31151. | CVE ID: CVE-2021-31151
Date Updated: 2021-08-24T19:08:15
Date Published: 2021-08-24T19:08:15
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-4899. | CVE ID: CVE-2010-4899
Date Updated: 2024-08-07T04:02:30.453Z
Date Published: 2011-10-08T10:00:00
Description:
SQL injection vulnerability in c.php in CMS WebManager-Pro before 8.1 allows remote attackers to execute arbitrary SQL commands via the id parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/42951
- http://securityreason.com/securityalert/8438
- http://www.securityfocus.com/archive/1/513485/100/0/threaded
- http://packetstormsecurity.org/1009-exploits/webmanagerpro-sql.txt
- http://websecurity.com.ua/4146/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61593
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-10358. | CVE ID: CVE-2017-10358
Date Updated: 2024-08-05T17:41:55.021Z
Date Published: 2017-10-19T17:00:00
Description:
Vulnerability in the Oracle Hyperion Financial Reporting component of Oracle Hyperion (subcomponent: Workspace). The supported version that is affected is 11.1.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hyperion Financial Reporting. While the vulnerability is in Oracle Hyperion Financial Reporting, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hyperion Financial Reporting accessible data as well as unauthorized read access to a subset of Oracle Hyperion Financial Reporting accessible data. CVSS 3.0 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1039595
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.securityfocus.com/bid/101306
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-29894. | CVE ID: CVE-2021-29894
Date Updated: 2024-09-16T20:52:47.440Z
Date Published: 2021-09-30T16:20:18.227248Z
Description:
IBM Cloud Pak for Security (CP4S) 1.7.0.0, 1.7.1.0, 1.7.2.0, and 1.8.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 207320.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/6493729
- https://exchange.xforce.ibmcloud.com/vulnerabilities/207320
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-18092. | CVE ID: CVE-2018-18092
Date Updated: 2023-02-27T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-18352. | CVE ID: CVE-2017-18352
Date Updated: 2024-08-05T21:20:50.363Z
Date Published: 2018-12-17T06:00:00
Description:
Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugs.chromium.org/p/chromium/issues/detail?id=759111
- https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e
- https://github.com/GoogleChrome/rendertron/pull/88
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-1871. | CVE ID: CVE-2018-1871
Date Updated: 2024-09-16T17:38:49.342Z
Date Published: 2018-12-06T14:00:00Z
Description:
IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.0.0, 3.0.2, and 3.0.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 151329.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.ibm.com/support/docview.wss?uid=ibm10743123
- http://www.securityfocus.com/bid/106149
- https://exchange.xforce.ibmcloud.com/vulnerabilities/151329
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-0724. | CVE ID: CVE-2022-0724
Date Updated: 2024-08-02T23:40:03.544Z
Date Published: 2022-02-23T10:45:11
Description:
Insecure Storage of Sensitive Information in GitHub repository microweber/microweber prior to 1.3.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062
- https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the MITRE ATT&CK technique T1190 | The MITRE ATT&CK technique T1190: Exploit Public-Facing Application is related to the vulnerability CVE-CVE-2020-3387. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as exploitation_technique. |
Provide detailed information about CVE-2023-28206. | CVE ID: CVE-2023-28206
Date Updated: 2024-08-02T12:30:24.667Z
Date Published: 2023-04-10T00:00:00
Description:
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1, iOS 15.7.5 and iPadOS 15.7.5, macOS Big Sur 11.7.6. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT213723
- https://support.apple.com/en-us/HT213725
- https://support.apple.com/en-us/HT213724
- https://support.apple.com/en-us/HT213721
- https://support.apple.com/en-us/HT213720
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-17253. | CVE ID: CVE-2017-17253
Date Updated: 2024-08-05T20:44:00.120Z
Date Published: 2018-04-24T15:00:00
Description:
Huawei AR120-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR1200 V200R006C10, V200R006C13, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR1200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR150 V200R006C10, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR150-S V200R006C10SPC300, V200R007C00, V200R008C20, V200R008C30, AR160 V200R006C10, V200R006C12, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR200 V200R006C10, V200R007C00, V200R007C01, V200R008C20, V200R008C30, AR200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR2200 V200R006C10, V200R006C13, V200R006C16PWE, V200R007C00, V200R007C01, V200R007C02, V200R008C20, V200R008C30, AR2200-S V200R006C10, V200R007C00, V200R008C20, V200R008C30, AR3200 V200R006C10, V200R006C11, V200R007C00, V200R007C01, V200R007C02, V200R008C00, V200R008C10, V200R008C20, V200R008C30, AR3600 V200R006C10, V200R007C00, V200R007C01, V200R008C20, AR510 V200R006C10, V200R006C12, V200R006C13, V200R006C15, V200R006C16, V200R006C17, V200R007C00SPC180T, V200R008C20, V200R008C30, DP300 V500R002C00, IPS Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, NGFW Module V100R001C10SPC200, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R002C00, V500R002C10, NIP6300 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6600 V500R001C00, V500R001C20, V500R001C30, V500R001C50, NIP6800 V500R001C50, NetEngine16EX V200R006C10, V200R007C00, V200R008C20, V200R008C30, RSE6500 V500R002C00, SRG1300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG2300 V200R006C10, V200R007C00, V200R007C02, V200R008C20, V200R008C30, SRG3300 V200R006C10, V200R007C00, V200R008C20, V200R008C30, SVN5600 V200R003C00, V200R003C10, SVN5800 V200R003C00, V200R003C10, SVN5800-C V200R003C00, V200R003C10, SeMG9811 V300R001C01, Secospace USG6300 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6500 V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, Secospace USG6600 V100R001C00SPC200, V100R001C10, V100R001C20, V100R001C30, V500R001C00, V500R001C20, V500R001C30, V500R001C50, V500R001C60, TE30 V100R001C02, V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C01, V100R001C10, V500R002C00, V600R006C00, TP3106 V100R002C00, TP3206 V100R002C00, V100R002C10, USG6000V V500R001C20, USG9500 V500R001C00, V500R001C20, V500R001C30, V500R001C50, USG9520 V300R001C01, V300R001C20, USG9560 V300R001C01, V300R001C20, USG9580 V300R001C01, V300R001C20, VP9660 V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02 has an out-of-bounds read vulnerability in H323 protocol. An unauthenticated, remote attacker could craft malformed packets with specific parameters and send the packets to the affected products. Due to insufficient validation of packets, which could be exploited to cause process crash.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171227-01-h323-en
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-0054. | CVE ID: CVE-2019-0054
Date Updated: 2024-09-17T00:36:21.418Z
Date Published: 2019-10-09T19:26:17.333372Z
Description:
An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.juniper.net/JSA10952
- https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-identification-overview.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-15850. | CVE ID: CVE-2017-15850
Date Updated: 2024-09-16T23:20:46.121Z
Date Published: 2018-01-10T22:00:00Z
Description:
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, userspace can read values from audio codec registers.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/pixel/2018-01-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-5854. | CVE ID: CVE-2008-5854
Date Updated: 2024-08-07T11:04:44.738Z
Date Published: 2009-01-06T17:00:00
Description:
Multiple cross-site scripting (XSS) vulnerabilities in login.php in myPHPscripts Login Session 2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) ls_user and (2) ls_email parameters (aka the User form) in an ls_register action. NOTE: some of these details are obtained from third party information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://securityreason.com/securityalert/4873
- https://www.exploit-db.com/exploits/7526
- http://www.securityfocus.com/bid/32941
- http://secunia.com/advisories/33253
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47501
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-8104. | CVE ID: CVE-2019-8104
Date Updated: 2024-08-04T21:10:32.529Z
Date Published: 2019-08-20T20:28:32
Description:
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/acrobat/apsb19-41.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-21264. | CVE ID: CVE-2022-21264
Date Updated: 2024-09-24T20:30:04.517Z
Date Published: 2022-01-19T11:22:33
Description:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://security.netapp.com/advisory/ntap-20220121-0008/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-7596. | CVE ID: CVE-2014-7596
Date Updated: 2024-08-06T12:56:11.426Z
Date Published: 2014-10-20T10:00:00
Description:
The Paramore (aka uk.co.pixelkicks.paramore) application 2.3.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/455161
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-18875. | CVE ID: CVE-2018-18875
Date Updated: 2024-08-05T11:23:08.317Z
Date Published: 2019-06-18T14:29:39
Description:
In firmware version MS_2.6.9900 of Columbia Weather MicroServer, a stored Cross-site scripting (XSS) vulnerability allows remote authenticated users to inject arbitrary web script via changestationname.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://applied-risk.com/labs/advisories
- https://ics-cert.us-cert.gov/advisories/ICSA-19-078-02
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-5477. | CVE ID: CVE-2015-5477
Date Updated: 2024-08-06T06:50:02.071Z
Date Published: 2015-07-29T14:00:00
Description:
named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.com/files/132926/BIND-TKEY-Query-Denial-Of-Service.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04789415
- https://kb.juniper.net/JSA10783
- http://rhn.redhat.com/errata/RHSA-2015-1513.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00044.html
- https://security.netapp.com/advisory/ntap-20160114-0001/
- https://kb.isc.org/article/AA-01438
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163015.html
- http://marc.info/?l=bugtraq&m=144017354030745&w=2
- http://marc.info/?l=bugtraq&m=144294073801304&w=2
- http://rhn.redhat.com/errata/RHSA-2016-0079.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05095918
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10718
- http://rhn.redhat.com/errata/RHSA-2015-1514.html
- http://www.ubuntu.com/usn/USN-2693-1
- https://support.apple.com/kb/HT205032
- http://www.securitytracker.com/id/1033100
- https://kb.isc.org/article/AA-01307
- http://www.securityfocus.com/bid/76092
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00001.html
- http://marc.info/?l=bugtraq&m=144294073801304&w=2
- https://www.exploit-db.com/exploits/37721/
- http://rhn.redhat.com/errata/RHSA-2015-1515.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00048.html
- https://security.gentoo.org/glsa/201510-01
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html
- http://marc.info/?l=bugtraq&m=144181171013996&w=2
- http://marc.info/?l=bugtraq&m=144017354030745&w=2
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952480
- http://www.debian.org/security/2015/dsa-3319
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163007.html
- http://marc.info/?l=bugtraq&m=144000632319155&w=2
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163006.html
- https://www.exploit-db.com/exploits/37723/
- https://kb.isc.org/article/AA-01305
- http://rhn.redhat.com/errata/RHSA-2016-0078.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html
- https://kb.isc.org/article/AA-01306
- https://kc.mcafee.com/corporate/index?page=content&id=SB10126
- https://kb.isc.org/article/AA-01272
- http://marc.info/?l=bugtraq&m=144000632319155&w=2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-50730. | CVE ID: CVE-2023-50730
Date Updated: 2024-08-02T22:16:47.266Z
Date Published: 2023-12-22T20:36:11.402Z
Description:
Grackle is a GraphQL server written in functional Scala, built on the Typelevel stack. The GraphQL specification requires that GraphQL fragments must not form cycles, either directly or indirectly. Prior to Grackle version 0.18.0, that requirement wasn't checked, and queries with cyclic fragments would have been accepted for type checking and compilation. The attempted compilation of such fragments would result in a JVM `StackOverflowError` being thrown. Some knowledge of an applications GraphQL schema would be required to construct such a query, however no knowledge of any application-specific performance or other behavioural characteristics would be needed.
Grackle uses the cats-parse library for parsing GraphQL queries. Prior to version 0.18.0, Grackle made use of the cats-parse `recursive` operator. However, `recursive` is not currently stack safe. `recursive` was used in three places in the parser: nested selection sets, nested input values (lists and objects), and nested list type declarations. Consequently, queries with deeply nested selection sets, input values or list types could be constructed which exploited this, causing a JVM `StackOverflowException` to be thrown during parsing. Because this happens very early in query processing, no specific knowledge of an applications GraphQL schema would be required to construct such a query.
The possibility of small queries resulting in stack overflow is a potential denial of service vulnerability. This potentially affects all applications using Grackle which have untrusted users. Both stack overflow issues have been resolved in the v0.18.0 release of Grackle. As a workaround, users could interpose a sanitizing layer in between untrusted input and Grackle query processing.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/typelevel/grackle/security/advisories/GHSA-g56x-7j6w-g8r8
- https://github.com/typelevel/grackle/commit/56e244b91659cf385df590fc6c46695b6f36cbfd
- https://github.com/typelevel/grackle/releases/tag/v0.18.0
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-6529. | CVE ID: CVE-2013-6529
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-1893. | CVE ID: CVE-2014-1893
Date Updated: 2024-08-06T09:58:15.946Z
Date Published: 2014-04-01T01:00:00
Description:
Multiple integer overflows in the (1) FLASK_GETBOOL and (2) FLASK_SETBOOL suboperations in the flask hypercall in Xen 4.1.x, 3.3.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1891, CVE-2014-1892, and CVE-2014-1894.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html
- http://www.openwall.com/lists/oss-security/2014/02/10/8
- http://xenbits.xen.org/xsa/advisory-84.html
- http://www.openwall.com/lists/oss-security/2014/02/07/4
- http://security.gentoo.org/glsa/glsa-201407-03.xml
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://www.openwall.com/lists/oss-security/2014/02/07/12
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-7401. | CVE ID: CVE-2016-7401
Date Updated: 2024-08-06T01:57:47.529Z
Date Published: 2016-10-03T18:00:00
Description:
The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.debian.org/security/2016/dsa-3678
- http://rhn.redhat.com/errata/RHSA-2016-2040.html
- http://rhn.redhat.com/errata/RHSA-2016-2043.html
- http://www.securitytracker.com/id/1036899
- http://rhn.redhat.com/errata/RHSA-2016-2041.html
- https://www.djangoproject.com/weblog/2016/sep/26/security-releases/
- http://rhn.redhat.com/errata/RHSA-2016-2042.html
- http://www.ubuntu.com/usn/USN-3089-1
- http://www.securityfocus.com/bid/93182
- http://rhn.redhat.com/errata/RHSA-2016-2038.html
- http://rhn.redhat.com/errata/RHSA-2016-2039.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-9529. | CVE ID: CVE-2014-9529
Date Updated: 2024-08-06T13:47:41.340Z
Date Published: 2015-01-09T21:00:00
Description:
Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html
- http://www.ubuntu.com/usn/USN-2515-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99641
- http://www.openwall.com/lists/oss-security/2015/01/06/10
- http://www.ubuntu.com/usn/USN-2512-1
- http://www.ubuntu.com/usn/USN-2514-1
- http://rhn.redhat.com/errata/RHSA-2015-1138.html
- http://www.ubuntu.com/usn/USN-2518-1
- http://rhn.redhat.com/errata/RHSA-2015-0864.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1179813
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:058
- http://www.securityfocus.com/bid/71880
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html
- http://www.securitytracker.com/id/1036763
- https://github.com/torvalds/linux/commit/a3a8784454692dd72e5d5d34dcdab17b4420e74c
- http://www.ubuntu.com/usn/USN-2517-1
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html
- http://www.debian.org/security/2015/dsa-3128
- http://www.ubuntu.com/usn/USN-2516-1
- http://rhn.redhat.com/errata/RHSA-2015-1137.html
- http://www.ubuntu.com/usn/USN-2513-1
- http://www.ubuntu.com/usn/USN-2511-1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a3a8784454692dd72e5d5d34dcdab17b4420e74c
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-4188. | CVE ID: CVE-2010-4188
Date Updated: 2024-08-07T03:34:37.536Z
Date Published: 2011-02-10T15:00:00
Description:
The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with an IFWV chunk with a size field of 0, which is used in the calculation of a file offset and causes invalid data to be used as a loop counter, triggering a heap-based buffer overflow, a different vulnerability than CVE-2010-2587 and CVE-2010-2588.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2011/0335
- http://www.adobe.com/support/security/bulletins/apsb11-01.html
- http://www.securityfocus.com/bid/46319
- http://www.securitytracker.com/id?1025056
- http://www.securityfocus.com/archive/1/516332/100/0/threaded
- http://dvlabs.tippingpoint.com/advisory/TPTI-11-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-4330. | CVE ID: CVE-2008-4330
Date Updated: 2024-08-07T10:08:35.103Z
Date Published: 2008-09-30T17:00:00
Description:
Directory traversal vulnerability in index.php in LanSuite 3.3.2 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the design parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45583
- http://www.securityfocus.com/bid/31402
- https://www.exploit-db.com/exploits/6562
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-33305. | CVE ID: CVE-2022-33305
Date Updated: 2024-08-03T08:01:20.537Z
Date Published: 2023-05-02T05:08:47.586Z
Description:
Transient DOS due to NULL pointer dereference in Modem while sending invalid messages in DCCH.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/may-2023-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-36001. | CVE ID: CVE-2021-36001
Date Updated: 2024-09-16T16:47:55.476Z
Date Published: 2021-08-20T18:10:18.437063Z
Description:
Adobe Character Animator version 4.2 (and earlier) is affected by an out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/in/security/products/character_animator/apsb21-59.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-4634. | CVE ID: CVE-2024-4634
Date Updated: 2024-08-01T20:47:41.292Z
Date Published: 2024-05-16T11:05:29.590Z
Description:
The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘hfe_svg_mime_types’ function in versions up to, and including, 1.6.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f44bb823-bbf3-413b-82b5-a351609270bf?source=cve
- https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.28/inc/widgets-manager/class-widgets-loader.php#L156
- https://plugins.trac.wordpress.org/changeset/3086402/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-2531. | CVE ID: CVE-2010-2531
Date Updated: 2024-08-07T02:39:37.384Z
Date Published: 2010-08-20T20:00:00
Description:
The var_export function in PHP 5.2 before 5.2.14 and 5.3 before 5.3.3 flushes the output buffer to the user when certain fatal errors occur, even if display_errors is off, which allows remote attackers to obtain sensitive information by causing the application to exceed limits for memory, execution time, or recursion.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://support.apple.com/kb/HT4435
- http://marc.info/?l=bugtraq&m=133469208622507&w=2
- http://marc.info/?l=bugtraq&m=130331363227777&w=2
- http://www.openwall.com/lists/oss-security/2010/07/16/3
- http://svn.php.net/viewvc/php/php-src/trunk/ext/standard/tests/general_functions/var_export_error2.phpt?view=log&pathrev=301143
- https://bugzilla.redhat.com/show_bug.cgi?id=617673
- http://www.debian.org/security/2011/dsa-2266
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
- http://www.redhat.com/support/errata/RHSA-2010-0919.html
- http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html
- http://www.openwall.com/lists/oss-security/2010/07/13/1
- http://www.php.net/archive/2010.php#id2010-07-22-2
- http://marc.info/?l=bugtraq&m=133469208622507&w=2
- http://support.apple.com/kb/HT4312
- http://secunia.com/advisories/42410
- http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
- http://marc.info/?l=bugtraq&m=130331363227777&w=2
- http://www.php.net/archive/2010.php#id2010-07-22-1
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
- http://www.vupen.com/english/advisories/2010/3081
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-40316. | CVE ID: CVE-2022-40316
Date Updated: 2024-08-03T12:14:40.203Z
Date Published: 2022-09-30T16:37:12
Description:
The H5P activity attempts report did not filter by groups, which in separate groups mode could reveal information to non-editing teachers about attempts/users in groups they should not have access to.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=2128151
- https://moodle.org/mod/forum/discuss.php?d=438395
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-34707. | CVE ID: CVE-2024-34707
Date Updated: 2024-08-02T02:59:22.584Z
Date Published: 2024-05-13T19:22:41.202Z
Description:
Nautobot is a Network Source of Truth and Network Automation Platform. A Nautobot user with admin privileges can modify the `BANNER_TOP`, `BANNER_BOTTOM`, and `BANNER_LOGIN` configuration settings via the `/admin/constance/config/` endpoint. Normally these settings are used to provide custom banner text at the top and bottom of all Nautobot web pages (or specifically on the login page in the case of `BANNER_LOGIN`) but it was reported that an admin user can make use of these settings to inject arbitrary HTML, potentially exposing Nautobot users to security issues such as cross-site scripting (stored XSS). The vulnerability is fixed in Nautobot 1.6.22 and 2.2.4.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hr-4v48-fjv3
- https://github.com/nautobot/nautobot/pull/5697
- https://github.com/nautobot/nautobot/pull/5698
- https://github.com/nautobot/nautobot/commit/4f0a66bd6307bfe0e0acb899233e0d4ad516f51c
- https://github.com/nautobot/nautobot/commit/f640aedc69c848d3d1be57f0300fc40033ff6423
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-29172. | CVE ID: CVE-2022-29172
Date Updated: 2024-08-03T06:17:53.986Z
Date Published: 2022-05-05T22:50:09
Description:
Auth0 is an authentication broker that supports both social and enterprise identity providers, including Active Directory, LDAP, Google Apps, and Salesforce. In versions before `11.33.0`, when the “additional signup fields” feature [is configured](https://github.com/auth0/lock#additional-sign-up-fields), a malicious actor can inject invalidated HTML code into these additional fields, which is then stored in the service `user_metdata` payload (using the `name` property). Verification emails, when applicable, are generated using this metadata. It is therefor possible for an actor to craft a malicious link by injecting HTML, which is then rendered as the recipient's name within the delivered email template. You are impacted by this vulnerability if you are using `auth0-lock` version `11.32.2` or lower and are using the “additional signup fields” feature in your application. Upgrade to version `11.33.0`.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/auth0/lock/security/advisories/GHSA-7ww6-75fj-jcj7
- https://github.com/auth0/lock/commit/79ae557d331274b114848150f19832ae341771b1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-8948. | CVE ID: CVE-2020-8948
Date Updated: 2024-08-04T10:12:11.004Z
Date Published: 2020-04-15T15:17:23
Description:
The Sierra Wireless Windows Mobile Broadband Driver Packages (MBDP) before build 5043 allows an unprivileged user to overwrite arbitrary files in arbitrary folders using hard links. An unprivileged user could leverage this vulnerability to execute arbitrary code with system privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://danishcyberdefence.dk/blog/sierra_wireless
- https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---swi-psa-2020-002-cve-2020-8948/#sthash.ByZB8ifG.dpbs
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-40070. | CVE ID: CVE-2022-40070
Date Updated: 2024-08-03T12:14:39.482Z
Date Published: 2022-09-19T14:36:51
Description:
Tenda AC21 V 16.03.08.15 is vulnerable to Buffer Overflow via bin/httpd, function: formSetFirewallCfg.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/8
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-47080. | CVE ID: CVE-2023-47080
Date Updated: 2024-08-02T21:01:22.659Z
Date Published: 2023-12-13T13:15:59.384Z
Description:
Adobe Substance 3D Stager versions 2.1.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/substance3d_stager/apsb23-73.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-28331. | CVE ID: CVE-2023-28331
Date Updated: 2024-08-02T12:38:25.143Z
Date Published: 2023-03-23T00:00:00
Description:
Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=2179418
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/
- https://moodle.org/mod/forum/discuss.php?d=445063
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-18791. | CVE ID: CVE-2017-18791
Date Updated: 2024-08-05T21:37:43.530Z
Date Published: 2020-04-21T18:50:13
Description:
Certain NETGEAR devices are affected by CSRF. This affects R6050/JR6150 before 1.0.1.7, PR2000 before 1.0.0.17, R6220 before 1.1.0.50, WNDR3700v5 before 1.1.0.48, JNR1010v2 before 1.1.0.40, JWNR2010v5 before 1.1.0.40, WNR1000v4 before 1.1.0.40, WNR2020 before 1.1.0.40, WNR2050 before 1.1.0.40, WNR614 before 1.1.0.40, WNR618 before 1.1.0.40, and D7000 before 1.0.1.50.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.netgear.com/000049371/Security-Advisory-for-Cross-Site-Request-Forgery-Vulnerability-on-D7000-and-Some-Routers-PSV-2017-0386
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-31072. | CVE ID: CVE-2021-31072
Date Updated: 2021-08-24T18:52:47
Date Published: 2021-08-24T18:52:47
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-5380. | CVE ID: CVE-2018-5380
Date Updated: 2024-09-17T01:05:46.243Z
Date Published: 2018-02-19T13:00:00Z
Description:
The Quagga BGP daemon (bgpd) prior to version 1.2.3 can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://usn.ubuntu.com/3573-1/
- https://www.debian.org/security/2018/dsa-4115
- http://savannah.nongnu.org/forum/forum.php?forum_id=9095
- https://security.gentoo.org/glsa/201804-17
- https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html
- https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1550.txt
- http://www.kb.cert.org/vuls/id/940439
- https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-43980. | CVE ID: CVE-2023-43980
Date Updated: 2024-09-23T16:14:23.439Z
Date Published: 2023-10-02T00:00:00
Description:
Presto Changeo testsitecreator up to v1.1.1 was discovered to contain a SQL injection vulnerability via the component disable_json.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.presto-changeo.com/prestashop/home/158-test-site-creator.html
- https://security.friendsofpresta.org/modules/2023/09/28/testsitecreator-89.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-4615. | CVE ID: CVE-2012-4615
Date Updated: 2024-08-06T20:42:54.579Z
Date Published: 2012-11-27T21:00:00
Description:
EMC Smarts Network Configuration Manager (NCM) before 9.1 uses a hardcoded encryption key for the storage of credentials, which allows local users to obtain sensitive information via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://osvdb.org/87878
- http://www.securitytracker.com/id?1027812
- http://secunia.com/advisories/51408
- http://archives.neohapsis.com/archives/bugtraq/2012-11/0095.html
- http://www.securityfocus.com/bid/56682
- http://packetstormsecurity.org/files/118358/EMC-Smarts-Network-Configuration-Manager-Bypass.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-19880. | CVE ID: CVE-2019-19880
Date Updated: 2024-08-05T02:32:09.358Z
Date Published: 2019-12-18T05:07:13
Description:
exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/sqlite/sqlite/commit/75e95e1fcd52d3ec8282edb75ac8cd0814095d54
- https://security.netapp.com/advisory/ntap-20200114-0001/
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html
- https://access.redhat.com/errata/RHSA-2020:0514
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html
- https://www.debian.org/security/2020/dsa-4638
- https://usn.ubuntu.com/4298-1/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-4244. | CVE ID: CVE-2014-4244
Date Updated: 2024-08-06T11:12:34.089Z
Date Published: 2014-07-17T10:00:00
Description:
Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and JRockit R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.debian.org/security/2014/dsa-2987
- http://www-01.ibm.com/support/docview.wss?uid=swg21685178
- http://www.securityfocus.com/bid/68624
- http://secunia.com/advisories/60129
- http://secunia.com/advisories/62314
- http://secunia.com/advisories/58830
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94605
- http://www-01.ibm.com/support/docview.wss?uid=swg21681966
- http://www-01.ibm.com/support/docview.wss?uid=swg21681379
- http://secunia.com/advisories/61050
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://marc.info/?l=bugtraq&m=140852886808946&w=2
- http://www.debian.org/security/2014/dsa-2980
- http://www.securitytracker.com/id/1030577
- http://secunia.com/advisories/61254
- http://www-01.ibm.com/support/docview.wss?uid=swg21685242
- http://secunia.com/advisories/59987
- http://secunia.com/advisories/60335
- http://www-01.ibm.com/support/docview.wss?uid=swg21683429
- http://marc.info/?l=bugtraq&m=140852886808946&w=2
- http://marc.info/?l=bugtraq&m=140852974709252&w=2
- http://secunia.com/advisories/60831
- http://secunia.com/advisories/60846
- http://secunia.com/advisories/61846
- http://secunia.com/advisories/60812
- http://secunia.com/advisories/61264
- http://secunia.com/advisories/60890
- http://secunia.com/advisories/61469
- http://www.ibm.com/support/docview.wss?uid=swg21683518
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
- http://secunia.com/advisories/61215
- http://secunia.com/advisories/60002
- http://secunia.com/advisories/61294
- http://secunia.com/advisories/59986
- http://www-01.ibm.com/support/docview.wss?uid=swg21689593
- http://rhn.redhat.com/errata/RHSA-2015-0264.html
- http://secunia.com/advisories/60245
- http://secunia.com/advisories/61417
- http://secunia.com/advisories/60817
- http://secunia.com/advisories/59924
- http://secunia.com/advisories/61577
- https://access.redhat.com/errata/RHSA-2014:0908
- http://secunia.com/advisories/61278
- http://secunia.com/advisories/60497
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
- http://marc.info/?l=bugtraq&m=140852974709252&w=2
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://secunia.com/advisories/60485
- http://secunia.com/advisories/59680
- http://www-01.ibm.com/support/docview.wss?uid=swg21683438
- http://www-01.ibm.com/support/docview.wss?uid=swg21686383
- http://www-01.ibm.com/support/docview.wss?uid=swg21683484
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://www-01.ibm.com/support/docview.wss?uid=swg21680334
- http://www-01.ibm.com/support/docview.wss?uid=swg21688893
- http://secunia.com/advisories/60622
- http://secunia.com/advisories/61293
- https://www.ibm.com/support/docview.wss?uid=swg21680418
- https://kc.mcafee.com/corporate/index?page=content&id=SB10083
- http://www-01.ibm.com/support/docview.wss?uid=swg21685121
- http://secunia.com/advisories/60081
- http://secunia.com/advisories/60032
- http://www-01.ibm.com/support/docview.wss?uid=swg21686142
- http://www-01.ibm.com/support/docview.wss?uid=swg21685122
- https://access.redhat.com/errata/RHSA-2014:0902
- http://secunia.com/advisories/60326
- http://secunia.com/advisories/59985
- http://secunia.com/advisories/61640
- http://www-01.ibm.com/support/docview.wss?uid=swg21683338
- http://secunia.com/advisories/59503
- http://www-01.ibm.com/support/docview.wss?uid=swg21686824
- http://security.gentoo.org/glsa/glsa-201502-12.xml
- http://secunia.com/advisories/60317
- http://secunia.com/advisories/60031
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
- http://secunia.com/advisories/59404
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-33327. | CVE ID: CVE-2021-33327
Date Updated: 2024-08-03T23:50:41.434Z
Date Published: 2021-08-03T18:46:02
Description:
The Portlet Configuration module in Liferay Portal 7.2.0 through 7.3.3, and Liferay DXP 7.0 fix pack pack 93 and 94, 7.1 fix pack 18, and 7.2 before fix pack 8, does not properly check user permission, which allows remote authenticated users to view the Guest and User role even if "Role Visibility" is enabled.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/120747840
- https://issues.liferay.com/browse/LPE-17075
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-1000217. | CVE ID: CVE-2017-1000217
Date Updated: 2024-09-16T16:53:27.170Z
Date Published: 2017-11-17T22:00:00Z
Description:
Opencast 2.3.2 and older versions are vulnerable to script injections through media and metadata in the player and media module resulting in arbitrary code execution, fixed in 2.3.3 and 3.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://groups.google.com/a/opencast.org/forum/#%21topic/security-notices/sCpt0pIPEFg
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-0957. | CVE ID: CVE-2013-0957
Date Updated: 2024-08-06T14:41:48.360Z
Date Published: 2013-09-19T10:00:00
Description:
Data Protection in Apple iOS before 7 allows attackers to bypass intended limits on incorrect passcode entry, and consequently avoid a configured Erase Data setting, by leveraging the presence of an app in the third-party sandbox.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1029054
- http://support.apple.com/kb/HT5934
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-20876. | CVE ID: CVE-2018-20876
Date Updated: 2024-08-05T12:12:29.775Z
Date Published: 2019-08-01T12:43:05
Description:
cPanel before 74.0.8 allows self XSS in the Site Software Moderation interface (SEC-434).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://documentation.cpanel.net/display/CL/74+Change+Log
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-2458. | CVE ID: CVE-2017-2458
Date Updated: 2024-08-05T13:55:05.977Z
Date Published: 2017-04-02T01:36:00
Description:
An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "Keyboards" component. A buffer overflow allows attackers to execute arbitrary code in a privileged context via a crafted app.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/97137
- https://support.apple.com/HT207601
- https://support.apple.com/HT207615
- http://www.securitytracker.com/id/1038138
- https://support.apple.com/HT207602
- https://support.apple.com/HT207617
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-15639. | CVE ID: CVE-2018-15639
Date Updated: 2023-05-12T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-1010091. | CVE ID: CVE-2019-1010091
Date Updated: 2024-08-05T03:07:18.162Z
Date Published: 2019-07-17T16:35:10
Description:
tinymce 4.7.11, 4.7.12 is affected by: CWE-79: Improper Neutralization of Input During Web Page Generation. The impact is: JavaScript code execution. The component is: Media element. The attack vector is: The victim must paste malicious content to media element's embed tab.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/tinymce/tinymce/issues/4394
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-32730. | CVE ID: CVE-2021-32730
Date Updated: 2024-08-03T23:33:55.828Z
Date Published: 2021-07-01T17:30:13
Description:
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A cross-site request forgery vulnerability exists in versions prior to 12.10.5, and in versions 13.0 through 13.1. It's possible for forge an URL that, when accessed by an admin, will reset the password of any user in XWiki. The problem has been patched in XWiki 12.10.5 and 13.2RC1. As a workaround, it is possible to apply the patch manually by modifying the `register_macros.vm` template.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v9j2-q4q5-cxh4
- https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257
- https://jira.xwiki.org/browse/XWIKI-18315
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-23375. | CVE ID: CVE-2022-23375
Date Updated: 2024-08-03T03:36:20.404Z
Date Published: 2022-02-19T15:43:09
Description:
WikiDocs version 0.1.18 has an authenticated remote code execution vulnerability. An attacker can upload a malicious file using the image upload form through index.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wikidocs.it/
- https://demo.wikidocs.it/
- https://github.com/Zavy86/WikiDocs
- https://github.com/Zavy86/WikiDocs/issues/28
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-39873. | CVE ID: CVE-2021-39873
Date Updated: 2024-08-04T02:20:33.651Z
Date Published: 2021-10-04T16:43:24
Description:
In all versions of GitLab CE/EE, there exists a content spoofing vulnerability which may be leveraged by attackers to trick users into visiting a malicious website by spoofing the content in an error response.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gitlab.com/gitlab-org/gitlab/-/issues/27241
- https://hackerone.com/reports/504961
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39873.json
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-13294. | CVE ID: CVE-2019-13294
Date Updated: 2024-08-04T23:49:24.798Z
Date Published: 2019-07-04T22:09:54
Description:
AROX School-ERP Pro has a command execution vulnerability. import_stud.php and upload_fille.php do not have session control. Therefore an unauthenticated user can execute a command on the system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/46999
- http://www.pentest.com.tr/exploits/AROX-School-ERP-Pro-Unauthenticated-RCE-Metasploit.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-5596. | CVE ID: CVE-2016-5596
Date Updated: 2024-08-06T01:07:58.971Z
Date Published: 2016-10-25T14:00:00
Description:
Unspecified vulnerability in the Oracle CRM Technical Foundation component in Oracle E-Business Suite 12.1.1 through 12.1.3 and 12.2.3 through 12.2.6 allows remote authenticated users to affect confidentiality via unknown vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/93762
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securitytracker.com/id/1037038
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-41711. | CVE ID: CVE-2023-41711
Date Updated: 2024-09-13T15:38:30.661Z
Date Published: 2023-10-17T22:20:36.619Z
Description:
SonicOS post-authentication Stack-Based Buffer Overflow Vulnerability in the sonicwall.exp, prefs.exp URL endpoints lead to a firewall crash.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-10019. | CVE ID: CVE-2020-10019
Date Updated: 2024-09-17T02:12:14.643Z
Date Published: 2020-05-11T22:26:11.452886Z
Description:
USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25
- https://github.com/zephyrproject-rtos/zephyr/pull/23190
- https://github.com/zephyrproject-rtos/zephyr/pull/23457
- https://github.com/zephyrproject-rtos/zephyr/pull/23460
- https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10019
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-3852. | CVE ID: CVE-2023-3852
Date Updated: 2024-08-02T07:08:50.411Z
Date Published: 2023-07-23T22:00:04.288Z
Description:
A vulnerability was found in OpenRapid RapidCMS up to 1.3.1. It has been declared as critical. This vulnerability affects unknown code of the file /admin/upload.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-235204.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.235204
- https://vuldb.com/?ctiid.235204
- https://github.com/OpenRapid/rapidcms/issues/1
- https://github.com/OpenRapid/rapidcms/commit/4dff387283060961c362d50105ff8da8ea40bcbe
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-30793. | CVE ID: CVE-2021-30793
Date Updated: 2024-08-03T22:40:32.190Z
Date Published: 2021-09-08T13:49:12
Description:
A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. An application may be able to execute arbitrary code with kernel privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT212602
- https://support.apple.com/en-us/HT212600
- https://support.apple.com/en-us/HT212603
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-7759. | CVE ID: CVE-2018-7759
Date Updated: 2024-08-05T06:37:57.979Z
Date Published: 2018-04-18T20:00:00
Description:
A buffer overflow vulnerability exists in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200. The buffer overflow vulnerability is caused by the length of the source string specified (instead of the buffer size) as the number of bytes to be copied.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.schneider-electric.com/en/download/document/SEVD-2018-081-02/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-47330. | CVE ID: CVE-2021-47330
Date Updated: 2024-09-11T17:33:52.086Z
Date Published: 2024-05-21T14:35:41.789Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
In the probe function, if the final 'serial_config()' fails, 'info' is
leaking.
Add a resource handling path to free this memory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c
- https://git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc
- https://git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584
- https://git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461
- https://git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67
- https://git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32
- https://git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2
- https://git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5
- https://git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-11901. | CVE ID: CVE-2018-11901
Date Updated: 2021-11-23T19:58:56
Date Published: 2021-11-23T19:58:56
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-27479. | CVE ID: CVE-2021-27479
Date Updated: 2024-08-03T20:48:17.358Z
Date Published: 2021-06-16T12:16:36
Description:
ZOLL Defibrillator Dashboard, v prior to 2.2,The affected product’s web application could allow a low privilege user to inject parameters to contain malicious scripts to be executed by higher privilege users.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://us-cert.cisa.gov/ics/advisories/icsma-21-161-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-7830. | CVE ID: CVE-2020-7830
Date Updated: 2024-09-16T18:13:01.375Z
Date Published: 2020-09-02T19:10:09.309227Z
Description:
RAONWIZ v2018.0.2.50 and earlier versions contains a vulnerability that could allow remote files to be downloaded by lack of validation. Vulnerabilities in downloading with Kupload agent allow files to be downloaded to arbitrary paths due to insufficient verification of extensions and download paths. This issue affects: RAONWIZ RAON KUpload 2018.0.2.50 versions and earlier.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35582
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-33668. | CVE ID: CVE-2021-33668
Date Updated: 2024-08-03T23:58:22.420Z
Date Published: 2021-06-09T12:02:26
Description:
Due to improper input sanitization, specially crafted LDAP queries can be injected by an unauthenticated user. This could partially impact the confidentiality of the application.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/SAP/scimono/security/advisories/GHSA-wg9g-w4fg-3qqc
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide information about the following MITRE ATT&CK technique: | T1529 : System Shutdown/Reboot | Name: System Shutdown/Reboot
ID: T1529
URL: https://attack.mitre.org/techniques/T1529
Platforms: Linux, macOS, Windows, Network
Kill Chain Phases: Impact
Description: Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating systems may contain commands to initiate a shutdown/reboot of a machine or network device. In some cases, these commands may also be used to initiate a shutdown/reboot of a remote computer or network device via [Network Device CLI](T1059.008) (e.g. `reload`).(Citation: Microsoft Shutdown Oct 2017)(Citation: alert_TA18_106A)
Shutting down or rebooting systems may disrupt access to computer resources for legitimate users while also impeding incident response/recovery.
Adversaries may attempt to shutdown/reboot a system after impacting it in other ways, such as [Disk Structure Wipe](T1561.002) or [Inhibit System Recovery](T1490), to hasten the intended effects on system availability.(Citation: Talos Nyetya June 2017)(Citation: Talos Olympic Destroyer 2018)
Data Sources: Process: Process Creation, Sensor Health: Host Status, Command: Command Execution
Detection: Use process monitoring to monitor the execution and command line parameters of binaries involved in shutting down or rebooting systems. Windows event logs may also designate activity associated with a shutdown/reboot, ex. Event ID 1074 and 6006. Unexpected or unauthorized commands from network cli on network devices may also be associated with shutdown/reboot, e.g. the `reload` command. |
Provide detailed information about CVE-2020-8125. | CVE ID: CVE-2020-8125
Date Updated: 2024-08-04T09:48:25.907Z
Date Published: 2020-02-04T19:08:56
Description:
Flaw in input validation in npm package klona version 1.1.0 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using klona.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://hackerone.com/reports/778414
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-27659. | CVE ID: CVE-2020-27659
Date Updated: 2024-09-17T04:00:17.636Z
Date Published: 2020-11-30T09:30:15.481484Z
Description:
Multiple cross-site scripting (XSS) vulnerabilities in Synology SafeAccess before 1.2.3-0234 allow remote attackers to inject arbitrary web script or HTML via the (1) domain or (2) profile parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.synology.com/security/advisory/Synology_SA_20_25
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1087
- https://github.com/thomasfady/Synology_SA_20_25
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-7469. | CVE ID: CVE-2018-7469
Date Updated: 2024-08-05T06:24:11.963Z
Date Published: 2018-02-28T15:00:00
Description:
PHP Scripts Mall Entrepreneur Job Portal Script 2.0.9 has XSS via the p_name (aka Edit Category Name) field to admin/categories_industry.php (aka Categories - Industry Type).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://neetech18.blogspot.in/2018/02/stored-xss-vulnerability-in-php-scripts.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-7606. | CVE ID: CVE-2016-7606
Date Updated: 2024-08-06T02:04:55.622Z
Date Published: 2017-02-20T08:35:00
Description:
An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/HT207487
- https://support.apple.com/HT207422
- http://www.securityfocus.com/bid/94905
- http://www.securitytracker.com/id/1037469
- https://support.apple.com/HT207423
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-4083. | CVE ID: CVE-2016-4083
Date Updated: 2024-08-06T00:17:31.171Z
Date Published: 2016-04-25T10:00:00
Description:
epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.3 does not ensure that data is available before array allocation, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1035685
- http://www.wireshark.org/security/wnpa-sec-2016-27.html
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=66417b17b3570b163a16ca81f71ce5bcb10548d2
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12341
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-1138. | CVE ID: CVE-2012-1138
Date Updated: 2024-08-06T18:45:27.576Z
Date Published: 2012-04-25T10:00:00
Description:
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/48797
- http://secunia.com/advisories/48508
- http://secunia.com/advisories/48822
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:057
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://support.apple.com/kb/HT5503
- http://www.securityfocus.com/bid/52318
- http://www.ubuntu.com/usn/USN-1403-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=733512
- http://secunia.com/advisories/48918
- http://www.openwall.com/lists/oss-security/2012/03/06/16
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html
- http://secunia.com/advisories/48973
- http://www.mozilla.org/security/announce/2012/mfsa2012-21.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html
- http://www.securitytracker.com/id?1026765
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html
- http://secunia.com/advisories/48951
- https://bugzilla.redhat.com/show_bug.cgi?id=800597
- http://security.gentoo.org/glsa/glsa-201204-04.xml
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-40684. | CVE ID: CVE-2022-40684
Date Updated: 2024-08-03T12:21:46.541Z
Date Published: 2022-10-18T00:00:00
Description:
An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://fortiguard.com/psirt/FG-IR-22-377
- http://packetstormsecurity.com/files/169431/Fortinet-FortiOS-FortiProxy-FortiSwitchManager-Authentication-Bypass.html
- http://packetstormsecurity.com/files/171515/Fortinet-7.2.1-Authentication-Bypass.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-20584. | CVE ID: CVE-2018-20584
Date Updated: 2024-08-05T12:05:17.688Z
Date Published: 2018-12-30T05:00:00
Description:
JasPer 2.0.14 allows remote attackers to cause a denial of service (application hang) via an attempted conversion to the jp2 format.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.debian.org/debian-lts-announce/2019/01/msg00003.html
- http://www.securityfocus.com/bid/106356
- https://github.com/mdadams/jasper/issues/192
- https://security.gentoo.org/glsa/201908-03
- https://www.oracle.com/security-alerts/cpuapr2020.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-26208. | CVE ID: CVE-2024-26208
Date Updated: 2024-08-01T23:59:32.833Z
Date Published: 2024-04-09T17:00:59.823Z
Description:
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26208
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-27614. | CVE ID: CVE-2022-27614
Date Updated: 2024-09-17T03:48:14.077Z
Date Published: 2022-07-28T06:55:12.139529Z
Description:
Exposure of sensitive information to an unauthorized actor vulnerability in web server in Synology Media Server before 1.8.1-2876 allows remote attackers to obtain sensitive information via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.synology.com/security/advisory/Synology_SA_20_24
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-2043. | CVE ID: CVE-2014-2043
Date Updated: 2024-08-06T09:58:16.236Z
Date Published: 2014-03-13T14:00:00
Description:
SQL injection vulnerability in Resources/System/Templates/Data.aspx in Procentia IntelliPen before 1.1.18.1658 allows remote authenticated users to execute arbitrary SQL commands via the value parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://seclists.org/fulldisclosure/2014/Mar/103
- http://www.securityfocus.com/archive/1/531426/100/0/threaded
- https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2043
- http://www.exploit-db.com/exploits/32212
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-11719. | CVE ID: CVE-2019-11719
Date Updated: 2024-08-04T23:03:32.425Z
Date Published: 2019-07-23T13:17:46
Description:
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html
- https://access.redhat.com/errata/RHSA-2019:1951
- https://security.gentoo.org/glsa/201908-12
- https://security.gentoo.org/glsa/201908-20
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-6774. | CVE ID: CVE-2017-6774
Date Updated: 2024-09-17T03:49:16.049Z
Date Published: 2017-08-17T20:00:00Z
Description:
A vulnerability in Cisco ASR 5000 Series Aggregated Services Routers running the Cisco StarOS operating system could allow an authenticated, remote attacker to overwrite or modify sensitive system files. The vulnerability is due to the inclusion of sensitive system files within specific FTP subdirectories. An attacker could exploit this vulnerability by overwriting sensitive configuration files through FTP. An exploit could allow the attacker to overwrite configuration files on an affected system. Cisco Bug IDs: CSCvd47739. Known Affected Releases: 21.0.v0.65839.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-staros2
- http://www.securityfocus.com/bid/100386
- http://www.securitytracker.com/id/1039182
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-4333. | CVE ID: CVE-2023-4333
Date Updated: 2024-09-24T14:43:56.277Z
Date Published: 2023-08-15T18:25:37.222Z
Description:
Broadcom RAID Controller web interface doesn’t enforce SSL cipher ordering by server
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.broadcom.com/support/resources/product-security-center
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-1122. | CVE ID: CVE-2008-1122
Date Updated: 2024-08-07T08:08:57.595Z
Date Published: 2008-03-03T22:00:00
Description:
SQL injection vulnerability in the downloads module in Koobi Pro 5.7 allows remote attackers to execute arbitrary SQL commands via the categ parameter to index.php. NOTE: it was later reported that this also affects Koobi CMS 4.2.4, 4.2.5, and 4.3.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40903
- https://www.exploit-db.com/exploits/5198
- http://www.securityfocus.com/bid/28031
- http://www.securityfocus.com/archive/1/490886/100/0/threaded
- https://www.exploit-db.com/exploits/5447
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.