instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2019-0792.
CVE ID: CVE-2019-0792 Date Updated: 2024-08-04T17:58:59.846Z Date Published: 2019-04-09T20:15:28 Description: A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka 'MS XML Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0790, CVE-2019-0791, CVE-2019-0793, CVE-2019-0795. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0792 - http://www.securityfocus.com/bid/107728 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-6257.
CVE ID: CVE-2020-6257 Date Updated: 2024-08-04T08:55:22.255Z Date Published: 2020-05-12T17:53:05 Description: SAP Business Objects Business Intelligence Platform (CMC and BI Launchpad) 4.2 does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=545396222 - https://launchpad.support.sap.com/#/notes/2907781 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16734.
CVE ID: CVE-2020-16734 Date Updated: 2021-12-20T22:50:51 Date Published: 2021-12-20T22:50:51 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0625.
CVE ID: CVE-2014-0625 Date Updated: 2024-08-06T09:20:19.705Z Date Published: 2014-02-18T00:00:00 Description: The SSLSocket implementation in the (1) JSAFE and (2) JSSE APIs in EMC RSA BSAFE SSL-J 5.x before 5.1.3 and 6.x before 6.0.2 allows remote attackers to cause a denial of service (memory consumption) by triggering application-data processing during the TLS handshake, a time at which the data is internally buffered. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://archives.neohapsis.com/archives/bugtraq/2014-02/0061.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8163.
CVE ID: CVE-2019-8163 Date Updated: 2024-08-04T21:10:33.491Z Date Published: 2019-10-17T20:13:08 Description: Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-49.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7564.
CVE ID: CVE-2014-7564 Date Updated: 2024-08-06T12:56:11.646Z Date Published: 2014-10-20T10:00:00 Description: The Simple Car Care Tip and Advice (aka com.a1481542198504ee106f182c8a.a40350826a) application 1.03 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/701297 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3761.
CVE ID: CVE-2024-3761 Date Updated: 2024-08-01T20:20:01.294Z Date Published: 2024-05-20T08:38:06.967Z Description: In lunary-ai/lunary version 1.2.2, the DELETE endpoint located at `packages/backend/src/api/v1/datasets` is vulnerable to unauthorized dataset deletion due to missing authorization and authentication mechanisms. This vulnerability allows any user, even those without a valid token, to delete a dataset by sending a DELETE request to the endpoint. The issue was fixed in version 1.2.8. The impact of this vulnerability is significant as it permits unauthorized users to delete datasets, potentially leading to data loss or disruption of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.com/bounties/e95fb0a0-e54a-4da8-a33d-ba858d0cec55 - https://github.com/lunary-ai/lunary/commit/14078c1d2b8766075bf655f187ece24c7a787776 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-4432.
CVE ID: CVE-2020-4432 Date Updated: 2024-09-16T18:29:54.370Z Date Published: 2020-06-10T12:57:52.760133Z Description: Certain IBM Aspera applications are vulnerable to command injection after valid authentication, which could allow an attacker with intimate knowledge of the system to execute commands in a SOAP API. IBM X-Force ID: 180810. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6221324 - https://exchange.xforce.ibmcloud.com/vulnerabilities/180810 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41399.
CVE ID: CVE-2022-41399 Date Updated: 2024-08-03T12:42:46.396Z Date Published: 2023-04-28T00:00:00 Description: The optional Web Screens feature for Sage 300 through version 2022 uses a hard-coded 40-byte blowfish key ("PASS_KEY") to encrypt and decrypt the database connection string for the PORTAL database found in the "dbconfig.xml". This issue could allow attackers to obtain access to the SQL database. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sage.com/en-ca/products/sage-300/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-44997.
CVE ID: CVE-2024-44997 Date Updated: 2024-09-15T17:56:42.382Z Date Published: 2024-09-04T19:54:42.181Z Description: In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb() When there are multiple ap interfaces on one band and with WED on, turning the interface down will cause a kernel panic on MT798X. Previously, cb_priv was freed in mtk_wed_setup_tc_block() without marking NULL,and mtk_wed_setup_tc_block_cb() didn't check the value, too. Assign NULL after free cb_priv in mtk_wed_setup_tc_block() and check NULL in mtk_wed_setup_tc_block_cb(). ---------- Unable to handle kernel paging request at virtual address 0072460bca32b4f5 Call trace: mtk_wed_setup_tc_block_cb+0x4/0x38 0xffffffc0794084bc tcf_block_playback_offloads+0x70/0x1e8 tcf_block_unbind+0x6c/0xc8 ... --------- No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/326a89321f9d5fe399fe6f9ff7c0fc766582a6a0 - https://git.kernel.org/stable/c/b453a4bbda03aa8741279c360ac82d1c3ac33548 - https://git.kernel.org/stable/c/db1b4bedb9b97c6d34b03d03815147c04fffe8b4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8870.
CVE ID: CVE-2016-8870 Date Updated: 2024-08-06T02:35:01.133Z Date Published: 2016-11-04T21:00:00 Description: The register method in the UsersModelRegistration class in controllers/user.php in the Users component in Joomla! before 3.6.4, when registration has been disabled, allows remote attackers to create user accounts by leveraging failure to check the Allow User Registration configuration setting. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/93876 - https://blog.sucuri.net/2016/10/details-on-the-privilege-escalation-vulnerability-in-joomla.html - https://developer.joomla.org/security-centre/659-20161001-core-account-creation.html - http://www.rapid7.com/db/modules/auxiliary/admin/http/joomla_registration_privesc - https://www.exploit-db.com/exploits/40637/ - http://www.securitytracker.com/id/1037108 - http://www.securitytracker.com/id/1037107 - https://github.com/joomla/joomla-cms/commit/bae1d43938c878480cfd73671e4945211538fdcf - https://medium.com/%40showthread/joomla-3-6-4-account-creation-elevated-privileges-write-up-and-exploit-965d8fb46fa2#.rq4qh1v4r No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7011.
CVE ID: CVE-2016-7011 Date Updated: 2024-08-06T01:50:47.433Z Date Published: 2016-10-13T19:00:00 Description: Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1036986 - https://helpx.adobe.com/security/products/acrobat/apsb16-33.html - http://www.securityfocus.com/bid/93496 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-48941.
CVE ID: CVE-2022-48941 Date Updated: 2024-09-12T17:32:59.101Z Date Published: 2024-08-22T03:31:37.120Z Description: In the Linux kernel, the following vulnerability has been resolved: ice: fix concurrent reset and removal of VFs Commit c503e63200c6 ("ice: Stop processing VF messages during teardown") introduced a driver state flag, ICE_VF_DEINIT_IN_PROGRESS, which is intended to prevent some issues with concurrently handling messages from VFs while tearing down the VFs. This change was motivated by crashes caused while tearing down and bringing up VFs in rapid succession. It turns out that the fix actually introduces issues with the VF driver caused because the PF no longer responds to any messages sent by the VF during its .remove routine. This results in the VF potentially removing its DMA memory before the PF has shut down the device queues. Additionally, the fix doesn't actually resolve concurrency issues within the ice driver. It is possible for a VF to initiate a reset just prior to the ice driver removing VFs. This can result in the remove task concurrently operating while the VF is being reset. This results in similar memory corruption and panics purportedly fixed by that commit. Fix this concurrency at its root by protecting both the reset and removal flows using the existing VF cfg_lock. This ensures that we cannot remove the VF while any outstanding critical tasks such as a virtchnl message or a reset are occurring. This locking change also fixes the root cause originally fixed by commit c503e63200c6 ("ice: Stop processing VF messages during teardown"), so we can simply revert it. Note that I kept these two changes together because simply reverting the original commit alone would leave the driver vulnerable to worse race conditions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/05ae1f0fe9c6c5ead08b306e665763a352d20716 - https://git.kernel.org/stable/c/3c805fce07c9dbc47d8a9129c7c5458025951957 - https://git.kernel.org/stable/c/2a3e61de89bab6696aa28b70030eb119968c5586 - https://git.kernel.org/stable/c/fadead80fe4c033b5e514fcbadd20b55c4494112 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3104.
CVE ID: CVE-2008-3104 Date Updated: 2024-08-07T09:28:41.611Z Date Published: 2008-07-09T23:00:00 Description: Multiple unspecified vulnerabilities in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allow remote attackers to violate the security model for an applet's outbound connections by connecting to localhost services running on the machine that loaded the applet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/43662 - http://www.redhat.com/support/errata/RHSA-2008-1044.html - http://lists.apple.com/archives/security-announce//2008/Sep/msg00008.html - http://marc.info/?l=bugtraq&m=122331139823057&w=2 - http://secunia.com/advisories/32436 - http://secunia.com/advisories/32826 - http://support.avaya.com/elmodocs2/security/ASA-2008-428.htm - http://support.avaya.com/elmodocs2/security/ASA-2008-507.htm - http://secunia.com/advisories/31600 - http://www.securitytracker.com/id?1020459 - http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00005.html - http://secunia.com/advisories/32018 - http://www.redhat.com/support/errata/RHSA-2008-1043.html - http://security.gentoo.org/glsa/glsa-200911-02.xml - http://secunia.com/advisories/32179 - http://sunsolve.sun.com/search/document.do?assetkey=1-66-238968-1 - http://secunia.com/advisories/33194 - http://www.vupen.com/english/advisories/2008/2740 - http://secunia.com/advisories/31320 - http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00000.html - http://secunia.com/advisories/33237 - http://www.vupen.com/english/advisories/2008/2056/references - http://secunia.com/advisories/31055 - http://secunia.com/advisories/32180 - http://www.vmware.com/security/advisories/VMSA-2008-0016.html - http://secunia.com/advisories/31736 - http://secunia.com/advisories/35065 - http://www.securityfocus.com/bid/30140 - http://secunia.com/advisories/33236 - http://support.apple.com/kb/HT3178 - http://www.redhat.com/support/errata/RHSA-2008-0594.html - http://secunia.com/advisories/31269 - http://secunia.com/advisories/31497 - http://support.avaya.com/elmodocs2/security/ASA-2008-509.htm - http://www.redhat.com/support/errata/RHSA-2008-1045.html - http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html - http://rhn.redhat.com/errata/RHSA-2008-0955.html - http://secunia.com/advisories/33238 - http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html - http://www.securityfocus.com/archive/1/497041/100/0/threaded - http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00002.html - http://www.redhat.com/support/errata/RHSA-2008-0790.html - http://www.redhat.com/support/errata/RHSA-2008-0906.html - http://www.us-cert.gov/cas/techalerts/TA08-193A.html - http://secunia.com/advisories/37386 - http://support.apple.com/kb/HT3179 - http://www.redhat.com/support/errata/RHSA-2008-0595.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9565 - http://secunia.com/advisories/31010 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2495.
CVE ID: CVE-2024-2495 Date Updated: 2024-08-01T19:18:47.940Z Date Published: 2024-03-15T13:07:05.436Z Description: Cryptographic key vulnerability encoded in the FriendlyWrt firmware affecting version 2022-11-16.51b3d35. This vulnerability could allow an attacker to compromise the confidentiality and integrity of encrypted data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.incibe.es/en/incibe-cert/notices/aviso/cryptographic-key-plain-text-vulnerability-friendlyelecs-friendlywrt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6347.
CVE ID: CVE-2014-6347 Date Updated: 2024-08-06T12:10:13.368Z Date Published: 2014-11-11T22:00:00 Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1031185 - http://www.securityfocus.com/bid/70347 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-065 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7986.
CVE ID: CVE-2015-7986 Date Updated: 2024-08-06T08:06:31.482Z Date Published: 2015-10-27T16:00:00 Description: The index server (hdbindexserver) in SAP HANA 1.00.095 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTTP request, aka SAP Security Note 2197428. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review - https://www.exploit-db.com/exploits/39382/ - http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html - http://www.securityfocus.com/archive/1/537376/100/0/threaded - https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/ - http://seclists.org/fulldisclosure/2016/Jan/94 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-8018.
CVE ID: CVE-2017-8018 Date Updated: 2024-08-05T16:19:29.635Z Date Published: 2017-10-02T05:00:00 Description: EMC AppSync host plug-in versions 3.5 and below (Windows platform only) includes a denial of service (DoS) vulnerability that could potentially be exploited by malicious users to compromise the affected system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2017/Sep/75 - http://www.securityfocus.com/bid/101016 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0006.
CVE ID: CVE-2017-0006 Date Updated: 2024-08-05T12:47:57.581Z Date Published: 2017-03-17T00:00:00 Description: Microsoft Excel 2007 SP3, Office Compatibility Pack SP3, Excel Viewer, and Excel Services on SharePoint Server 2007 SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0019, CVE-2017-0020, CVE-2017-0030, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1038010 - http://www.securityfocus.com/bid/96740 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0006 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3817.
CVE ID: CVE-2022-3817 Date Updated: 2024-08-03T01:20:58.562Z Date Published: 2022-11-01T00:00:00 Description: A vulnerability has been found in Axiomatic Bento4 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component mp4mux. The manipulation leads to memory leak. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212683. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/axiomatic-systems/Bento4/issues/792 - https://github.com/axiomatic-systems/Bento4/files/9727057/POC_mp4mux_1729452038.zip - https://vuldb.com/?id.212683 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23222.
CVE ID: CVE-2024-23222 Date Updated: 2024-08-01T22:59:32.056Z Date Published: 2024-01-23T00:25:37.095Z Description: A type confusion issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT214059 - https://support.apple.com/en-us/HT214055 - https://support.apple.com/en-us/HT214061 - https://support.apple.com/kb/HT214063 - https://support.apple.com/kb/HT214059 - https://support.apple.com/kb/HT214057 - https://support.apple.com/kb/HT214058 - https://support.apple.com/kb/HT214061 - https://support.apple.com/kb/HT214055 - https://support.apple.com/kb/HT214056 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0194.
CVE ID: CVE-2013-0194 Date Updated: 2024-08-06T14:18:09.458Z Date Published: 2019-11-20T14:30:12 Description: Cross-site Scripting (XSS) in Piwik before 1.10.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: This is a different vulnerability than CVE-2013-0193 and CVE-2013-0195. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2013/01/17/15 - https://security-tracker.debian.org/tracker/CVE-2013-0194 - https://matomo.org/changelog/piwik-1-10/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21200.
CVE ID: CVE-2023-21200 Date Updated: 2024-08-02T09:28:26.099Z Date Published: 2023-06-28T00:00:00 Description: In on_remove_iso_data_path of btm_iso_impl.h, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-236688764 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2023-06-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2698.
CVE ID: CVE-2018-2698 Date Updated: 2024-10-03T20:31:25.383Z Date Published: 2018-01-18T02:00:00 Description: Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.1.32 and Prior to 5.2.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/102688 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - http://www.securitytracker.com/id/1040202 - https://www.exploit-db.com/exploits/43878/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20311.
CVE ID: CVE-2019-20311 Date Updated: 2022-09-29T16:51:41 Date Published: 2020-01-02T20:33:08 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6256.
CVE ID: CVE-2012-6256 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-37011.
CVE ID: CVE-2022-37011 Date Updated: 2024-08-03T10:21:32.435Z Date Published: 2022-09-13T00:00:00 Description: A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions < V1.17.0), Mendix SAML (Mendix 8 compatible) (All versions < V2.3.0), Mendix SAML (Mendix 9 compatible, New Track) (All versions < V3.3.1), Mendix SAML (Mendix 9 compatible, Upgrade Track) (All versions < V3.3.0). Affected versions of the module insufficiently protect from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and get access to the application. For compatibility reasons, fix versions still contain this issue, but only when the not recommended, non default configuration option `'Allow Idp Initiated Authentication'` is enabled. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-638652.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0607.
CVE ID: CVE-2021-0607 Date Updated: 2024-08-03T15:47:28.191Z Date Published: 2021-06-22T11:13:56 Description: In iaxxx_calc_i2s_div of iaxxx-codec.c, there is a possible hardware port write with user controlled data due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-180950209 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2021-06-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2184.
CVE ID: CVE-2023-2184 Date Updated: 2024-08-02T06:12:20.608Z Date Published: 2023-06-09T05:33:39.767Z Description: The WP Responsive Tabs horizontal vertical and accordion Tabs plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.1.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe54c37f-1421-48aa-b502-045847d13ae3?source=cve - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2825016%40responsive-horizontal-vertical-and-accordion-tabs%2Ftags%2F1.1.15&new=2900990%40responsive-horizontal-vertical-and-accordion-tabs%2Ftags%2F1.1.16 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4991.
CVE ID: CVE-2015-4991 Date Updated: 2024-08-06T06:32:31.533Z Date Published: 2016-02-15T02:00:00 Description: IBM SPSS Modeler 14.2 through FP3 IF027, 15 through FP3 IF015, 16 through FP2 IF012, 17 through FP1 IF018, and 17.1 through IF008 includes unspecified cleartext data in memory dumps, which allows local users to obtain sensitive information by reading a dump file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21975663 - http://www-01.ibm.com/support/docview.wss?uid=swg1PI46224 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0765.
CVE ID: CVE-2010-0765 Date Updated: 2024-08-07T00:59:39.083Z Date Published: 2010-03-02T18:00:00 Description: fipsForum 2.6 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for _database/forumFips.mdb. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.org/1001-exploits/fipsforum-disclose.txt - http://www.exploit-db.com/exploits/11361 - https://exchange.xforce.ibmcloud.com/vulnerabilities/56183 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6014.
CVE ID: CVE-2008-6014 Date Updated: 2024-08-07T11:13:13.761Z Date Published: 2009-01-30T18:03:00 Description: SQL injection vulnerability in scripts/links.php in Rianxosencabos CMS 0.9 allows remote attackers to execute arbitrary SQL commands via the id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/6636 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45552 - http://www.securityfocus.com/bid/31502 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6833.
CVE ID: CVE-2023-6833 Date Updated: 2024-08-02T08:42:07.916Z Date Published: 2024-04-23T05:35:48.828Z Description: Insertion of Sensitive Information into Log File vulnerability in Hitachi Ops Center Administrator allows local users to gain sensitive information.This issue affects Hitachi Ops Center Administrator: before 11.0.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-121/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39182.
CVE ID: CVE-2021-39182 Date Updated: 2024-08-04T01:58:18.261Z Date Published: 2021-11-08T14:15:11 Description: EnroCrypt is a Python module for encryption and hashing. Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. The vulnerability is patched in v1.1.4 of the product. As a workaround, users can remove the `MD5` hashing function from the file `hashing.py`. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783 - https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-43886.
CVE ID: CVE-2024-43886 Date Updated: 2024-09-15T17:54:55.664Z Date Published: 2024-08-26T10:10:37.795Z Description: In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add null check in resource_log_pipe_topology_update [WHY] When switching from "Extend" to "Second Display Only" we sometimes call resource_get_otg_master_for_stream on a stream for the eDP, which is disconnected. This leads to a null pointer dereference. [HOW] Added a null check in dc_resource.c/resource_log_pipe_topology_update. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/c36e922a36bdf69765c340a0857ca74092003bee - https://git.kernel.org/stable/c/899d92fd26fe780aad711322aa671f68058207a6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46882.
CVE ID: CVE-2021-46882 Date Updated: 2024-08-04T05:17:42.969Z Date Published: 2023-05-26T00:00:00 Description: The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2023/5/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3409.
CVE ID: CVE-2014-3409 Date Updated: 2024-08-06T10:43:05.479Z Date Published: 2014-10-25T10:00:00 Description: The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/61799 - http://www.securitytracker.com/id/1031119 - http://www.securityfocus.com/bid/70715 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3409 - https://exchange.xforce.ibmcloud.com/vulnerabilities/97758 - http://tools.cisco.com/security/center/viewAlert.x?alertId=36184 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-29569.
CVE ID: CVE-2020-29569 Date Updated: 2024-08-04T16:55:10.494Z Date Published: 2020-12-15T17:00:36 Description: An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://xenbits.xenproject.org/xsa/advisory-350.html - https://www.debian.org/security/2021/dsa-4843 - https://security.netapp.com/advisory/ntap-20210205-0001/ - https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html - https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html - https://security.gentoo.org/glsa/202107-30 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24799.
CVE ID: CVE-2021-24799 Date Updated: 2024-08-03T19:42:17.210Z Date Published: 2021-11-01T08:46:27 Description: The Far Future Expiry Header WordPress plugin before 1.5 does not have CSRF check when saving its settings, which could allow attackers to make a logged in admin change them via a CSRF attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/6010ce4e-3e46-4cc1-96d8-560b30b605ed No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3321.
CVE ID: CVE-2014-3321 Date Updated: 2024-08-06T10:43:05.197Z Date Published: 2014-07-18T01:00:00 Description: Cisco IOS XR 4.3.4 and earlier on ASR 9000 devices, when bridge-group virtual interface (BVI) routing is enabled, allows remote attackers to cause a denial of service (chip and card hangs) via a series of crafted MPLS packets, aka Bug ID CSCuo91149. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/viewAlert.x?alertId=34936 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3321 - http://www.securitytracker.com/id/1030597 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32768.
CVE ID: CVE-2022-32768 Date Updated: 2024-09-16T17:03:43.380Z Date Published: 2022-08-22T18:26:26.065364Z Description: Multiple authentication bypass vulnerabilities exist in the objects id handling functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request by an authenticated user can lead to unauthorized access and takeover of resources. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Live Schedules plugin, allowing an attacker to bypass authentication by guessing a sequential ID, allowing them to take over the another user's streams. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/WWBN/AVideo/blob/e04b1cd7062e16564157a82bae389eedd39fa088/updatedb/updateDb.v12.0.sql - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1536 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33308.
CVE ID: CVE-2023-33308 Date Updated: 2024-08-02T15:39:36.270Z Date Published: 2023-07-26T14:00:25.931Z Description: A stack-based overflow vulnerability [CWE-124] in Fortinet FortiOS version 7.0.0 through 7.0.10 and 7.2.0 through 7.2.3 and FortiProxy version 7.0.0 through 7.0.9 and 7.2.0 through 7.2.2 allows a remote unauthenticated attacker to execute arbitrary code or command via crafted packets reaching proxy policies or firewall policies with proxy mode alongside deep or full packet inspection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/psirt/FG-IR-23-183 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-9223.
CVE ID: CVE-2015-9223 Date Updated: 2024-09-16T17:43:42.802Z Date Published: 2018-04-18T14:00:00Z Description: In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile MDM9615, MDM9625, MDM9635M, SD 400, SD 600, and SD 800, a buffer overflow can occur when processing an audio buffer. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2018-04-01 - http://www.securityfocus.com/bid/103671 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16781.
CVE ID: CVE-2020-16781 Date Updated: 2021-12-20T22:51:26 Date Published: 2021-12-20T22:51:26 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-35871.
CVE ID: CVE-2020-35871 Date Updated: 2024-08-04T17:16:12.991Z Date Published: 2020-12-31T08:28:15 Description: An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via an Auxdata API data race. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://rustsec.org/advisories/RUSTSEC-2020-0014.html - https://github.com/rusqlite/rusqlite/releases/tag/0.23.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-40477.
CVE ID: CVE-2024-40477 Date Updated: 2024-08-09T17:46:24.655Z Date Published: 2024-08-08T00:00:00 Description: A SQL injection vulnerability in "/oahms/admin/forgot-password.php" in PHPGurukul Old Age Home Management System v1.0 allows an attacker to execute arbitrary SQL commands via the "email" parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://phpgurukul.com/old-age-home-management-system-using-php-and-mysql/ - https://github.com/takekaramey/CVE_Writeup/blob/main/PHPGurukul/Old%20Age%20Home%20Mgmt%20System%20v1.0/SQL%20Injection.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3855.
CVE ID: CVE-2023-3855 Date Updated: 2024-08-02T07:08:50.512Z Date Published: 2023-07-23T23:31:03.912Z Description: A vulnerability classified as problematic was found in phpscriptpoint JobSeeker 1.5. Affected by this vulnerability is an unknown functionality of the file /search-result.php. The manipulation of the argument kw/lc/ct/cp/p leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235207. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.235207 - https://vuldb.com/?ctiid.235207 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3150.
CVE ID: CVE-2020-3150 Date Updated: 2024-09-16T20:28:06.197Z Date Published: 2020-07-16T17:20:33.641298Z Description: A vulnerability in the web-based management interface of Cisco Small Business RV110W and RV215W Series Routers could allow an unauthenticated, remote attacker to download sensitive information from the device, which could include the device configuration. The vulnerability is due to improper authorization of an HTTP request. An attacker could exploit this vulnerability by accessing a specific URI on the web-based management interface of the router, but only after any valid user has opened a specific file on the device since the last reboot. A successful exploit would allow the attacker to view sensitive information, which should be restricted. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-info-dis-FEWBWgsD No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11100.
CVE ID: CVE-2018-11100 Date Updated: 2024-08-05T07:54:36.567Z Date Published: 2018-05-15T01:00:00 Description: The decompileSETTARGET function in decompile.c in libming through 0.4.8 mishandles cases where the header indicates a file size greater than the actual size, which allows remote attackers to cause a denial of service (Segmentation fault and application crash) or possibly have unspecified other impact. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/libming/libming/issues/142 - https://docs.google.com/document/d/1N-_obGIyAM5DGcrB7gHy89Oy68aDvxSMjrKaaM7KOFA/edit No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-5175.
CVE ID: CVE-2011-5175 Date Updated: 2024-09-16T16:58:43.342Z Date Published: 2012-09-15T17:00:00Z Description: SQL injection vulnerability in search.php in Banana Dance, possibly B.1.5 and earlier, allows remote attackers to execute arbitrary SQL commands via the category parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.bananadance.org/Program-News/Minor-Update-and-New-Theme - http://packetstormsecurity.org/files/115772/Banana-Dance-CMS-B.2.1-XSS-SQL-Injection.html - http://www.doyoubananadance.com/Program-News/Important-Notice-About-SQLi-Exploit No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9726.
CVE ID: CVE-2016-9726 Date Updated: 2024-08-06T02:59:03.187Z Date Published: 2017-03-07T17:00:00 Description: IBM QRadar Incident Forensics 7.2 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM Reference #: 1999542. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=swg21999542 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41921.
CVE ID: CVE-2023-41921 Date Updated: 2024-08-02T19:09:49.427Z Date Published: 2024-07-02T07:42:33.722Z Description: A vulnerability allows attackers to download source code or an executable from a remote location and execute the code without sufficiently verifying the origin and integrity of the code. This vulnerability can allow attackers to modify the firmware before uploading it to the system, thus achieving the modification of the target’s integrity to achieve an insecure state. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2945.
CVE ID: CVE-2008-2945 Date Updated: 2024-08-07T09:21:34.571Z Date Published: 2008-06-30T22:00:00 Description: Sun Java System Access Manager 6.3 through 7.1 and Sun Java System Identity Server 6.1 and 6.2 do not properly process XSLT stylesheets in XSLT transforms in XML signatures, which allows context-dependent attackers to execute arbitrary code via a crafted stylesheet, a related issue to CVE-2007-3715, CVE-2007-3716, and CVE-2007-4289. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://sunsolve.sun.com/search/document.do?assetkey=1-26-201538-1 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43429 - http://support.avaya.com/elmodocs2/security/ASA-2008-294.htm - http://www.securitytracker.com/id?1020380 - http://www.securityfocus.com/bid/29988 - http://www.vupen.com/english/advisories/2008/1967/references - http://secunia.com/advisories/30893 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4535.
CVE ID: CVE-2012-4535 Date Updated: 2024-08-06T20:42:53.628Z Date Published: 2012-11-21T23:00:00 Description: Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2012-1540.html - http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html - http://secunia.com/advisories/55082 - http://www.securitytracker.com/id?1027759 - http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html - http://secunia.com/advisories/51413 - http://secunia.com/advisories/51200 - http://security.gentoo.org/glsa/glsa-201309-24.xml - http://www.debian.org/security/2012/dsa-2582 - http://osvdb.org/87298 - http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html - http://www.openwall.com/lists/oss-security/2012/11/13/1 - http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html - http://secunia.com/advisories/51468 - https://exchange.xforce.ibmcloud.com/vulnerabilities/80022 - http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html - http://secunia.com/advisories/51352 - http://secunia.com/advisories/51324 - https://security.gentoo.org/glsa/201604-03 - http://www.securityfocus.com/bid/56498 - http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html - http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15049.
CVE ID: CVE-2019-15049 Date Updated: 2024-08-05T00:34:53.103Z Date Published: 2019-08-14T15:11:53 Description: An issue was discovered in Bento4 1.5.1.0. There is a heap-based buffer over-read in the AP4_Dec3Atom class at Core/Ap4Dec3Atom.cpp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/axiomatic-systems/bento4/issues/408 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-9526.
CVE ID: CVE-2018-9526 Date Updated: 2024-08-05T07:24:56.017Z Date Published: 2018-11-14T18:00:00 Description: In device configuration data, there is an improperly configured setting. This could lead to remote disclosure of device location. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-112159033 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/105847 - https://source.android.com/security/bulletin/pixel/2018-11-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-28544.
CVE ID: CVE-2021-28544 Date Updated: 2024-08-03T21:47:32.637Z Date Published: 2022-04-12T17:50:13 Description: Apache Subversion SVN authz protected copyfrom paths regression Subversion servers reveal 'copyfrom' paths that should be hidden according to configured path-based authorization (authz) rules. When a node has been copied from a protected location, users with access to the copy can see the 'copyfrom' path of the original. This also reveals the fact that the node was copied. Only the 'copyfrom' path is revealed; not its contents. Both httpd and svnserve servers are vulnerable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://subversion.apache.org/security/CVE-2021-28544-advisory.txt - https://www.debian.org/security/2022/dsa-5119 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R/ - https://support.apple.com/kb/HT213345 - http://seclists.org/fulldisclosure/2022/Jul/18 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1742.
CVE ID: CVE-2023-1742 Date Updated: 2024-08-02T05:57:25.000Z Date Published: 2023-03-30T21:31:03.698Z Description: A vulnerability was found in IBOS 4.5.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file /?r=report/api/getlist of the component Report Search. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224630 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.224630 - https://vuldb.com/?ctiid.224630 - https://gitee.com/wkstestete/cve/blob/master/sql/ibos%20sql%20injection3.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2894.
CVE ID: CVE-2022-2894 Date Updated: 2024-09-16T18:48:55.668Z Date Published: 2022-08-31T20:54:55.197202Z Description: Measuresoft ScadaPro Server (All Versions) uses unmaintained ActiveX controls. The controls may allow seven untrusted pointer deference instances while processing a specific project file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsa-22-235-06 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1475.
CVE ID: CVE-2010-1475 Date Updated: 2024-08-07T01:28:41.331Z Date Published: 2010-04-19T19:04:00 Description: Directory traversal vulnerability in the Preventive & Reservation (com_preventive) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.org/1004-exploits/joomlapr-lfi.txt - http://www.exploit-db.com/exploits/12147 - http://www.securityfocus.com/bid/39387 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57652 - http://secunia.com/advisories/39285 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35792.
CVE ID: CVE-2022-35792 Date Updated: 2024-08-03T09:44:21.974Z Date Published: 2022-08-09T20:06:17 Description: Storage Spaces Direct Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35792 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1802.
CVE ID: CVE-2013-1802 Date Updated: 2024-08-06T15:13:33.181Z Date Published: 2013-04-09T20:00:00Z Description: The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5 - http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html - https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately - https://bugzilla.redhat.com/show_bug.cgi?id=917233 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10710.
CVE ID: CVE-2018-10710 Date Updated: 2024-08-05T07:46:46.368Z Date Published: 2018-10-30T18:00:00 Description: The AsrDrv101.sys and AsrDrv102.sys low-level drivers in ASRock RGBLED before v1.0.35.1, A-Tuning before v3.0.210, F-Stream before v3.0.210, and RestartToUEFI before v1.0.6.2 expose functionality to read and write arbitrary physical memory. This could be leveraged by a local attacker to elevate privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.secureauth.com/labs/advisories/asrock-drivers-elevation-privilege-vulnerabilities - https://www.exploit-db.com/exploits/45716/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-10725.
CVE ID: CVE-2020-10725 Date Updated: 2024-08-04T11:14:14.236Z Date Published: 2020-05-20T13:16:55 Description: A flaw was found in DPDK version 19.11 and above that allows a malicious guest to cause a segmentation fault of the vhost-user backend application running on the host, which could result in a loss of connectivity for the other guests running on that host. This is caused by a missing validity check of the descriptor address in the function `virtio_dev_rx_batch_packed()`. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/ - https://www.openwall.com/lists/oss-security/2020/05/18/2 - https://www.oracle.com/security-alerts/cpujan2021.html - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10725 - https://bugs.dpdk.org/show_bug.cgi?id=270 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4010.
CVE ID: CVE-2014-4010 Date Updated: 2024-08-06T11:04:27.824Z Date Published: 2014-06-09T20:00:00 Description: SAP Transaction Data Pool has hardcoded credentials, which makes it easier for remote attackers to obtain access via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/67920 - https://service.sap.com/sap/support/notes/1795463 - http://seclists.org/fulldisclosure/2014/Jun/36 - http://scn.sap.com/docs/DOC-8218 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0631.
CVE ID: CVE-2023-0631 Date Updated: 2024-08-02T05:17:50.223Z Date Published: 2023-03-20T15:52:10.755Z Description: The Paid Memberships Pro WordPress plugin before 2.9.12 does not prevent subscribers from rendering shortcodes that concatenate attributes directly into an SQL query. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/19ef92fd-b493-4488-91f0-e6ba51362f79 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1917.
CVE ID: CVE-2019-1917 Date Updated: 2024-09-17T02:42:05.329Z Date Published: 2019-07-17T20:15:15.384964Z Description: A vulnerability in the REST API interface of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected system. The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to execute arbitrary actions through the REST API with administrative privileges on the affected system. The REST API is enabled by default and cannot be disabled. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-cvdsd-wmauth - http://www.securityfocus.com/bid/109301 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2940.
CVE ID: CVE-2011-2940 Date Updated: 2024-08-06T23:15:31.951Z Date Published: 2011-08-25T14:00:00 Description: stunnel 4.40 and 4.41 might allow remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2011/08/19/6 - http://securitytracker.com/id?1025959 - http://www.openwall.com/lists/oss-security/2011/08/19/18 - https://bugzilla.redhat.com/show_bug.cgi?id=732068 - http://stunnel.org/?page=sdf_ChangeLog - http://www.securityfocus.com/bid/49254 - http://www.stunnel.org/pipermail/stunnel-announce/2011-August/000059.html - http://www.osvdb.org/74600 - http://secunia.com/advisories/45705 - https://exchange.xforce.ibmcloud.com/vulnerabilities/69318 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-19067.
CVE ID: CVE-2018-19067 Date Updated: 2024-08-05T11:30:03.455Z Date Published: 2018-11-07T18:00:00 Description: An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. There is a hardcoded Ak47@99 password for the factory~ account. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1382.
CVE ID: CVE-2023-1382 Date Updated: 2024-08-02T05:49:10.354Z Date Published: 2023-04-19T00:00:00 Description: A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-42284.
CVE ID: CVE-2023-42284 Date Updated: 2024-09-05T13:24:36.165Z Date Published: 2023-11-07T00:00:00 Description: Blind SQL injection in api_version parameter in Tyk Gateway version 5.0.3 allows attacker to access and dump the database via a crafted SQL query. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/andreysanyuk/CVE-2023-42284 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20663.
CVE ID: CVE-2021-20663 Date Updated: 2024-08-03T17:45:45.341Z Date Published: 2021-03-05T09:20:20 Description: Cross-site scripting vulnerability in in Role authority setting screen of Movable Type 7 r.4705 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4705 and earlier (Movable Type Advanced 7 Series), Movable Type 6.7.5 and earlier (Movable Type 6.7 Series), Movable Type Premium 1.39 and earlier, and Movable Type Premium Advanced 1.39 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jvn.jp/en/jp/JVN66542874/index.html - https://movabletype.org/news/2021/02/mt-760-676-released.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-21679.
CVE ID: CVE-2020-21679 Date Updated: 2024-08-04T14:30:33.447Z Date Published: 2023-08-22T00:00:00 Description: Buffer Overflow vulnerability in WritePCXImage function in pcx.c in GraphicsMagick 1.4 allows remote attackers to cause a denial of service via converting of crafted image file to pcx format. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sourceforge.net/p/graphicsmagick/bugs/619/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39865.
CVE ID: CVE-2024-39865 Date Updated: 2024-08-02T04:33:11.277Z Date Published: 2024-07-09T12:05:19.951Z Description: A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application allows users to upload encrypted backup files. As part of this backup, files can be restored without correctly checking the path of the restored file. This could allow an attacker with access to the backup encryption key to upload malicious files, that could potentially lead to remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/html/ssa-381581.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1222.
CVE ID: CVE-2010-1222 Date Updated: 2024-08-07T01:14:06.655Z Date Published: 2010-04-07T15:00:00 Description: CA XOsoft r12.5 does not properly perform authentication, which allows remote attackers to obtain potentially sensitive information via a SOAP request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/510564/100/0/threaded - https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=232869 - http://www.securityfocus.com/bid/39249 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26143.
CVE ID: CVE-2024-26143 Date Updated: 2024-08-01T23:59:32.584Z Date Published: 2024-02-27T15:33:54.643Z Description: Rails is a web-application framework. There is a possible XSS vulnerability when using the translation helpers in Action Controller. Applications using translation methods like translate, or t on a controller, with a key ending in "_html", a :default key which contains untrusted user input, and the resulting string is used in a view, may be susceptible to an XSS vulnerability. The vulnerability is fixed in 7.1.3.1 and 7.0.8.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/rails/rails/security/advisories/GHSA-9822-6m93-xqf4 - https://github.com/rails/rails/commit/4c83b331092a79d58e4adffe4be5f250fa5782cc - https://github.com/rails/rails/commit/5187a9ef51980ad1b8e81945ebe0462d28f84f9e - https://discuss.rubyonrails.org/t/possible-xss-vulnerability-in-action-controller/84947 - https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26143.yml - https://security.netapp.com/advisory/ntap-20240510-0004/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46813.
CVE ID: CVE-2023-46813 Date Updated: 2024-08-02T20:53:21.700Z Date Published: 2023-10-27T00:00:00 Description: An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.suse.com/show_bug.cgi?id=1212649 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9 - https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3833.
CVE ID: CVE-2013-3833 Date Updated: 2024-09-16T16:12:38.944Z Date Published: 2013-10-16T15:00:00Z Description: Unspecified vulnerability in the Oracle Access Manager component in Oracle Fusion Middleware 11.1.1.5.0 and 11.1.2.0.0 allows remote attackers to affect integrity via unknown vectors related to Authentication Engine. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html - http://www.securitytracker.com/id/1029190 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26566.
CVE ID: CVE-2021-26566 Date Updated: 2024-09-17T03:23:15.693Z Date Published: 2021-02-26T21:45:35.118113Z Description: Insertion of sensitive information into sent data vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to execute arbitrary commands via inbound QuickConnect traffic. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.synology.com/security/advisory/Synology_SA_20_26 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2470.
CVE ID: CVE-2010-2470 Date Updated: 2024-09-16T16:17:41.370Z Date Published: 2010-06-28T17:00:00Z Description: Install/Filesystem.pm in Bugzilla 3.5.1 through 3.6.1 and 3.7 through 3.7.1, when use_suexec is enabled, uses world-readable permissions within (1) .bzr/ and (2) data/webdot/, which allows local users to obtain potentially sensitive data by reading files in these directories, a different vulnerability than CVE-2010-0180. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=561797 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2316.
CVE ID: CVE-2023-2316 Date Updated: 2024-08-02T06:19:14.860Z Date Published: 2023-08-19T05:34:20.390Z Description: Improper path handling in Typora before 1.6.7 on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/<absolute-path>". This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.typora.io/What's-New-1.6/ - https://starlabs.sg/advisories/23/23-2316/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0114.
CVE ID: CVE-2018-0114 Date Updated: 2024-08-05T03:14:16.809Z Date Published: 2018-01-04T06:00:00 Description: A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specifies that a JSON Web Key (JWK) representing a public key can be embedded within the header of a JWS. This public key is then trusted for verification. An attacker could exploit this by forging valid JWS objects by removing the original signature, adding a new public key to the header, and then signing the object using the (attacker-owned) private key associated with the public key embedded in that JWS header. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/viewAlert.x?alertId=56326 - https://github.com/zi0Black/POC-CVE-2018-0114 - https://github.com/cisco/node-jose/blob/master/CHANGELOG.md - https://www.exploit-db.com/exploits/44324/ - http://www.securityfocus.com/bid/102445 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2953.
CVE ID: CVE-2022-2953 Date Updated: 2024-08-03T00:53:00.658Z Date Published: 2022-08-29T00:00:00 Description: LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/libtiff/libtiff/-/issues/414 - https://gitlab.com/libtiff/libtiff/-/commit/48d6ece8389b01129e7d357f0985c8f938ce3da3 - https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json - https://security.netapp.com/advisory/ntap-20221014-0008/ - https://www.debian.org/security/2023/dsa-5333 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-31143.
CVE ID: CVE-2022-31143 Date Updated: 2024-08-03T07:11:39.376Z Date Published: 2022-09-14T17:40:09 Description: GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/glpi-project/glpi/security/advisories/GHSA-6mmq-x3j2-677j - https://github.com/glpi-project/glpi/commit/e66a0dfe697cbd4b3ec22736a8f8fd025a28f978 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-20306.
CVE ID: CVE-2024-20306 Date Updated: 2024-08-16T18:48:47.441Z Date Published: 2024-03-27T16:58:22.583Z Description: A vulnerability in the Unified Threat Defense (UTD) configuration CLI of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying host operating system. To exploit this vulnerability, an attacker must have level 15 privileges on the affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting a crafted CLI command to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying operating system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-utd-cmd-JbL8KvHT No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2888.
CVE ID: CVE-2013-2888 Date Updated: 2024-08-06T15:52:20.678Z Date Published: 2013-09-13T18:00:00 Description: Multiple array index errors in drivers/hid/hid-core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11 allow physically proximate attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted device that provides an invalid Report ID. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ubuntu.com/usn/USN-2024-1 - http://marc.info/?l=linux-input&m=137772180514608&w=1 - http://rhn.redhat.com/errata/RHSA-2013-1490.html - http://www.ubuntu.com/usn/USN-1977-1 - http://www.ubuntu.com/usn/USN-2039-1 - http://www.ubuntu.com/usn/USN-2022-1 - http://openwall.com/lists/oss-security/2013/08/28/13 - http://rhn.redhat.com/errata/RHSA-2013-1645.html - http://www.ubuntu.com/usn/USN-1995-1 - http://www.ubuntu.com/usn/USN-2038-1 - http://www.debian.org/security/2013/dsa-2766 - http://www.ubuntu.com/usn/USN-2021-1 - http://www.ubuntu.com/usn/USN-1976-1 - http://www.ubuntu.com/usn/USN-2019-1 - http://www.ubuntu.com/usn/USN-1998-1 - http://www.ubuntu.com/usn/USN-2050-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-43848.
CVE ID: CVE-2023-43848 Date Updated: 2024-08-20T14:55:32.873Z Date Published: N/A Description: Incorrect access control in the firewall management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote authenticated users to alter local firewall settings of the device as if they were the administrator via HTTP POST request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/setersora/pe6208 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40087.
CVE ID: CVE-2023-40087 Date Updated: 2024-08-28T17:44:04.980Z Date Published: 2023-12-04T22:40:52.488Z Description: In transcodeQ*ToFloat of btif_avrcp_audio_track.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://android.googlesource.com/platform/packages/modules/Bluetooth/+/243fdf1c0d53bda9e829b4bec9f7c2a824b4d3d1 - https://source.android.com/security/bulletin/2023-12-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2496.
CVE ID: CVE-2012-2496 Date Updated: 2024-09-17T02:47:01.205Z Date Published: 2012-06-20T20:00:00Z Description: A certain Java applet in the VPN downloader implementation in the WebLaunch feature in Cisco AnyConnect Secure Mobility Client 3.x before 3.0 MR7 on 64-bit Linux platforms does not properly restrict use of Java components, which allows remote attackers to execute arbitrary code via a crafted web site, aka Bug ID CSCty45925. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0746.
CVE ID: CVE-2017-0746 Date Updated: 2024-09-16T23:36:28.166Z Date Published: 2017-08-09T21:00:00Z Description: A elevation of privilege vulnerability in the Qualcomm ipa driver. Product: Android. Versions: Android kernel. Android ID: A-35467471. References: QC-CR#2029392. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-08-01 - http://www.securityfocus.com/bid/100213 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3699.
CVE ID: CVE-2009-3699 Date Updated: 2024-08-07T06:38:30.398Z Date Published: 2009-10-15T10:00:00 Description: Stack-based buffer overflow in libcsa.a (aka the calendar daemon library) in IBM AIX 5.x through 5.3.10 and 6.x through 6.1.3, and VIOS 2.1 and earlier, allows remote attackers to execute arbitrary code via a long XDR string in the first argument to procedure 21 of rpc.cmsd. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2009/2846 - http://www.ibm.com/support/docview.wss?uid=isg1IZ62237 - http://www.ibm.com/support/docview.wss?uid=isg1IZ62570 - http://www.ibm.com/support/docview.wss?uid=isg1IZ61628 - http://securitytracker.com/id?1022996 - http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=825 - http://aix.software.ibm.com/aix/efixes/security/cmsd_advisory.asc - http://www.ibm.com/support/docview.wss?uid=isg1IZ62569 - https://exchange.xforce.ibmcloud.com/vulnerabilities/53681 - http://www.ibm.com/support/docview.wss?uid=isg1IZ62571 - http://www.ibm.com/support/docview.wss?uid=isg1IZ62123 - http://www.ibm.com/support/docview.wss?uid=isg1IZ62672 - http://www.ibm.com/support/docview.wss?uid=isg1IZ62572 - http://secunia.com/advisories/36978 - http://www.ibm.com/support/docview.wss?uid=isg1IZ61717 - https://www.immunityinc.com/downloads/immpartners/aixcmsd10092009.tar.gz - http://www.osvdb.org/58726 - http://www.securityfocus.com/bid/36615 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8724.
CVE ID: CVE-2020-8724 Date Updated: 2023-03-22T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3701.
CVE ID: CVE-2011-3701 Date Updated: 2024-09-16T16:42:55.625Z Date Published: 2011-09-23T23:00:00Z Description: AlegroCart 1.2.3 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by common.php and certain other files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2011/06/27/6 - http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/AlegroCart_1.2.3 - http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1165.
CVE ID: CVE-2009-1165 Date Updated: 2024-08-07T05:04:49.007Z Date Published: 2009-07-29T17:00:00 Description: Memory leak on the Cisco Wireless LAN Controller (WLC) platform 4.x before 4.2.205.0, 5.1 before 5.1.163.0, and 5.0 and 5.2 before 5.2.178.0, as used in Cisco 1500 Series, 2000 Series, 2100 Series, 4100 Series, 4200 Series, and 4400 Series Wireless Services Modules (WiSM), WLC Modules for Integrated Services Routers, and Catalyst 3750G Integrated Wireless LAN Controllers, allows remote attackers to cause a denial of service (memory consumption and device reload) via SSH management connections, aka Bug ID CSCsw40789. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.cisco.com/en/US/products/products_security_advisory09186a0080adb3d7.shtml - http://www.securitytracker.com/id?1022605 - http://www.vupen.com/english/advisories/2009/2021 - http://www.securityfocus.com/bid/35817 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23710.
CVE ID: CVE-2023-23710 Date Updated: 2024-08-02T10:42:25.698Z Date Published: 2023-04-25T19:41:40.424Z Description: Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in miniOrange WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin <= 7.5.14 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/miniorange-login-openid/wordpress-wordpress-social-login-and-register-discord-google-twitter-linkedin-plugin-7-5-14-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30680.
CVE ID: CVE-2023-30680 Date Updated: 2024-08-02T14:28:52.161Z Date Published: 2023-08-10T01:18:23.078Z Description: Improper privilege management vulnerability in MMIGroup prior to SMR Aug-2023 Release 1 allows code execution with privilege. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32958.
CVE ID: CVE-2022-32958 Date Updated: 2024-09-17T04:05:10.223Z Date Published: 2022-07-20T02:01:55.027153Z Description: A remote attacker with general user privilege can send a message to Teamplus Pro’s chat group that exceeds message size limit, to terminate other recipients’ Teamplus Pro chat process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.twcert.org.tw/tw/cp-132-6289-a5524-1.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1900.
CVE ID: CVE-2024-1900 Date Updated: 2024-08-01T18:56:22.272Z Date Published: 2024-03-05T21:34:13.992Z Description: Improper session management in the identity provider authentication flow in Devolutions Server 2023.3.14.0 and earlier allows an authenticated user via an identity provider to stay authenticated after his user is disabled or deleted in the identity provider such as Okta or Microsoft O365. The user will stay authenticated until the Devolutions Server token expiration. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://devolutions.net/security/advisories/DEVO-2024-0002 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4718.
CVE ID: CVE-2014-4718 Date Updated: 2024-09-16T18:48:28.921Z Date Published: 2014-07-03T14:00:00Z Description: Multiple cross-site request forgery (CSRF) vulnerabilities in Lunar CMS before 3.3-3 allow remote attackers to hijack the authentication of administrators for requests that (1) add Super users via a request to admin/user_create.php or conduct cross-site scripting (XSS) attacks via the (2) email or (3) subject parameter in contact_form.ext.php to admin/extensions.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/68153 - http://osvdb.org/show/osvdb/108351 - http://lunarcms.com/Get.html - http://secunia.com/advisories/59411 - http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5188.php - http://www.exploit-db.com/exploits/33830 - http://packetstormsecurity.com/files/127188/Lunar-CMS-3.3-CSRF-Cross-Site-Scripting.html - http://osvdb.org/show/osvdb/108350 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50120.
CVE ID: CVE-2023-50120 Date Updated: 2024-08-02T22:09:49.629Z Date Published: 2024-01-10T00:00:00 Description: MP4Box GPAC version 2.3-DEV-rev636-gfbd7e13aa-master was discovered to contain an infinite loop in the function av1_uvlc at media_tools/av_parsers.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/gpac/gpac/issues/2698 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.