instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2022-25801.
CVE ID: CVE-2022-25801 Date Updated: 2024-08-03T04:49:43.941Z Date Published: 2022-07-14T11:44:26 Description: Best Practical RT for Incident Response (RTIR) before 4.0.3 and 5.x before 5.0.3 allows SSRF via Scripted Action tools. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.bestpractical.com/release-notes/rtir/index.html - https://docs.bestpractical.com/release-notes/rtir/5.0.3 - https://docs.bestpractical.com/release-notes/rtir/4.0.3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-4594.
CVE ID: CVE-2020-4594 Date Updated: 2024-09-16T22:03:29.253Z Date Published: 2021-01-13T18:10:27.967475Z Description: IBM Security Guardium Insights 2.0.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 184800. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6403463 - https://exchange.xforce.ibmcloud.com/vulnerabilities/184800 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3335.
CVE ID: CVE-2016-3335 Date Updated: 2024-08-05T23:56:13.099Z Date Published: 2016-11-10T06:16:00 Description: The Common Log File System (CLFS) driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application, aka "Windows Common Log File System Driver Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0026, CVE-2016-3332, CVE-2016-3333, CVE-2016-3334, CVE-2016-3338, CVE-2016-3340, CVE-2016-3342, CVE-2016-3343, and CVE-2016-7184. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1037252 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-134 - http://www.securityfocus.com/bid/94011 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3472.
CVE ID: CVE-2010-3472 Date Updated: 2024-09-17T03:03:42.052Z Date Published: 2010-09-20T21:00:00Z Description: Multiple cross-site scripting (XSS) vulnerabilities in the Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 3.5.1 before 3.5.1-021 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://download2.boulder.ibm.com/sar/CMA/IMA/00yrk/0/readme-ae351-021.htm - http://www-01.ibm.com/support/docview.wss?uid=swg1PJ37466 - http://www.securityfocus.com/bid/43272 - http://secunia.com/advisories/41458 - http://www.vupen.com/english/advisories/2010/2419 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4903.
CVE ID: CVE-2008-4903 Date Updated: 2024-08-07T10:31:28.294Z Date Published: 2008-11-04T00:00:00 Description: Cross-site scripting (XSS) vulnerability in the leave comment (feedback) feature in Typo 5.1.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) comment[author] (Name) and (2) comment[url] (Website) parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/497970 - http://secunia.com/advisories/32272 - http://www.securityfocus.com/bid/31993 - https://exchange.xforce.ibmcloud.com/vulnerabilities/46204 - http://securityreason.com/securityalert/4550 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7272.
CVE ID: CVE-2014-7272 Date Updated: 2024-08-06T12:47:32.269Z Date Published: 2018-03-08T20:00:00 Description: Simple Desktop Display Manager (SDDM) before 0.10.0 allows local users to gain root privileges because code running as root performs write operations within a user home directory, and this user may have created links in advance (exploitation requires the user to win a race condition in the ~/.Xauthority chown case, but not other cases). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/sddm/sddm/pull/280 - https://bugzilla.redhat.com/show_bug.cgi?id=1149610 - http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141550.html - http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141494.html - http://www.openwall.com/lists/oss-security/2014/10/06/4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27408.
CVE ID: CVE-2024-27408 Date Updated: 2024-08-02T00:34:52.272Z Date Published: 2024-05-17T11:50:36.208Z Description: In the Linux kernel, the following vulnerability has been resolved: dmaengine: dw-edma: eDMA: Add sync read before starting the DMA transfer in remote setup The Linked list element and pointer are not stored in the same memory as the eDMA controller register. If the doorbell register is toggled before the full write of the linked list a race condition error will occur. In remote setup we can only use a readl to the memory to assure the full write has occurred. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/d24fe6d5a1cfdddb7a9ef56736ec501c4d0a5fd3 - https://git.kernel.org/stable/c/f396b4df27cfe01a99f4b41f584c49e56477be3a - https://git.kernel.org/stable/c/bbcc1c83f343e580c3aa1f2a8593343bf7b55bba No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-6098.
CVE ID: CVE-2020-6098 Date Updated: 2024-08-04T08:47:41.220Z Date Published: 2020-07-28T21:12:50 Description: An exploitable denial of service vulnerability exists in the freeDiameter functionality of freeDiameter 1.3.2. A specially crafted Diameter request can trigger a memory corruption resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1030 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0604.
CVE ID: CVE-2013-0604 Date Updated: 2024-08-06T14:33:05.176Z Date Published: 2013-01-10T11:00:00 Description: Heap-based buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0603. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html - http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html - http://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html - http://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html - http://www.adobe.com/support/security/bulletins/apsb13-02.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16008 - http://rhn.redhat.com/errata/RHSA-2013-0150.html - http://security.gentoo.org/glsa/glsa-201308-03.xml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21646.
CVE ID: CVE-2023-21646 Date Updated: 2024-08-02T09:44:02.064Z Date Published: 2023-09-05T06:23:55.261Z Description: Transient DOS in Modem while processing invalid System Information Block 1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7408.
CVE ID: CVE-2016-7408 Date Updated: 2024-08-06T01:57:47.520Z Date Published: 2017-03-03T16:00:00 Description: The dbclient in Dropbear SSH before 2016.74 allows remote attackers to execute arbitrary code via a crafted (1) -m or (2) -c argument. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201702-23 - http://www.securityfocus.com/bid/92970 - http://www.openwall.com/lists/oss-security/2016/09/15/2 - https://bugzilla.redhat.com/show_bug.cgi?id=1376353 - https://secure.ucc.asn.au/hg/dropbear/rev/eed9376a4ad6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2185.
CVE ID: CVE-2011-2185 Date Updated: 2024-08-06T22:53:17.523Z Date Published: 2011-07-27T01:29:00Z Description: Fabric before 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on (1) a /tmp/fab.*.tar file or (2) certain other files in the top level of /tmp/. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2011/06/06/12 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629003 - http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062534.html - http://www.openwall.com/lists/oss-security/2011/06/03/5 - https://bugzilla.redhat.com/show_bug.cgi?id=710462 - http://code.fabfile.org/projects/fabric/files/Fabric-1.1.0.tar.gz No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-47211.
CVE ID: CVE-2023-47211 Date Updated: 2024-08-02T21:01:22.684Z Date Published: 2024-01-08T14:45:37.183Z Description: A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1851 - https://www.manageengine.com/itom/advisory/cve-2023-47211.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10079.
CVE ID: CVE-2018-10079 Date Updated: 2024-08-05T07:32:00.894Z Date Published: 2018-04-20T21:00:00 Description: Geist WatchDog Console 3.2.2 uses a weak ACL for the C:\ProgramData\WatchDog Console directory, which allows local users to modify configuration data by updating (1) config.xml or (2) servers.xml. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/44493/ - http://packetstormsecurity.com/files/147253/Geist-WatchDog-Console-3.2.2-XSS-XML-Injection-Insecure-Permissions.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52059.
CVE ID: CVE-2023-52059 Date Updated: 2024-08-02T22:48:12.118Z Date Published: 2024-02-13T00:00:00 Description: A cross-site scripting (XSS) vulnerability in Gestsup v3.2.46 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description text field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gestsup.fr/index.php?page=download&channel=beta&version=3.2.46&type=patch - https://github.com/Tanguy-Boisset/CVE/blob/master/CVE-2023-52059/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52464.
CVE ID: CVE-2023-52464 Date Updated: 2024-08-02T23:03:19.771Z Date Published: 2024-02-23T14:46:24.150Z Description: In the Linux kernel, the following vulnerability has been resolved: EDAC/thunderx: Fix possible out-of-bounds string access Enabling -Wstringop-overflow globally exposes a warning for a common bug in the usage of strncat(): drivers/edac/thunderx_edac.c: In function 'thunderx_ocx_com_threaded_isr': drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=] 1136 | strncat(msg, other, OCX_MESSAGE_SIZE); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ... 1145 | strncat(msg, other, OCX_MESSAGE_SIZE); ... 1150 | strncat(msg, other, OCX_MESSAGE_SIZE); ... Apparently the author of this driver expected strncat() to behave the way that strlcat() does, which uses the size of the destination buffer as its third argument rather than the length of the source buffer. The result is that there is no check on the size of the allocated buffer. Change it to strlcat(). [ bp: Trim compiler output, fixup commit message. ] No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601 - https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6 - https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a - https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21 - https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398 - https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057 - https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5 - https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8 - https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html - https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3725.
CVE ID: CVE-2024-3725 Date Updated: 2024-08-01T20:20:00.967Z Date Published: 2024-05-02T16:52:40.615Z Description: The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Post Grid widget in all versions up to, and including, 2.6.9 due to insufficient input sanitization and output escaping on user supplied attributes such as 'titleTag'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/ceb041f6-b88a-495a-8f5f-7f39f640748d?source=cve - https://plugins.trac.wordpress.org/changeset/3071504/otter-blocks/trunk/inc/render/class-posts-grid-block.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-42079.
CVE ID: CVE-2023-42079 Date Updated: 2024-08-02T19:16:50.453Z Date Published: 2024-05-03T02:12:56.230Z Description: PDF-XChange Editor J2K File Parsing Uninitialized Variable Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of J2K files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21851. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-1380/ - https://www.tracker-software.com/support/security-bulletins.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32578.
CVE ID: CVE-2022-32578 Date Updated: 2024-08-03T07:46:44.252Z Date Published: 2023-05-10T13:16:59.691Z Description: Improper access control for the Intel(R) NUC Pro Software Suite before version 2.0.0.3 may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00834.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-21127.
CVE ID: CVE-2020-21127 Date Updated: 2024-08-04T14:22:25.603Z Date Published: 2021-09-15T16:16:48 Description: MetInfo 7.0.0 contains a SQL injection vulnerability via admin/?n=logs&c=index&a=dodel. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/T3qui1a/metinfo_sqlinjection/issues/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30715.
CVE ID: CVE-2022-30715 Date Updated: 2024-08-03T06:56:13.706Z Date Published: 2022-06-07T17:55:30 Description: Improper access control vulnerability in DofViewer prior to SMR Jun-2022 Release 1 allows attackers to control floating system alert window. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2020-5331
CVE-CVE-2020-5331 is a vulnerability in RSA Archer. It is related to the MITRE ATT&CK technique T1005: Data from Local System. The vulnerability is classified as a primary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2023-2271.
CVE ID: CVE-2023-2271 Date Updated: 2024-08-02T06:19:14.140Z Date Published: 2023-08-16T11:03:22.861Z Description: The Tiempo.com WordPress plugin through 0.1.2 does not have CSRF check when deleting its shortcode, which could allow attackers to make logged in admins delete arbitrary shortcode via a CSRF attack No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/31512f33-c310-4b36-b665-19293097cc8b No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-39915.
CVE ID: CVE-2022-39915 Date Updated: 2024-08-03T12:07:42.988Z Date Published: 2022-12-08T00:00:00 Description: Improper access control vulnerability in Calendar prior to versions 11.6.08.0 in Android Q(10), 12.2.11.3000 in Android R(11), 12.3.07.2000 in Android S(12), and 12.4.02.0 in Android T(13) allows attackers to access sensitive information via implicit intent. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=12 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40609.
CVE ID: CVE-2023-40609 Date Updated: 2024-09-05T14:01:00.333Z Date Published: 2023-11-06T08:15:24.225Z Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aiyaz, maheshpatel Contact form 7 Custom validation allows SQL Injection.This issue affects Contact form 7 Custom validation: from n/a through 1.1.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/cf7-field-validation/wordpress-contact-form-7-custom-validation-plugin-1-1-3-unauth-sql-injection-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10716.
CVE ID: CVE-2016-10716 Date Updated: 2024-09-17T02:21:35.341Z Date Published: 2018-03-16T13:00:00Z Description: The Mail.ru Calendar plugin before 2.5.0.61 for Atlassian Jira has XSS via the Name field in a Create Calender action, related to a MailRuCalendar.jspa#period/month URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://marketplace.atlassian.com/plugins/ru.mail.jira.plugins.mailrucal/versions - https://packetstormsecurity.com/files/137649/JIRA-Mail.ru-Calendar-2.4.2.50_JIRA6-Cross-Site-Scripting.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24094.
CVE ID: CVE-2022-24094 Date Updated: 2024-09-17T02:41:35.034Z Date Published: 2022-03-11T17:54:30.855277Z Description: Adobe After Effects versions 22.2 (and earlier) and 18.4.4 (and earlier) are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/after_effects/apsb22-17.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1628.
CVE ID: CVE-2020-1628 Date Updated: 2024-09-16T19:20:27.391Z Date Published: 2020-04-08T19:25:59.343679Z Description: Juniper Networks Junos OS uses the 128.0.0.0/2 subnet for internal communications between the RE and PFEs. It was discovered that packets utilizing these IP addresses may egress an EX4300 switch, leaking configuration information such as heartbeats, kernel versions, etc. out to the Internet, leading to an information exposure vulnerability. This issue affects Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D53 on EX4300; 15.1 versions prior to 15.1R7-S6 on EX4300; 15.1X49 versions prior to 15.1X49-D200, 15.1X49-D210 on EX4300; 16.1 versions prior to 16.1R7-S7 on EX4300; 17.1 versions prior to 17.1R2-S11, 17.1R3-S2 on EX4300; 17.2 versions prior to 17.2R3-S3 on EX4300; 17.3 versions prior to 17.3R2-S5, 17.3R3-S7 on EX4300; 17.4 versions prior to 17.4R2-S9, 17.4R3 on EX4300; 18.1 versions prior to 18.1R3-S8 on EX4300; 18.2 versions prior to 18.2R3-S2 on EX4300; 18.3 versions prior to 18.3R2-S3, 18.3R3, 18.3R3-S1 on EX4300; 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3 on EX4300; 19.1 versions prior to 19.1R1-S4, 19.1R2 on EX4300; 19.2 versions prior to 19.2R1-S4, 19.2R2 on EX4300; 19.3 versions prior to 19.3R1-S1, 19.3R2 on EX4300. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.juniper.net/JSA11008 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29415.
CVE ID: CVE-2021-29415 Date Updated: 2024-08-03T22:02:51.779Z Date Published: 2021-05-21T11:29:59 Description: The elliptic curve cryptography (ECC) hardware accelerator, part of the ARM® TrustZone® CryptoCell 310, contained in the NordicSemiconductor nRF52840 through 2021-03-29 has a non-constant time ECDSA implemenation. This allows an adversary to recover the private ECC key used during an ECDSA operation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sit.fraunhofer.de/en/news-events/downloads-services/cve/ - https://eprint.iacr.org/2021/640 - https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0320.
CVE ID: CVE-2009-0320 Date Updated: 2024-08-07T04:31:25.585Z Date Published: 2009-01-28T18:00:00 Description: Microsoft Windows XP, Server 2003 and 2008, and Vista exposes I/O activity measurements of all processes, which allows local users to obtain sensitive information, as demonstrated by reading the I/O Other Bytes column in Task Manager (aka taskmgr.exe) to estimate the number of characters that a different user entered at a runas.exe password prompt, related to a "benchmarking attack." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/33440 - http://www.securityfocus.com/archive/1/500393/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0364.
CVE ID: CVE-2024-0364 Date Updated: 2024-08-01T18:04:49.449Z Date Published: 2024-01-10T03:00:05.400Z Description: A vulnerability, which was classified as critical, was found in PHPGurukul Hospital Management System 1.0. This affects an unknown part of the file admin/query-details.php. The manipulation of the argument adminremark leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250131. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.250131 - https://vuldb.com/?ctiid.250131 - https://github.com/laoquanshi/PHPGurukul-Hospital-Management-System/blob/main/PHPGurukul%20Hospital%20Management%20System%20SQL11.docx No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0387.
CVE ID: CVE-2008-0387 Date Updated: 2024-08-07T07:46:55.114Z Date Published: 2008-01-29T01:00:00 Description: Integer overflow in Firebird SQL 1.0.3 and earlier, 1.5.x before 1.5.6, 2.0.x before 2.0.4, and 2.1.x before 2.1.0 RC1 might allow remote attackers to execute arbitrary code via crafted (1) op_receive, (2) op_start, (3) op_start_and_receive, (4) op_send, (5) op_start_and_send, and (6) op_start_send_and_receive XDR requests, which triggers memory corruption. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://security.gentoo.org/glsa/glsa-200803-02.xml - http://secunia.com/advisories/29203 - https://exchange.xforce.ibmcloud.com/vulnerabilities/39996 - http://www.coresecurity.com/?action=item&id=2095 - http://sourceforge.net/project/shownotes.php?group_id=9028&release_id=570800 - http://www.securityfocus.com/archive/1/487173/100/0/threaded - http://secunia.com/advisories/29501 - http://securityreason.com/securityalert/3580 - http://www.securityfocus.com/bid/27403 - http://tracker.firebirdsql.org/browse/CORE-1681 - http://www.debian.org/security/2008/dsa-1529 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7253.
CVE ID: CVE-2018-7253 Date Updated: 2024-08-05T06:24:11.291Z Date Published: 2018-02-19T23:00:00 Description: The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://usn.ubuntu.com/3578-1/ - https://www.debian.org/security/2018/dsa-4125 - https://github.com/dbry/WavPack/issues/28 - https://github.com/dbry/WavPack/commit/36a24c7881427d2e1e4dc1cef58f19eee0d13aec - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889559 - https://seclists.org/bugtraq/2019/Dec/37 - http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15198.
CVE ID: CVE-2020-15198 Date Updated: 2024-08-04T13:08:22.711Z Date Published: 2020-09-25T18:40:25 Description: In Tensorflow before version 2.3.1, the `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has the same shape as the `values` one. The values in these tensors are always accessed in parallel. Thus, a shape mismatch can result in accesses outside the bounds of heap allocated buffers. The issue is patched in commit 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and is released in TensorFlow version 2.3.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1 - https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02 - https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jc87-6vpp-7ff3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25451.
CVE ID: CVE-2024-25451 Date Updated: 2024-08-01T23:44:09.548Z Date Published: 2024-02-09T00:00:00 Description: Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_DataBuffer::ReallocateBuffer() function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/axiomatic-systems/Bento4/issues/872 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41731.
CVE ID: CVE-2021-41731 Date Updated: 2024-08-04T03:15:29.252Z Date Published: 2022-09-16T16:18:09 Description: Cross Site Scripting (XSS vulnerability exists in )Sourcecodester News247 News Magazine (CMS) PHP 5.6 or higher and MySQL 5.7 or higher via the blog category name field No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sourcecodester.com - http://packetstormsecurity.com/files/168384/News247-News-Magazine-1.0-Cross-Site-Scripting.html - https://cxsecurity.com/issue/WLB-2022090039 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-34584.
CVE ID: CVE-2021-34584 Date Updated: 2024-09-16T22:25:58.664Z Date Published: 2021-10-26T09:55:46.638935Z Description: Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16876&token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7&download= - https://www.tenable.com/security/research/tra-2021-47 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6546.
CVE ID: CVE-2018-6546 Date Updated: 2024-08-05T06:10:10.171Z Date Published: 2018-04-13T16:00:00 Description: plays_service.exe in the plays.tv service before 1.27.7.0, as distributed in AMD driver-installation packages and Gaming Evolved products, executes code at a user-defined (local or SMB) path as SYSTEM when the execute_installer parameter is used in an HTTP message. This occurs without properly authenticating the user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/securifera/CVE-2018-6546-Exploit/ - https://www.exploit-db.com/exploits/44476/ - https://www.securifera.com/advisories/CVE-2018-6546/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17354.
CVE ID: CVE-2017-17354 Date Updated: 2020-11-05T22:57:25 Date Published: 2020-11-05T22:57:25 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1458.
CVE ID: CVE-2023-1458 Date Updated: 2024-08-02T05:49:11.425Z Date Published: 2023-03-25T00:00:00 Description: A vulnerability has been found in Ubiquiti EdgeRouter X 2.0.9-hotfix.6 and classified as critical. Affected by this vulnerability is an unknown functionality of the component OSPF Handler. The manipulation of the argument area leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-223303. NOTE: The vendor position is that post-authentication issues are not accepted as vulnerabilities. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.223303 - https://vuldb.com/?ctiid.223303 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21640.
CVE ID: CVE-2023-21640 Date Updated: 2024-08-02T09:44:01.947Z Date Published: 2023-07-04T04:46:36.134Z Description: Memory corruption in Linux when the file upload API is called with parameters having large buffer. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11217.
CVE ID: CVE-2017-11217 Date Updated: 2024-09-16T18:29:39.007Z Date Published: 2017-08-11T19:00:00Z Description: Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to drawing of Unicode text strings. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/100184 - https://helpx.adobe.com/security/products/acrobat/apsb17-24.html - http://www.securitytracker.com/id/1039098 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-42967.
CVE ID: CVE-2022-42967 Date Updated: 2024-08-03T13:19:05.492Z Date Published: 2023-01-11T00:00:00 Description: Caret is vulnerable to an XSS attack when the user opens a crafted Markdown file when preview mode is enabled. This directly leads to client-side code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://research.jfrog.com/vulnerabilities/caret-xss-rce/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12824.
CVE ID: CVE-2018-12824 Date Updated: 2024-08-05T08:45:02.215Z Date Published: 2018-08-29T13:00:00 Description: Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/105066 - https://access.redhat.com/errata/RHSA-2018:2435 - http://www.securitytracker.com/id/1041448 - https://helpx.adobe.com/security/products/flash-player/apsb18-25.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5173.
CVE ID: CVE-2008-5173 Date Updated: 2024-08-07T10:40:17.245Z Date Published: 2008-11-19T18:00:00 Description: Unspecified vulnerability in testMaker before 3.0p16 allows remote authenticated users to execute arbitrary PHP code via unspecified attack vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/43403 - http://sourceforge.net/project/shownotes.php?release_id=609679 - http://secunia.com/advisories/30870 - http://www.securityfocus.com/bid/29978 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2352.
CVE ID: CVE-2014-2352 Date Updated: 2024-08-06T10:14:25.305Z Date Published: 2014-05-30T23:00:00 Description: Directory traversal vulnerability in Cogent DataHub before 7.3.5 allows remote attackers to read arbitrary files of unspecified types, or cause a web-server denial of service, via a crafted pathname. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://ics-cert.us-cert.gov/advisories/ICSA-14-149-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5294.
CVE ID: CVE-2016-5294 Date Updated: 2024-08-06T00:53:49.006Z Date Published: 2018-06-11T21:00:00 Description: The Mozilla Updater can be made to choose an arbitrary target working directory for output files resulting from the update process. This vulnerability requires local system access. Note: this issue only affects Windows operating systems. This vulnerability affects Thunderbird < 45.5, Firefox ESR < 45.5, and Firefox < 50. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1246972 - http://www.securitytracker.com/id/1037298 - https://security.gentoo.org/glsa/201701-15 - http://www.securityfocus.com/bid/94336 - https://www.mozilla.org/security/advisories/mfsa2016-93/ - https://www.mozilla.org/security/advisories/mfsa2016-89/ - https://www.mozilla.org/security/advisories/mfsa2016-90/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-9325.
CVE ID: CVE-2018-9325 Date Updated: 2024-08-05T07:17:51.839Z Date Published: 2018-04-07T21:00:00 Description: Etherpad 1.5.x and 1.6.x before 1.6.4 allows an attacker to export all the existing pads of an instance without knowledge of pad names. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://blog.etherpad.org/2018/04/07/important-release-1-6-4/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8585.
CVE ID: CVE-2020-8585 Date Updated: 2024-08-04T10:03:46.181Z Date Published: 2021-01-28T21:00:20 Description: OnCommand Unified Manager Core Package versions prior to 5.2.5 may disclose sensitive account information to unauthorized users via the use of PuTTY Link (plink). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.netapp.com/advisory/ntap-20210128-0001/ - https://security.netapp.com/advisory/NTAP-20210128-0001 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18540.
CVE ID: CVE-2019-18540 Date Updated: 2019-10-28T14:42:38 Date Published: 2019-10-28T14:42:38 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8693.
CVE ID: CVE-2019-8693 Date Updated: 2024-08-04T21:24:29.515Z Date Published: 2019-12-18T17:33:21 Description: A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Mojave 10.14.6. An application may be able to read restricted memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT210348 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5451.
CVE ID: CVE-2019-5451 Date Updated: 2024-08-04T19:54:53.493Z Date Published: 2019-07-30T20:33:47 Description: Bypass lock protection in the Nextcloud Android app prior to version 3.6.1 allows accessing the files when repeatedly opening and closing the app in a very short time. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/507172 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22228.
CVE ID: CVE-2021-22228 Date Updated: 2024-08-03T18:37:18.219Z Date Published: 2021-07-06T21:34:10 Description: An issue has been discovered in GitLab affecting all versions before 13.11.6, all versions starting from 13.12 before 13.12.6, and all versions starting from 14.0 before 14.0.2. Improper access control allows unauthorised users to access project details using Graphql. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab/-/issues/332605 - https://hackerone.com/reports/1192460 - https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22228.json No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0655.
CVE ID: CVE-2024-0655 Date Updated: 2024-08-01T18:11:35.721Z Date Published: 2024-01-18T01:31:04.004Z Description: A vulnerability has been found in Novel-Plus 4.3.0-RC1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /novel/bookSetting/list. The manipulation of the argument sort leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251383. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.251383 - https://vuldb.com/?ctiid.251383 - https://github.com/red0-ZhaoSi/CVE/blob/main/novel-plus/sql/sql_1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21850.
CVE ID: CVE-2021-21850 Date Updated: 2024-08-03T18:23:29.577Z Date Published: 2021-08-25T18:26:11 Description: An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow when the library encounters an atom using the “trun” FOURCC code due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1297 - https://www.debian.org/security/2021/dsa-4966 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9563.
CVE ID: CVE-2020-9563 Date Updated: 2024-08-04T10:34:39.641Z Date Published: 2020-06-26T20:10:59 Description: Adobe Bridge versions 10.0.1 and earlier version have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/bridge/apsb20-19.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33035.
CVE ID: CVE-2021-33035 Date Updated: 2024-08-03T23:42:19.143Z Date Published: 2021-09-23T08:10:10 Description: Apache OpenOffice opens dBase/DBF documents and shows the contents as spreadsheets. DBF are database files with data organized in fields. When reading DBF data the size of certain fields is not checked: the data is just copied into local variables. A carefully crafted document could overflow the allocated space, leading to the execution of arbitrary code by altering the contents of the program stack. This issue affects Apache OpenOffice up to and including version 4.1.10 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/apache/openoffice/commit/efddaef0151af3be16078cc4d88c6bae0f911e56#diff-ea66e734dd358922aba12ad4ba39c96bdc6cbde587d07dbc63d04daa0a30e90f - https://lists.apache.org/thread.html/r929c0c6a53cad64a1007b878342756badbb05ddd9b8f31a6d0b424cb%40%3Cannounce.apache.org%3E - https://lists.apache.org/thread.html/r1ab8532e11f41bc7ca057ac7e39cab25f2e1f9d5f4929788ae21c8b9%40%3Cusers.openoffice.apache.org%3E - http://www.openwall.com/lists/oss-security/2021/10/07/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28854.
CVE ID: CVE-2023-28854 Date Updated: 2024-08-02T13:51:38.395Z Date Published: 2023-04-03T17:55:56.789Z Description: nophp is a PHP web framework. Prior to version 0.0.1, nophp is vulnerable to shell command injection on httpd user. A patch was made available at commit e5409aa2d441789cbb35f6b119bef97ecc3986aa on 2023-03-30. Users should update index.php to 2023-03-30 or later or, as a workaround, add a function such as `env_patchsample230330.php` to env.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/paijp/nophp/security/advisories/GHSA-9858-q3c2-9wwm - https://github.com/paijp/nophp/commit/e5409aa2d441789cbb35f6b119bef97ecc3986aa - https://github.com/paijp/nophp/releases/tag/v0.0.1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7609.
CVE ID: CVE-2017-7609 Date Updated: 2024-08-05T16:12:26.916Z Date Published: 2017-04-09T14:00:00 Description: elf_compress.c in elfutils 0.168 does not validate the zlib compression factor, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://usn.ubuntu.com/3670-1/ - https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c - https://security.gentoo.org/glsa/201710-10 - http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2084.
CVE ID: CVE-2011-2084 Date Updated: 2024-08-06T22:46:00.987Z Date Published: 2012-06-04T19:00:00 Description: Best Practical Solutions RT 3.x before 3.8.12 and 4.x before 4.0.6 allows remote authenticated users to read (1) hashes of former passwords and (2) ticket correspondence history by leveraging access to a privileged account. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html - http://secunia.com/advisories/49259 - http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html - http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000202.html - http://www.securityfocus.com/bid/53660 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5099.
CVE ID: CVE-2017-5099 Date Updated: 2024-08-05T14:47:44.387Z Date Published: 2017-10-27T05:00:00 Description: Insufficient validation of untrusted input in PPAPI Plugins in Google Chrome prior to 60.0.3112.78 for Mac allowed a remote attacker to potentially gain privilege elevation via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://crbug.com/733548 - https://security.gentoo.org/glsa/201709-15 - http://www.debian.org/security/2017/dsa-3926 - https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html - http://www.securityfocus.com/bid/99950 - https://access.redhat.com/errata/RHSA-2017:1833 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6326.
CVE ID: CVE-2012-6326 Date Updated: 2024-09-16T21:57:31.362Z Date Published: 2013-02-22T20:00:00Z Description: VMware vCenter Server 4.1 before Update 3 and 5.0 before Update 2, and vCSA 5.0 before Update 2, allows remote attackers to cause a denial of service (disk consumption) via vectors that trigger large log entries. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vmware.com/security/advisories/VMSA-2012-0018.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32736.
CVE ID: CVE-2022-32736 Date Updated: 2023-05-29T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27936.
CVE ID: CVE-2023-27936 Date Updated: 2024-08-02T12:23:30.050Z Date Published: 2023-05-08T00:00:00 Description: An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. An app may be able to cause unexpected system termination or write kernel memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213670 - https://support.apple.com/en-us/HT213677 - https://support.apple.com/en-us/HT213675 - https://support.apple.com/en-us/HT213673 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0383.
CVE ID: CVE-2017-0383 Date Updated: 2024-08-05T13:03:57.009Z Date Published: 2017-01-12T20:00:00 Description: An elevation of privilege vulnerability in the Framework APIs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 7.0, 7.1. Android ID: A-31677614. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-01-01.html - http://www.securityfocus.com/bid/95243 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2244.
CVE ID: CVE-2008-2244 Date Updated: 2024-08-07T08:58:00.789Z Date Published: 2008-07-09T22:00:00 Description: Microsoft Office Word 2002 SP3 allows remote attackers to execute arbitrary code via a .doc file that contains malformed data, as exploited in the wild in July 2008, and as demonstrated by attachement.doc. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/30975 - http://isc.sans.org/diary.html?storyid=4696 - http://www.microsoft.com/technet/security/advisory/953635.mspx - http://www.us-cert.gov/cas/techalerts/TA08-225A.html - http://blogs.technet.com/msrc/archive/2008/07/08/vulnerability-in-microsoft-word-could-allow-remote-code-execution.aspx - http://marc.info/?l=bugtraq&m=121915960406986&w=2 - http://marc.info/?l=bugtraq&m=121915960406986&w=2 - http://www.vupen.com/english/advisories/2008/2028 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5897 - http://www.securityfocus.com/bid/30124 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43663 - http://www.securitytracker.com/id?1020447 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0591.
CVE ID: CVE-2016-0591 Date Updated: 2024-08-05T22:22:55.742Z Date Published: 2016-01-21T02:00:00 Description: Unspecified vulnerability in the PeopleSoft Enterprise SCM Purchasing component in Oracle PeopleSoft Products 9.1 and 9.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Supplier Change. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html - http://www.securitytracker.com/id/1034720 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5235.
CVE ID: CVE-2024-5235 Date Updated: 2024-08-01T21:03:11.052Z Date Published: 2024-05-23T05:00:05.167Z Description: A vulnerability classified as critical has been found in Campcodes Complete Web-Based School Management System 1.0. Affected is an unknown function of the file /view/teacher_salary_invoice.php. The manipulation of the argument teacher_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-265986 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.265986 - https://vuldb.com/?ctiid.265986 - https://vuldb.com/?submit.339811 - https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2025.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-7168.
CVE ID: CVE-2008-7168 Date Updated: 2024-08-07T11:56:14.394Z Date Published: 2009-09-08T10:00:00 Description: Insecure method vulnerability in the UUSee UUUpgrade ActiveX control (UUUpgrade.ocx 3.0.2.12) allows remote attackers to force the download and overwrite of arbitrary files via crafted arguments to the Update method, as exploited in the wild in June 2009. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/29963 - http://downloads.securityfocus.com/vulnerabilities/exploits/29963.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/43428 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1650 : Acquire Access
Name: Acquire Access ID: T1650 URL: https://attack.mitre.org/techniques/T1650 Platforms: PRE Kill Chain Phases: Resource Development Description: Adversaries may purchase or otherwise acquire an existing access to a target system or network. A variety of online services and initial access broker networks are available to sell access to previously compromised systems.(Citation: Microsoft Ransomware as a Service)(Citation: CrowdStrike Access Brokers)(Citation: Krebs Access Brokers Fortune 500) In some cases, adversary groups may form partnerships to share compromised systems with each other.(Citation: CISA Karakurt 2022) Footholds to compromised systems may take a variety of forms, such as access to planted backdoors (e.g., [Web Shell](T1505.003)) or established access via [External Remote Services](T1133). In some cases, access brokers will implant compromised systems with a “load” that can be used to install additional malware for paying customers.(Citation: Microsoft Ransomware as a Service) By leveraging existing access broker networks rather than developing or obtaining their own initial access capabilities, an adversary can potentially reduce the resources required to gain a foothold on a target network and focus their efforts on later stages of compromise. Adversaries may prioritize acquiring access to systems that have been determined to lack security monitoring or that have high privileges, or systems that belong to organizations in a particular sector.(Citation: Microsoft Ransomware as a Service)(Citation: CrowdStrike Access Brokers) In some cases, purchasing access to an organization in sectors such as IT contracting, software development, or telecommunications may allow an adversary to compromise additional victims via a [Trusted Relationship](T1199), [Multi-Factor Authentication Interception](T1111), or even [Supply Chain Compromise](T1195). **Note:** while this technique is distinct from other behaviors such as [Purchase Technical Data](T1597.002) and [Credentials](T1589.001), they may often be used in conjunction (especially where the acquired foothold requires [Valid Accounts](T1078)). Data Sources: Detection: Much of this takes place outside the visibility of the target organization, making detection difficult for defenders. Detection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.
Provide detailed information about CVE-2022-34918.
CVE ID: CVE-2022-34918 Date Updated: 2024-08-03T09:22:10.749Z Date Published: 2022-07-04T20:07:32 Description: An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6 - https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452%40randorisec.fr/T/#u - https://www.openwall.com/lists/oss-security/2022/07/02/3 - http://www.openwall.com/lists/oss-security/2022/07/05/1 - https://www.randorisec.fr/crack-linux-firewall/ - https://www.debian.org/security/2022/dsa-5191 - http://www.openwall.com/lists/oss-security/2022/08/06/5 - https://security.netapp.com/advisory/ntap-20220826-0004/ - http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html - http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22145.
CVE ID: CVE-2021-22145 Date Updated: 2024-08-03T18:37:17.274Z Date Published: 2021-07-21T11:20:52 Description: A memory disclosure vulnerability was identified in Elasticsearch 7.10.0 to 7.13.3 error reporting. A user with the ability to submit arbitrary queries to Elasticsearch could submit a malformed query that would result in an error message returned containing previously used portions of a data buffer. This buffer could contain sensitive information such as Elasticsearch documents or authentication details. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2022.html - https://security.netapp.com/advisory/ntap-20210827-0006/ - https://discuss.elastic.co/t/elasticsearch-7-13-4-security-update/279177 - http://packetstormsecurity.com/files/163648/ElasticSearch-7.13.3-Memory-Disclosure.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-51664.
CVE ID: CVE-2023-51664 Date Updated: 2024-09-25T20:17:19.352Z Date Published: 2023-12-27T16:58:31.908Z Description: tj-actions/changed-files is a Github action to retrieve all files and directories. Prior to 41.0.0, the `tj-actions/changed-files` workflow allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets. This issue may lead to arbitrary command execution in the GitHub Runner. This vulnerability has been addressed in version 41.0.0. Users are advised to upgrade. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tj-actions/changed-files/security/advisories/GHSA-mcph-m25j-8j63 - https://github.com/tj-actions/changed-files/commit/0102c07446a3cad972f4afcbd0ee4dbc4b6d2d1b - https://github.com/tj-actions/changed-files/commit/716b1e13042866565e00e85fd4ec490e186c4a2f - https://github.com/tj-actions/changed-files/commit/ff2f6e6b91913a7be42be1b5917330fe442f2ede No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-43489.
CVE ID: CVE-2023-43489 Date Updated: 2024-08-14T16:05:02.244Z Date Published: 2024-08-14T13:45:24.379Z Description: Improper access control for some Intel(R) CIP software before version 2.4.10717 may allow an authenticated user to potentially enable denial of service via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01112.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30621.
CVE ID: CVE-2021-30621 Date Updated: 2024-08-03T22:40:31.469Z Date Published: 2021-09-03T19:25:59 Description: Chromium: CVE-2021-30621 UI Spoofing in Autofill No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-30621 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPJPUSAWIJMQFBQQQYXAICLI4EKFQOH6/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2381.
CVE ID: CVE-2010-2381 Date Updated: 2024-08-07T02:32:16.409Z Date Published: 2010-07-13T22:07:00 Description: Unspecified vulnerability in the Application Server Control component in Oracle Fusion Middleware 10.1.2.3 and 10.1.4.0.1 allows remote authenticated users to affect integrity via unknown vectors, a different vulnerability than CVE-2010-0081. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34352.
CVE ID: CVE-2024-34352 Date Updated: 2024-08-02T02:51:10.692Z Date Published: 2024-05-09T14:38:19.241Z Description: 1Panel is an open source Linux server operation and maintenance management panel. Prior to v1.10.3-lts, there are many command injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. The mirror configuration write symbol `>` can be used to achieve arbitrary file writing. This vulnerability is fixed in v1.10.3-lts. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0129.
CVE ID: CVE-2011-0129 Date Updated: 2024-08-06T21:43:14.918Z Date Published: 2011-03-03T19:00:00 Description: WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/kb/HT4564 - http://support.apple.com/kb/HT4566 - http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html - http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17161 - http://support.apple.com/kb/HT4554 - http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6870.
CVE ID: CVE-2008-6870 Date Updated: 2024-08-07T11:49:02.193Z Date Published: 2009-07-23T19:00:00 Description: Merlix Educate Server allows remote attackers to bypass intended security restrictions and obtain sensitive information via a direct request to (1) config.asp and (2) users.asp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/47107 - https://www.exploit-db.com/exploits/7348 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0677.
CVE ID: CVE-2014-0677 Date Updated: 2024-08-06T09:27:18.644Z Date Published: 2014-01-22T21:00:00 Description: The Label Distribution Protocol (LDP) functionality in Cisco NX-OS allows remote attackers to cause a denial of service (temporary LDP session outage) via LDP discovery traffic containing malformed Hello messages, aka Bug ID CSCul88851. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/65074 - http://secunia.com/advisories/56611 - https://exchange.xforce.ibmcloud.com/vulnerabilities/90623 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0677 - http://tools.cisco.com/security/center/viewAlert.x?alertId=32532 - http://osvdb.org/102368 - http://www.securitytracker.com/id/1029691 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-29508.
CVE ID: CVE-2020-29508 Date Updated: 2024-09-16T16:13:48.635Z Date Published: 2022-07-11T19:25:32.041607Z Description: Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain an Improper Input Validation Vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000181115/dsa-2020-286-dell-bsafe-crypto-c-micro-edition-4-1-5-and-dell-bsafe-micro-edition-suite-4-6-multiple-security-vulnerabilities - https://www.oracle.com/security-alerts/cpujul2022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4139.
CVE ID: CVE-2016-4139 Date Updated: 2024-08-06T00:17:31.177Z Date Published: 2016-06-16T14:00:00 Description: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1036117 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083 - http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html - https://access.redhat.com/errata/RHSA-2016:1238 - http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html - http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html - https://helpx.adobe.com/security/products/flash-player/apsb16-18.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21308.
CVE ID: CVE-2024-21308 Date Updated: 2024-09-19T17:36:27.964Z Date Published: 2024-07-09T17:02:46.353Z Description: SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21308 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-43271.
CVE ID: CVE-2023-43271 Date Updated: 2024-09-19T15:54:40.735Z Date Published: 2023-10-09T00:00:00 Description: Incorrect access control in 70mai a500s v1.2.119 allows attackers to directly access and delete the video files of the driving recorder through ftp and other protocols. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Question-h/vuln/blob/master/70mai_a500s_backdoor.md - https://github.com/Question-h/vuln/blob/master/CVE-2023-43271.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33208.
CVE ID: CVE-2021-33208 Date Updated: 2024-08-03T23:42:20.273Z Date Published: 2022-03-30T21:52:08 Description: The "Register an Ehcache Configuration File" admin feature in MashZone NextGen through 10.7 GA allows XXE attacks via a malicious XML configuration file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.softwareag.com/corporate/products/az/mashzone_nextgen/default - https://github.com/blackarrowsec/advisories/tree/master/2021/CVE-2021-33208 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7827.
CVE ID: CVE-2017-7827 Date Updated: 2024-08-05T16:19:27.725Z Date Published: 2018-06-11T21:00:00 Description: Memory safety bugs were reported in Firefox 56. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 57. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/buglist.cgi?bug_id=1399922%2C1403646%2C1403716%2C1365894%2C1402876%2C1406154%2C1384121%2C1384615%2C1407375%2C1339485%2C1361432%2C1394031%2C1383019%2C1407032%2C1387845%2C1386490 - https://www.mozilla.org/security/advisories/mfsa2017-24/ - http://www.securityfocus.com/bid/101832 - http://www.securitytracker.com/id/1039803 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4405.
CVE ID: CVE-2010-4405 Date Updated: 2024-09-16T19:41:25.433Z Date Published: 2010-12-04T23:00:00Z Description: Cross-site scripting (XSS) vulnerability in the Yannick Gaultier sh404SEF component before 2.1.8.777 for Joomla! allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://dev.anything-digital.com/Forum/Announcements/9100-Urgent-sh404SEF-security-release-Joomla-1.5/ - http://secunia.com/advisories/42430 - http://twitter.com/jeffchannell/status/8603529560195072 - http://www.securityfocus.com/bid/45135 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4755.
CVE ID: CVE-2017-4755 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42391.
CVE ID: CVE-2021-42391 Date Updated: 2024-08-04T03:30:38.353Z Date Published: 2022-03-14T22:20:33 Description: Divide-by-zero in Clickhouse's Gorilla compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18690.
CVE ID: CVE-2017-18690 Date Updated: 2024-08-05T21:28:55.809Z Date Published: 2020-04-07T14:04:45 Description: An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), M(6.0), and N(7.0) (Exynos54xx, Exynos7420, Exynos8890, or Exynos8895 chipsets) software. There is a buffer overflow in the sensor hub. The Samsung ID is SVE-2016-7484 (January 2017). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1203
The MITRE ATT&CK technique T1203: Exploitation for Client Execution is related to the vulnerability CVE-CVE-2017-10271. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2020-36439.
CVE ID: CVE-2020-36439 Date Updated: 2024-08-04T17:30:07.341Z Date Published: 2021-08-08T05:18:19 Description: An issue was discovered in the ticketed_lock crate before 0.3.0 for Rust. There are unconditional implementations of Send for ReadTicket<T> and WriteTicket<T>. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://rustsec.org/advisories/RUSTSEC-2020-0119.html - https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ticketed_lock/RUSTSEC-2020-0119.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5754.
CVE ID: CVE-2008-5754 Date Updated: 2024-08-07T11:04:44.538Z Date Published: 2008-12-30T17:00:00 Description: Stack-based buffer overflow in BulletProof FTP Client allows user-assisted attackers to execute arbitrary code via a .bps file (aka Session-File) with a long second line, possibly a related issue to CVE-2008-5753. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/7589 - http://www.securityfocus.com/bid/33024 - https://www.exploit-db.com/exploits/8420 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36088.
CVE ID: CVE-2022-36088 Date Updated: 2024-08-03T09:52:00.516Z Date Published: 2022-09-07T22:55:10 Description: GoCD is a continuous delivery server. Windows installations via either the server or agent installers for GoCD prior to 22.2.0 do not adequately restrict permissions when installing outside of the default location. This could allow a malicious user with local access to the server GoCD Server or Agent are installed on to modify executables or components of the installation. This does not affect zip file-based installs, installations to other platforms, or installations inside `Program Files` or `Program Files (x86)`. This issue is fixed in GoCD 22.2.0 installers. As a workaround, if the server or agent is installed outside of `Program Files (x86)`, verify the the permission of the Server or Agent installation directory to ensure the `Everyone` user group does not have `Full Control`, `Modify` or `Write` permissions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/gocd/gocd/security/advisories/GHSA-gpv4-xqhc-5vcj - https://github.com/gocd/gocd/commit/96add9605096ab50c5cd4c229be1d503aff506a6 - https://github.com/gocd/gocd/releases/tag/22.2.0 - https://www.gocd.org/releases/#22-2-0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18528.
CVE ID: CVE-2017-18528 Date Updated: 2024-08-05T21:28:55.260Z Date Published: 2019-08-20T15:44:19 Description: The pdf-print plugin before 1.9.4 for WordPress has multiple XSS issues. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/pdf-print/#developers No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1341.
CVE ID: CVE-2010-1341 Date Updated: 2024-08-07T01:21:18.607Z Date Published: 2010-04-09T18:00:00 Description: SQL injection vulnerability in index.php in Systemsoftware Community Black Forum allows remote attackers to execute arbitrary SQL commands via the s_flaeche parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.osvdb.org/62920 - http://www.exploit-db.com/exploits/11715 - https://exchange.xforce.ibmcloud.com/vulnerabilities/56861 - http://secunia.com/advisories/38960 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3100.
CVE ID: CVE-2016-3100 Date Updated: 2024-08-05T23:47:56.979Z Date Published: 2016-07-13T15:00:00 Description: kinit in KDE Frameworks before 5.23.0 uses weak permissions (644) for /tmp/xauth-xxx-_y, which allows local users to obtain X11 cookies of other users and consequently capture keystrokes and possibly gain privileges by reading the file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=dece8fd89979cd1a86c03bcaceef6e9221e8d8cd - https://quickgit.kde.org/?p=kinit.git&a=commitdiff&h=72f3702dbe6cf15c06dc13da2c99c864e9022a58 - http://www.securityfocus.com/bid/91769 - http://lists.opensuse.org/opensuse-updates/2016-07/msg00001.html - https://bugs.kde.org/show_bug.cgi?id=358593 - http://www.kde.com/announcements/kde-frameworks-5.23.0.php - https://www.kde.org/info/security/advisory-20160621-1.txt - https://bugs.kde.org/show_bug.cgi?id=363140 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4000.
CVE ID: CVE-2023-4000 Date Updated: 2024-08-02T07:17:11.390Z Date Published: 2023-08-31T05:33:11.745Z Description: The Waiting: One-click countdowns plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.6.2. This is due to missing or incorrect nonce validation on its AJAX actions. This makes it possible for unauthenticated attackers to create and delete countdowns, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/7ffba592-6d0d-408f-89fa-079066750b0a?source=cve - https://plugins.trac.wordpress.org/browser/waiting/trunk/waiting.php?rev=2826039 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2098.
CVE ID: CVE-2014-2098 Date Updated: 2024-08-06T10:05:59.475Z Date Published: 2014-03-02T02:00:00 Description: libavcodec/wmalosslessdec.c in FFmpeg before 2.1.4 uses an incorrect data-structure size for certain coefficients, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted WMA data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=ec9578d54d09b64bf112c2bf7a34b1ef3b93dbd3 - https://security.gentoo.org/glsa/201603-06 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-31808.
CVE ID: CVE-2023-31808 Date Updated: 2024-09-25T17:20:19.167Z Date Published: 2023-09-19T00:00:00 Description: Technicolor TG670 10.5.N.9 devices contain multiple accounts with hard-coded passwords. One account has administrative privileges, allowing for unrestricted access over the WAN interface if Remote Administration is enabled. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.kb.cert.org/vuls/id/913565 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.