instruction stringlengths 49 63 ⌀ | input stringlengths 0 69 | output stringlengths 221 18.7k |
|---|---|---|
Provide detailed information about CVE-2022-33177. | CVE ID: CVE-2022-33177
Date Updated: 2024-09-16T19:36:56.664Z
Date Published: 2022-09-06T17:18:54.357827Z
Description:
Cross-Site Request Forgery (CSRF) vulnerability in WPdevelop/Oplugins Booking Calendar plugin <= 9.2.1 at WordPress leading to Translations Update.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/booking/wordpress-booking-calendar-plugin-9-2-1-cross-site-request-forgery-csrf-leading-to-translations-update/_s_id=cve
- https://wordpress.org/plugins/booking/#developers
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-6643. | CVE ID: CVE-2013-6643
Date Updated: 2024-08-06T17:46:22.299Z
Date Published: 2014-01-16T11:00:00
Description:
The OneClickSigninBubbleView::WindowClosing function in browser/ui/views/sync/one_click_signin_bubble_view.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows attackers to trigger a sync with an arbitrary Google account by leveraging improper handling of the closing of an untrusted signin confirm dialog.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://src.chromium.org/viewvc/chrome?revision=237115&view=revision
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html
- https://code.google.com/p/chromium/issues/detail?id=321940
- http://www.debian.org/security/2014/dsa-2862
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-3905. | CVE ID: CVE-2010-3905
Date Updated: 2024-08-07T03:26:12.270Z
Date Published: 2010-12-22T20:00:00
Description:
The password reset feature in the administrator interface for Eucalyptus 2.0.0 and 2.0.1 does not perform authentication, which allows remote attackers to gain privileges by sending password reset requests for other users.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/45462
- http://www.ubuntu.com/usn/USN-1033-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64167
- http://secunia.com/advisories/42666
- http://www.vupen.com/english/advisories/2010/3260
- http://secunia.com/advisories/42632
- http://open.eucalyptus.com/wiki/esa-01
- http://www.vupen.com/english/advisories/2010/3259
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-2749. | CVE ID: CVE-2018-2749
Date Updated: 2024-10-03T20:22:50.589Z
Date Published: 2018-04-19T02:00:00
Description:
Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module). Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0 and 14.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Corporate Lending, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Banking Corporate Lending accessible data as well as unauthorized read access to a subset of Oracle Banking Corporate Lending accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/103864
- http://www.securitytracker.com/id/1040693
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-0267. | CVE ID: CVE-2017-0267
Date Updated: 2024-08-05T12:55:19.343Z
Date Published: 2017-05-12T14:00:00
Description:
Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka "Windows SMB Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/98259
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0267
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- http://www.securitytracker.com/id/1038432
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-0421. | CVE ID: CVE-2012-0421
Date Updated: 2024-09-16T18:19:37.647Z
Date Published: 2012-08-08T10:00:00Z
Description:
The SUSE Audit Log Keeper daemon before 0.2.1-0.4.6.1 for SUSE Manager and Spacewalk uses world-readable permissions for /etc/auditlog-keeper.conf, which allows local users to obtain passwords by reading this file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00001.html
- https://bugzilla.novell.com/771335
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-43997. | CVE ID: CVE-2023-43997
Date Updated: 2024-08-02T19:52:11.921Z
Date Published: 2024-01-24T00:00:00
Description:
An issue in Yoruichi hobby base mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/syz913/CVE-reports/blob/main/CVE-2023-43997.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-20651. | CVE ID: CVE-2023-20651
Date Updated: 2024-08-02T09:14:40.321Z
Date Published: 2023-03-07T00:00:00
Description:
In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629576; Issue ID: ALPS07629576.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://corp.mediatek.com/product-security-bulletin/March-2023
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-41210. | CVE ID: CVE-2022-41210
Date Updated: 2024-08-03T12:35:49.562Z
Date Published: 2022-10-11T00:00:00
Description:
SAP Customer Data Cloud (Gigya mobile app for Android) - version 7.4, uses insecure random number generator program which makes it easy for the attacker to predict future random numbers. This can lead to information disclosure and modification of certain user settings.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
- https://launchpad.support.sap.com/#/notes/3248384
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-40016. | CVE ID: CVE-2022-40016
Date Updated: 2024-08-03T12:07:43.010Z
Date Published: 2023-02-15T00:00:00
Description:
Use After Free (UAF) vulnerability in ireader media-server before commit 3e0f63f1d3553f75c7d4eb32fa7c7a1976a9ff84 in librtmp, allows attackers to cause a denial of service.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/ireader/media-server/issues/235
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-9960. | CVE ID: CVE-2019-9960
Date Updated: 2024-08-04T22:10:08.510Z
Date Published: 2019-03-24T00:27:05
Description:
The downloadZip function in application/controllers/admin/export.php in LimeSurvey through 3.16.1+190225 allows a relative path.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/LimeSurvey/LimeSurvey/commit/1ed10d3c423187712b8f6a8cb2bc9d5cc3b2deb8
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-25008. | CVE ID: CVE-2023-25008
Date Updated: 2024-08-02T11:11:43.427Z
Date Published: 2023-05-12T00:00:00
Description:
A malicious actor may convince a user to open a malicious USD file that may trigger an out-of-bounds read vulnerability which could result in code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0008
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-5685. | CVE ID: CVE-2012-5685
Date Updated: 2024-08-06T21:14:16.413Z
Date Published: 2014-08-14T14:00:00
Description:
SQL injection vulnerability in ZPanel 10.0.1 and earlier allows remote attackers to execute arbitrary SQL commands via the inEmailAddress parameter in an UpdateClient action in the manage_clients module to the default URI.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.exploit-db.com/exploits/22490
- http://osvdb.org/show/osvdb/87142
- http://secunia.com/advisories/51172
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-2131. | CVE ID: CVE-2022-2131
Date Updated: 2024-09-17T01:10:51.016Z
Date Published: 2022-07-25T14:20:53.830360Z
Description:
OpenKM Community Edition in its 6.3.10 version and before was using XMLReader parser in XMLTextExtractor.java file without the required security flags, allowing an attacker to perform a XML external entity injection attack.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.incibe-cert.es/en/early-warning/security-advisories/openkm-xxe-injection
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-20012. | CVE ID: CVE-2023-20012
Date Updated: 2024-08-02T08:57:35.036Z
Date Published: 2023-02-23T00:00:00
Description:
A vulnerability in the CLI console login authentication of Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability is due to the improper implementation of the password validation function. An attacker could exploit this vulnerability by logging in to the console port on an affected device. A successful exploit could allow the attacker to bypass authentication and execute a limited set of commands local to the FEX, which could cause a device reboot and denial of service (DoS) condition.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-elyfex-dos-gfvcByx
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-2020. | CVE ID: CVE-2009-2020
Date Updated: 2024-08-07T05:36:20.434Z
Date Published: 2009-06-09T19:00:00
Description:
Cross-site scripting (XSS) vulnerability in news_detail.php in Virtue News Manager allows remote attackers to inject arbitrary web script or HTML via the nid parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2009/1528
- https://www.exploit-db.com/exploits/8901
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-5870. | CVE ID: CVE-2013-5870
Date Updated: 2024-08-06T17:22:31.407Z
Date Published: 2014-01-15T00:30:00
Description:
Unspecified vulnerability in Oracle Java SE 7u45 and JavaFX 2.2.45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/56484
- http://osvdb.org/101994
- http://secunia.com/advisories/56535
- http://rhn.redhat.com/errata/RHSA-2014-0030.html
- http://secunia.com/advisories/56485
- http://marc.info/?l=bugtraq&m=139402697611681&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777
- http://marc.info/?l=bugtraq&m=139402697611681&w=2
- http://www.securitytracker.com/id/1029608
- http://www.securityfocus.com/bid/64929
- http://www.securityfocus.com/bid/64758
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90337
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-42081. | CVE ID: CVE-2021-42081
Date Updated: 2024-08-06T12:32:45.768Z
Date Published: 2023-07-10T06:29:48.514Z
Description:
An authenticated administrator is allowed to remotely execute arbitrary shell commands via the API.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wbsec.nl/osnexus
- https://www.divd.nl/DIVD-2021-00020
- https://www.osnexus.com/products/software-defined-storage
- https://csirt.divd.nl/CVE-2021-42081
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-3360. | CVE ID: CVE-2024-3360
Date Updated: 2024-08-01T20:05:08.507Z
Date Published: 2024-04-06T04:31:05.026Z
Description:
A vulnerability, which was classified as critical, was found in SourceCodester Online Library System 1.0. Affected is an unknown function of the file admin/books/index.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259464.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.259464
- https://vuldb.com/?ctiid.259464
- https://vuldb.com/?submit.310424
- https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-02
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-18413. | CVE ID: CVE-2020-18413
Date Updated: 2024-08-04T14:00:49.253Z
Date Published: 2023-06-27T00:00:00
Description:
Stored cross site scripting (XSS) vulnerability in /index.php?admin-master-navmenu-add of Chaoji CMS v2.18 that allows attackers to execute arbitrary code.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/GodEpic/chaojicms/issues/5
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-15287. | CVE ID: CVE-2019-15287
Date Updated: 2024-09-17T00:36:05.761Z
Date Published: 2020-09-23T00:35:26.666806Z
Description:
Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities exist due to insufficient validation of certain elements with a Webex recording stored in either the Advanced Recording Format (ARF) or the Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-webex-player
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-0830. | CVE ID: CVE-2015-0830
Date Updated: 2024-08-06T04:26:10.190Z
Date Published: 2015-02-25T11:00:00
Description:
The WebGL implementation in Mozilla Firefox before 36.0 does not properly allocate memory for copying an unspecified string to a shader's compilation log, which allows remote attackers to cause a denial of service (application crash) via crafted WebGL content.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.mozilla.org/security/announce/2015/mfsa2015-14.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1110488
- https://security.gentoo.org/glsa/201504-01
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/72745
- http://www.securitytracker.com/id/1031791
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html
- http://www.ubuntu.com/usn/USN-2505-1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-11583. | CVE ID: CVE-2020-11583
Date Updated: 2024-08-04T11:35:13.361Z
Date Published: 2020-08-03T20:12:17
Description:
A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://medium.com/%400x00crash/xss-reflected-in-plesk-onyx-and-obsidian-1173a3eaffb5
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-3059. | CVE ID: CVE-2018-3059
Date Updated: 2024-10-02T19:45:56.979Z
Date Published: 2018-10-17T01:00:00
Description:
Vulnerability in the Siebel UI Framework component of Oracle Siebel CRM (subcomponent: UIF Open UI). Supported versions that are affected are 18.7, 18.8 and 18.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Siebel UI Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Siebel UI Framework accessible data as well as unauthorized read access to a subset of Siebel UI Framework accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/105655
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-38275. | CVE ID: CVE-2024-38275
Date Updated: 2024-08-02T04:04:25.068Z
Date Published: 2024-06-18T19:49:26.986Z
Description:
The cURL wrapper in Moodle retained the original request headers when following redirects, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://moodle.org/mod/forum/discuss.php?d=459500
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-7560. | CVE ID: CVE-2015-7560
Date Updated: 2024-08-06T07:51:28.521Z
Date Published: 2016-03-13T22:00:00
Description:
The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/84267
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842
- http://www.securitytracker.com/id/1035220
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html
- https://www.samba.org/samba/security/CVE-2015-7560.html
- https://bugzilla.samba.org/show_bug.cgi?id=11648
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html
- http://www.ubuntu.com/usn/USN-2922-1
- http://www.debian.org/security/2016/dsa-3514
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-3067. | CVE ID: CVE-2010-3067
Date Updated: 2024-08-07T02:55:46.611Z
Date Published: 2010-09-21T17:00:00
Description:
Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/42778
- http://www.ubuntu.com/usn/USN-1000-1
- http://secunia.com/advisories/42801
- http://www.securityfocus.com/archive/1/520102/100/0/threaded
- http://secunia.com/advisories/46397
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
- http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
- http://www.redhat.com/support/errata/RHSA-2011-0007.html
- https://bugzilla.redhat.com/show_bug.cgi?id=629441
- http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
- http://www.vupen.com/english/advisories/2011/0298
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
- http://www.redhat.com/support/errata/RHSA-2010-0839.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
- http://www.vmware.com/security/advisories/VMSA-2011-0012.html
- http://www.vupen.com/english/advisories/2011/0375
- http://secunia.com/advisories/42890
- http://www.vupen.com/english/advisories/2011/0012
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61884
- http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
- http://www.redhat.com/support/errata/RHSA-2010-0758.html
- http://secunia.com/advisories/43291
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478
- http://www.redhat.com/support/errata/RHSA-2010-0779.html
- http://www.debian.org/security/2010/dsa-2126
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the vulnerability CVE-CVE-2020-5220 | CVE-CVE-2020-5220 is a vulnerability in SyliusResourceBundle. It is related to the MITRE ATT&CK technique T1190: Exploit Public-Facing Application. The vulnerability is classified as a exploitation_technique type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021. |
Provide detailed information about CVE-2017-14317. | CVE ID: CVE-2017-14317
Date Updated: 2024-08-05T19:20:41.386Z
Date Published: 2017-09-12T15:00:00
Description:
A domain cleanup issue was discovered in the C xenstore daemon (aka cxenstored) in Xen through 4.9.x. When shutting down a VM with a stubdomain, a race in cxenstored may cause a double-free. The xenstored daemon may crash, resulting in a DoS of any parts of the system relying on it (including domain creation / destruction, ballooning, device changes, etc.).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1039350
- http://xenbits.xen.org/xsa/advisory-233.html
- https://www.debian.org/security/2017/dsa-4050
- https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
- http://www.securityfocus.com/bid/100826
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-2070. | CVE ID: CVE-2010-2070
Date Updated: 2024-08-07T02:17:13.589Z
Date Published: 2010-06-16T20:00:00
Description:
arch/ia64/xen/faults.c in Xen 3.4 and 4.0 in Linux kernel 2.6.18, and possibly other kernel versions, when running on IA-64 architectures, allows local users to cause a denial of service and "turn on BE by modifying the user mask of the PSR," as demonstrated via exploitation of CVE-2006-0742.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.redhat.com/support/errata/RHSA-2010-0610.html
- http://xenbits.xensource.com/xen-4.0-testing.hg?rev/42caadb14edb
- http://www.openwall.com/lists/oss-security/2010/06/10/2
- http://osvdb.org/65541
- http://www.securityfocus.com/bid/40776
- http://secunia.com/advisories/43315
- https://exchange.xforce.ibmcloud.com/vulnerabilities/59373
- http://www.vmware.com/security/advisories/VMSA-2011-0003.html
- https://bugzilla.redhat.com/show_bug.cgi?id=586415
- http://www.securityfocus.com/archive/1/516397/100/0/threaded
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-32154. | CVE ID: CVE-2022-32154
Date Updated: 2024-09-16T20:11:36.885Z
Date Published: 2022-06-15T16:48:46.918488Z
Description:
Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capabilities can limit access to some custom and potentially risky commands (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands) for more information. Note that the attack is browser-based and an attacker cannot exploit it at will.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates
- https://www.splunk.com/en_us/product-security/announcements/svd-2022-0604.html
- https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands
- https://research.splunk.com/application/splunk_command_and_scripting_interpreter_risky_commands/
- https://research.splunk.com/application/splunk_command_and_scripting_interpreter_risky_spl_mltk/
- https://research.splunk.com/application/splunk_command_and_scripting_interpreter_delete_usage/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-0087. | CVE ID: CVE-2021-0087
Date Updated: 2023-05-16T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-45222. | CVE ID: CVE-2021-45222
Date Updated: 2024-08-04T04:39:20.517Z
Date Published: 2022-01-24T19:55:30
Description:
An issue was discovered in COINS Construction Cloud 11.12. Due to logical flaws in the human ressources interface, it is vulnerable to privilege escalation by HR personnel.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-029.txt
- https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-35739. | CVE ID: CVE-2022-35739
Date Updated: 2024-08-03T09:44:22.089Z
Date Published: 2022-10-25T00:00:00
Description:
PRTG Network Monitor through 22.2.77.2204 does not prevent custom input for a device’s icon, which can be modified to insert arbitrary content into the style tag for that device. When the device page loads, the arbitrary Cascading Style Sheets (CSS) data is inserted into the style tag, loading malicious content. Due to PRTG Network Monitor preventing “characters, and from modern browsers disabling JavaScript support in style tags, this vulnerability could not be escalated into a Cross-Site Scripting vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.paessler.com/prtg/history/stable
- https://raxis.com/blog/cve-2022-35739
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-35085. | CVE ID: CVE-2021-35085
Date Updated: 2024-08-04T00:33:51.001Z
Date Published: 2022-06-14T09:50:55
Description:
Possible buffer overflow due to lack of buffer length check during management frame Rx handling in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the MITRE ATT&CK technique T1574 | The MITRE ATT&CK technique T1574: Hijack Execution Flow is related to the vulnerability CVE-CVE-2018-10636. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact. |
Provide detailed information about CVE-2016-9018. | CVE ID: CVE-2016-9018
Date Updated: 2024-08-06T02:35:02.756Z
Date Published: 2016-10-28T15:00:00
Description:
Improper handling of a repeating VRAT chunk in qcpfformat.dll allows attackers to cause a Null pointer dereference and crash in RealNetworks RealPlayer 18.1.5.705 through a crafted .QCP media file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/40617/
- http://www.securityfocus.com/bid/94239
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-3421. | CVE ID: CVE-2016-3421
Date Updated: 2024-08-05T23:56:13.487Z
Date Published: 2016-04-21T10:00:00
Description:
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53, 8.54, and 8.55 allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to Activity Guide.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1035610
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-32965. | CVE ID: CVE-2023-32965
Date Updated: 2024-09-26T15:11:34.073Z
Date Published: 2023-07-18T13:24:59.534Z
Description:
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in CRUDLab Jazz Popups plugin <= 1.8.7 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/jazz-popups/wordpress-jazz-popups-plugin-1-8-7-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-27187. | CVE ID: CVE-2020-27187
Date Updated: 2024-08-04T16:11:35.915Z
Date Published: 2020-10-26T16:19:47
Description:
An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related commands, while KDE Partition Manager is running. the mount command can then be used to gain full root privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/KDE/partitionmanager/compare/v4.1.0...v4.2.0
- https://kde.org/info/security/advisory-20201017-1.txt
- https://bugzilla.redhat.com/show_bug.cgi?id=1890199
- https://security.gentoo.org/glsa/202011-03
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-24883. | CVE ID: CVE-2024-24883
Date Updated: 2024-08-09T20:13:59.196Z
Date Published: 2024-03-21T17:55:39.361Z
Description:
Missing Authorization vulnerability in BdThemes Prime Slider – Addons For Elementor.This issue affects Prime Slider – Addons For Elementor: from n/a through 3.11.10.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/bdthemes-prime-slider-lite/wordpress-prime-slider-plugin-3-11-10-broken-access-control-on-duplicate-post-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-3194. | CVE ID: CVE-2008-3194
Date Updated: 2024-08-07T09:28:41.681Z
Date Published: 2008-07-16T18:00:00
Description:
Multiple directory traversal vulnerabilities in data/inc/themes/predefined_variables.php in pluck 4.5.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) langpref, (2) file, (3) blogpost, or (4) cat parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2008/2104/references
- https://www.exploit-db.com/exploits/6074
- http://securityreason.com/securityalert/3996
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43741
- http://secunia.com/advisories/31088
- http://www.securityfocus.com/bid/30218
- http://www.pluck-cms.org/releasenotes.php#4.5.2
- http://www.bugreport.ir/index_48.htm
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-32594. | CVE ID: CVE-2021-32594
Date Updated: 2024-08-03T23:25:30.326Z
Date Published: 2021-08-04T13:26:46
Description:
An unrestricted file upload vulnerability in the web interface of FortiPortal 6.0.0 through 6.0.4, 5.3.0 through 5.3.5, 5.2.0 through 5.2.5, and 4.2.2 and earlier may allow a low-privileged user to potentially tamper with the underlying system's files via the upload of specifically crafted files.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://fortiguard.com/advisory/FG-IR-21-092
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-3860. | CVE ID: CVE-2009-3860
Date Updated: 2024-08-07T06:45:50.336Z
Date Published: 2009-11-04T17:00:00
Description:
Multiple insecure method vulnerabilities in Idefense Labs COMRaider allow remote attackers to create or overwrite arbitrary files via the (1) CreateFolder and (2) Copy methods. NOTE: this might only be a vulnerability in certain insecure configurations of Internet Explorer.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/archive/1/505042/100/0/threaded
- http://www.securityfocus.com/bid/35725
- http://www.juniper.net/security/auto/vulnerabilities/vuln35725.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-1748. | CVE ID: CVE-2014-1748
Date Updated: 2024-08-06T09:50:11.329Z
Date Published: 2014-05-21T10:00:00
Description:
The ScrollView::paint function in platform/scroll/ScrollView.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to spoof the UI by extending scrollbar painting into the parent frame.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://code.google.com/p/chromium/issues/detail?id=331168
- http://www.debian.org/security/2014/dsa-2939
- http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html
- http://security.gentoo.org/glsa/glsa-201408-16.xml
- http://secunia.com/advisories/60372
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html
- http://secunia.com/advisories/59155
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html
- http://support.apple.com/kb/HT6596
- http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html
- http://secunia.com/advisories/58920
- http://www.securitytracker.com/id/1030270
- https://src.chromium.org/viewvc/blink?revision=170625&view=revision
- http://www.ubuntu.com/usn/USN-2937-1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-5315. | CVE ID: CVE-2020-5315
Date Updated: 2024-09-16T16:18:34.603Z
Date Published: 2021-07-19T21:30:31.444529Z
Description:
Dell EMC Repository Manager (DRM) version 3.2 contains a plain-text password storage vulnerability. Proxy server user password is stored in a plain text in a local database. A local authenticated malicious user with access to the local file system may use the exposed password to access the with privileges of the compromised user.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.dell.com/support/article/us/en/04/sln319925/dsa-2020-001-dell-emc-repository-manager-drm-sensitive-data-exposure-vulnerability?lang=en
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-7460. | CVE ID: CVE-2014-7460
Date Updated: 2024-08-06T12:47:33.379Z
Date Published: 2014-10-19T10:00:00
Description:
The Slots Heaven:FREE Slot Machine (aka com.twelvegigs.heaven.slots) application 1.123 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/815873
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-16930. | CVE ID: CVE-2020-16930
Date Updated: 2024-08-04T13:45:34.460Z
Date Published: 2020-10-16T22:17:53
Description:
<p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p>
<p>Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.</p>
<p>The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.</p>
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16930
- https://www.zerodayinitiative.com/advisories/ZDI-20-1252/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1256/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-12933. | CVE ID: CVE-2020-12933
Date Updated: 2024-08-04T12:11:19.001Z
Date Published: 2020-10-13T21:11:26
Description:
A denial of service vulnerability exists in the D3DKMTEscape handler functionality of AMD ATIKMDAG.SYS (e.g. version 26.20.15029.27017). A specially crafted D3DKMTEscape API request can cause an out-of-bounds read in Windows OS kernel memory area. This vulnerability can be triggered from a non-privileged account.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.amd.com/en/corporate/product-security
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-19991. | CVE ID: CVE-2019-19991
Date Updated: 2024-08-05T02:32:10.136Z
Date Published: 2020-02-26T15:10:29
Description:
An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. Multiple Reflected Cross-site scripting (XSS) vulnerabilities allow remote authenticated users to inject arbitrary web script or HTML via the web pages /vam/vam_anagraphic.php, /vam/vam_vamuser.php, /common/vamp_main.php, and /wiz/change_password.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html
- https://www.seling.it/
- https://www.seling.it/product/vam/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-4688. | CVE ID: CVE-2014-4688
Date Updated: 2024-08-06T11:27:35.293Z
Date Published: 2014-07-02T10:00:00
Description:
pfSense before 2.1.4 allows remote authenticated users to execute arbitrary commands via (1) the hostname value to diag_dns.php in a Create Alias action, (2) the smartmonemail value to diag_smart.php, or (3) the database value to status_rrd_graph_img.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://pfsense.org/security/advisories/pfSense-SA-14_10.webgui.asc
- https://www.exploit-db.com/exploits/43560/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-2216. | CVE ID: CVE-2018-2216
Date Updated: 2019-01-22T17:57:02
Date Published: 2019-01-22T20:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-1940. | CVE ID: CVE-2011-1940
Date Updated: 2024-08-06T22:46:00.627Z
Date Published: 2012-01-26T15:00:00
Description:
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.3.x before 3.3.10.1 and 3.4.x before 3.4.1 allow remote attackers to inject arbitrary web script or HTML via a crafted table name that triggers improper HTML rendering on a Tracking page, related to (1) libraries/tbl_links.inc.php and (2) tbl_tracking.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.debian.org/security/2012/dsa-2391
- http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commitdiff%3Bh=7e10c132a3887c8ebfd7a8eee356b28375f1e287
- http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commitdiff%3Bh=d3ccf798fdbd4f8a89d4088130637d8dee918492
- http://www.phpmyadmin.net/home_page/security/PMASA-2011-3.php
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-39210. | CVE ID: CVE-2024-39210
Date Updated: 2024-08-02T04:19:20.635Z
Date Published: 2024-07-05T00:00:00
Description:
Best House Rental Management System v1.0 was discovered to contain an arbitrary file read vulnerability via the Page parameter at index.php. This vulnerability allows attackers to read arbitrary PHP files and access other sensitive information within the application.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/KRookieSec/CVE-2024-39210
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-16957. | CVE ID: CVE-2019-16957
Date Updated: 2024-08-05T01:24:48.671Z
Date Published: 2020-12-18T08:53:24
Description:
SolarWinds Web Help Desk 12.7.0 allows XSS via the First Name field of a User Account.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.solarwinds.com/SuccessCenter/s/
- https://www.solarwinds.com/free-tools/free-help-desk-software
- https://www.esecforte.com/cross-site-scripting-vulnerability-in-solarwinds-web-help-desk/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-2196. | CVE ID: CVE-2012-2196
Date Updated: 2024-08-06T19:26:08.982Z
Date Published: 2012-07-25T10:00:00
Description:
IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to read arbitrary XML files via the (1) GET_WRAP_CFG_C or (2) GET_WRAP_CFG_C2 stored procedure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC84712
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC84751
- http://secunia.com/advisories/49919
- http://www.securityfocus.com/bid/54487
- http://www-01.ibm.com/support/docview.wss?uid=swg21600837
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC84614
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC84750
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC84748
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-6976. | CVE ID: CVE-2017-6976
Date Updated: 2024-08-05T15:49:02.151Z
Date Published: 2018-04-03T06:00:00
Description:
An issue was discovered in certain Apple products. iOS before 10.3 is affected. The issue involves the "Sandbox Profiles" component. It allows attackers to bypass intended access restrictions (for iCloud user records) via a crafted app.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/HT207617
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-3011. | CVE ID: CVE-2015-3011
Date Updated: 2024-08-06T05:32:21.258Z
Date Published: 2015-05-08T14:00:00
Description:
Multiple cross-site scripting (XSS) vulnerabilities in the contacts application in ownCloud Server Community Edition before 5.0.19, 6.x before 6.0.7, and 7.x before 7.0.5 allow remote authenticated users to inject arbitrary web script or HTML via a crafted contact.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/74445
- https://owncloud.org/security/advisory/?id=oc-sa-2015-001
- http://www.debian.org/security/2015/dsa-3244
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-3914. | CVE ID: CVE-2018-3914
Date Updated: 2024-09-16T17:48:04.400Z
Date Published: 2018-09-21T15:00:00Z
Description:
An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 2000 bytes. An attacker can send an arbitrarily long "sessionToken" value in order to exploit this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-14595. | CVE ID: CVE-2020-14595
Date Updated: 2024-09-27T18:35:09.086Z
Date Published: 2020-07-15T17:34:29
Description:
Vulnerability in the Oracle iLearning product of Oracle iLearning (component: Assessment Manager). Supported versions that are affected are 6.1 and 6.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iLearning. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iLearning accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle iLearning. CVSS 3.1 Base Score 8.2 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpujul2020.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-2939. | CVE ID: CVE-2022-2939
Date Updated: 2024-08-03T00:52:59.815Z
Date Published: 2022-09-06T17:19:01
Description:
The WP Cerber Security plugin for WordPress is vulnerable to security protection bypass in versions up to, and including 9.0, that makes user enumeration possible. This is due to improper validation on the value supplied through the 'author' parameter found in the ~/cerber-load.php file. In vulnerable versions, the plugin only blocks requests if the value supplied is numeric, making it possible for attackers to supply additional non-numeric characters to bypass the protection. The non-numeric characters are stripped and the user requested is displayed. This can be used by unauthenticated attackers to gather information about users that can targeted in further attacks.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2939
- https://plugins.trac.wordpress.org/changeset/2772930/wp-cerber/trunk/cerber-load.php
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-2788. | CVE ID: CVE-2008-2788
Date Updated: 2024-09-17T01:06:38.933Z
Date Published: 2008-06-20T10:00:00Z
Description:
Cross-site scripting (XSS) vulnerability in index.php in OpenDocMan 1.2.5 allows remote attackers to inject arbitrary web script or HTML via the redirection parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://sourceforge.net/tracker/index.php?func=detail&aid=1975163&group_id=69505&atid=524753
- http://secunia.com/advisories/30750
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-21046. | CVE ID: CVE-2020-21046
Date Updated: 2024-08-04T14:22:25.427Z
Date Published: 2022-06-24T15:11:58
Description:
A local privilege escalation vulnerability was identified within the "luminati_net_updater_win_eagleget_com" service in EagleGet Downloader version 2.1.5.20 Stable. This issue allows authenticated non-administrative user to escalate their privilege and conduct code execution as a SYSTEM privilege.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://eagleget.com
- https://medium.com/%40n1pwn/local-privilege-escalation-in-eagleget-1fde79fe47c0
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-29584. | CVE ID: CVE-2021-29584
Date Updated: 2024-08-03T22:11:06.088Z
Date Published: 2021-05-14T19:15:22
Description:
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in caused by an integer overflow in constructing a new tensor shape. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/0908c2f2397c099338b901b067f6495a5b96760b/tensorflow/core/kernels/sparse_split_op.cc#L66-L70) builds a dense shape without checking that the dimensions would not result in overflow. The `TensorShape` constructor(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when `InitDims`(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xvjm-fvxx-q3hv
- https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-28018. | CVE ID: CVE-2020-28018
Date Updated: 2024-08-04T16:25:44.121Z
Date Published: 2021-05-06T03:58:59
Description:
Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28018-OCORK.txt
- http://www.openwall.com/lists/oss-security/2021/05/11/5
- http://www.openwall.com/lists/oss-security/2021/05/11/6
- http://www.openwall.com/lists/oss-security/2021/05/11/17
- http://www.openwall.com/lists/oss-security/2021/05/11/15
- http://www.openwall.com/lists/oss-security/2021/05/11/14
- http://www.openwall.com/lists/oss-security/2021/05/12/2
- http://www.openwall.com/lists/oss-security/2021/05/12/3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-15931. | CVE ID: CVE-2020-15931
Date Updated: 2024-08-04T13:30:23.305Z
Date Published: 2020-10-20T19:23:17
Description:
Netwrix Account Lockout Examiner before 5.1 allows remote attackers to capture the Net-NTLMv1/v2 authentication challenge hash of the Domain Administrator (that is configured within the product in its installation state) by generating a single Kerberos Pre-Authentication Failed (ID 4771) event on a Domain Controller.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.optiv.com/explore-optiv-insights/source-zero/netwrix-account-lockout-examiner-41-disclosure-vulnerability
- https://www.netwrix.com/netwrix_reports_vulnerability_in_netwrix_account_lockout_examiner_4_1.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-4067. | CVE ID: CVE-2008-4067
Date Updated: 2024-08-07T10:00:42.675Z
Date Published: 2008-09-24T18:00:00
Description:
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 on Linux allows remote attackers to read arbitrary files via a .. (dot dot) and URL-encoded / (slash) characters in a resource: URI.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/32025
- http://secunia.com/advisories/32011
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10770
- http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232
- http://www.debian.org/security/2009/dsa-1697
- http://secunia.com/advisories/32096
- https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html
- http://www.ubuntu.com/usn/usn-645-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:206
- http://secunia.com/advisories/32144
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45359
- http://secunia.com/advisories/32010
- http://www.securitytracker.com/id?1020921
- http://www.vupen.com/english/advisories/2009/0977
- http://www.ubuntu.com/usn/usn-645-2
- http://www.securityfocus.com/bid/31346
- http://secunia.com/advisories/31985
- http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
- http://secunia.com/advisories/31984
- http://secunia.com/advisories/32185
- http://secunia.com/advisories/32196
- https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html
- http://www.debian.org/security/2008/dsa-1669
- http://www.mozilla.org/security/announce/2008/mfsa2008-44.html
- http://secunia.com/advisories/32042
- http://secunia.com/advisories/33433
- http://www.vupen.com/english/advisories/2008/2661
- http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422
- http://secunia.com/advisories/32095
- http://secunia.com/advisories/32089
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
- http://secunia.com/advisories/32092
- http://www.redhat.com/support/errata/RHSA-2008-0879.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:205
- https://bugzilla.mozilla.org/show_bug.cgi?id=380994
- https://bugzilla.mozilla.org/show_bug.cgi?id=394075
- http://www.debian.org/security/2009/dsa-1696
- http://download.novell.com/Download?buildid=WZXONb-tqBw~
- http://www.0x000000.com/?i=422
- https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html
- http://secunia.com/advisories/31987
- http://www.ubuntu.com/usn/usn-647-1
- http://secunia.com/advisories/32007
- http://www.redhat.com/support/errata/RHSA-2008-0882.html
- http://secunia.com/advisories/32845
- http://www.debian.org/security/2008/dsa-1649
- http://secunia.com/advisories/32012
- http://secunia.com/advisories/33434
- http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123
- http://secunia.com/advisories/32044
- http://www.redhat.com/support/errata/RHSA-2008-0908.html
- http://secunia.com/advisories/34501
- http://secunia.com/advisories/32082
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-3507. | CVE ID: CVE-2023-3507
Date Updated: 2024-08-02T06:55:03.603Z
Date Published: 2023-07-31T09:37:37.183Z
Description:
The WooCommerce Pre-Orders WordPress plugin before 2.0.3 has a flawed CSRF check when canceling pre-orders, which could allow attackers to make logged in admins cancel arbitrary pre-orders via a CSRF attack
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/e72bbe9b-e51d-40ab-820d-404e0cb86ee6
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-7260. | CVE ID: CVE-2019-7260
Date Updated: 2024-08-04T20:46:45.994Z
Date Published: 2019-07-02T17:06:49
Description:
Linear eMerge E3-Series devices have Cleartext Credentials in a Database.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://applied-risk.com/labs/advisories
- https://www.applied-risk.com/resources/ar-2019-005
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-30537. | CVE ID: CVE-2024-30537
Date Updated: 2024-08-02T01:38:59.992Z
Date Published: 2024-06-09T09:01:58.058Z
Description:
Missing Authorization vulnerability in WPClever WPC Badge Management for WooCommerce.This issue affects WPC Badge Management for WooCommerce: from n/a through 2.4.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/wpc-badge-management/wordpress-wpc-badge-management-for-woocommerce-plugin-2-4-0-broken-access-control-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-23258. | CVE ID: CVE-2020-23258
Date Updated: 2024-08-04T14:58:14.498Z
Date Published: 2023-04-04T00:00:00
Description:
An issue found in Jsish v.3.0.11 allows a remote attacker to cause a denial of service via the Jsi_ValueIsNumber function in ./src/jsiValue.c file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/pcmacdon/jsish/issues/12
- https://jsish.org/fossil/jsi2/tktview?name=2ba1d89d32
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-1935. | CVE ID: CVE-2011-1935
Date Updated: 2024-08-06T22:46:00.706Z
Date Published: 2017-10-20T18:00:00
Description:
pcap-linux.c in libpcap 1.1.1 before commit ea9432fabdf4b33cbc76d9437200e028f1c47c93 when snaplen is set may truncate packets, which might allow remote attackers to send arbitrary data while avoiding detection via crafted packets.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://article.gmane.org/gmane.network.tcpdump.devel/4968
- http://www.openwall.com/lists/oss-security/2014/02/08/5
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=623868
- http://www.openwall.com/lists/oss-security/2011/05/19/11
- http://thread.gmane.org/gmane.network.tcpdump.devel/5018
- https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1%3Bbug=623868%3Bfilename=0001-Fix-the-calculation-of-the-frame-size-in-memory-mapp.patch%3Bmsg=10
- https://security-tracker.debian.org/tracker/CVE-2011-1935/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-13338. | CVE ID: CVE-2020-13338
Date Updated: 2024-08-04T12:18:17.515Z
Date Published: 2020-10-02T19:20:06
Description:
An issue has been discovered in GitLab affecting versions prior to 12.10.13, 13.0.8, 13.1.2. A stored cross-site scripting vulnerability was discovered when editing references.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gitlab.com/gitlab-org/gitlab/-/issues/213273
- https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13338.json
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-0677. | CVE ID: CVE-2013-0677
Date Updated: 2024-09-16T23:10:58.644Z
Date Published: 2013-03-21T15:00:00Z
Description:
The web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to obtain sensitive information or cause a denial of service via a crafted project file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf
- http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-33003. | CVE ID: CVE-2024-33003
Date Updated: 2024-08-13T14:57:53.908Z
Date Published: 2024-08-13T03:36:55.034Z
Description:
Some OCC API endpoints in SAP Commerce Cloud
allows Personally Identifiable Information (PII) data, such as passwords, email
addresses, mobile numbers, coupon codes, and voucher codes, to be included in
the request URL as query or path parameters. On successful exploitation, this
could lead to a High impact on confidentiality and integrity of the
application.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://me.sap.com/notes/3459935
- https://url.sap/sapsecuritypatchday
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-1313. | CVE ID: CVE-2019-1313
Date Updated: 2024-08-04T18:13:30.522Z
Date Published: 2019-10-10T13:28:40
Description:
An information disclosure vulnerability exists in Microsoft SQL Server Management Studio (SSMS) when it improperly enforces permissions, aka 'SQL Server Management Studio Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1376.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1313
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-4440. | CVE ID: CVE-2008-4440
Date Updated: 2024-08-07T10:17:09.825Z
Date Published: 2008-10-03T22:00:00
Description:
The to-upgrade plugin in feta 1.4.16 allows local users to overwrite arbitrary files via a symlink on the (1) /tmp/feta.install.$USER and (2) /tmp/feta.avail.$USER temporary files.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/32155
- http://www.openwall.com/lists/oss-security/2008/10/30/2
- http://dev.gentoo.org/~rbu/security/debiantemp/feta
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496397
- https://bugs.gentoo.org/show_bug.cgi?id=235770
- http://www.debian.org/security/2008/dsa-1643
- http://www.securityfocus.com/bid/30899
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-25582. | CVE ID: CVE-2022-25582
Date Updated: 2024-08-03T04:42:50.037Z
Date Published: 2022-03-25T16:45:09
Description:
A stored cross-site scripting (XSS) vulnerability in the Column module of ClassCMS v2.5 and below allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Add Articles field.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/k0xx11/Vulscve/blob/master/classcms2.5-xss.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-13652. | CVE ID: CVE-2018-13652
Date Updated: 2024-08-05T09:07:52.604Z
Date Published: 2018-07-09T06:00:00
Description:
The mintToken function of a smart contract implementation for TheGoDigital, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/BlockChainsSecurity/EtherTokens/tree/master/TheGoDigital
- https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-1694. | CVE ID: CVE-2009-1694
Date Updated: 2024-08-07T05:20:35.166Z
Date Published: 2009-06-10T14:00:00
Description:
WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle redirects, which allows remote attackers to read images from arbitrary web sites via vectors involving a CANVAS element and redirection, related to a "cross-site image capture issue."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://support.apple.com/kb/HT3639
- http://secunia.com/advisories/43068
- http://www.vupen.com/english/advisories/2009/1621
- http://www.vupen.com/english/advisories/2011/0212
- http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
- http://www.securityfocus.com/bid/35260
- http://osvdb.org/55005
- http://www.vupen.com/english/advisories/2009/1522
- http://secunia.com/advisories/37746
- http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
- http://www.debian.org/security/2009/dsa-1950
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
- http://secunia.com/advisories/35379
- http://www.securityfocus.com/bid/35322
- http://support.apple.com/kb/HT3613
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-10048. | CVE ID: CVE-2020-10048
Date Updated: 2024-08-04T10:50:57.903Z
Date Published: 2021-02-09T15:38:17
Description:
A vulnerability has been identified in SIMATIC PCS 7 (All versions), SIMATIC WinCC (All versions < V7.5 SP2). Due to an insecure password verification process, an attacker could bypass the password protection set on protected files, thus being granted access to the protected content, circumventing authentication.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cert-portal.siemens.com/productcert/pdf/ssa-944678.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-10723. | CVE ID: CVE-2020-10723
Date Updated: 2024-08-04T11:14:14.697Z
Date Published: 2020-05-19T18:02:46
Description:
A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://usn.ubuntu.com/4362-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10723
- https://bugs.dpdk.org/show_bug.cgi?id=268
- https://www.oracle.com/security-alerts/cpujan2021.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-15411. | CVE ID: CVE-2018-15411
Date Updated: 2024-09-17T01:00:31.649Z
Date Published: 2018-10-05T14:00:00Z
Description:
A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or an email attachment and persuading the user to open the file by using the affected software. A successful exploit could allow the attacker to execute arbitrary code on the affected system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1041795
- http://www.securityfocus.com/bid/105520
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-3724. | CVE ID: CVE-2013-3724
Date Updated: 2024-09-17T03:13:01.350Z
Date Published: 2013-07-31T21:00:00Z
Description:
The mk_request_header_process function in mk_request.c in Monkey 1.1.1 allows remote attackers to cause a denial of service (thread crash and service outage) via a '\0' character in an HTTP request.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://bugs.monkey-project.com/ticket/181
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-31938. | CVE ID: CVE-2021-31938
Date Updated: 2024-08-03T23:10:31.288Z
Date Published: 2021-06-08T22:46:14
Description:
Microsoft VsCode Kubernetes Tools Extension Elevation of Privilege Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31938
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-41085. | CVE ID: CVE-2022-41085
Date Updated: 2024-08-03T12:35:49.510Z
Date Published: 2022-11-09T00:00:00
Description:
Azure CycleCloud Elevation of Privilege Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41085
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-15582. | CVE ID: CVE-2020-15582
Date Updated: 2024-08-04T13:22:30.094Z
Date Published: 2020-07-07T13:23:03
Description:
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (Exynos 7885 chipsets) software. The Bluetooth Low Energy (BLE) component has a buffer overflow with a resultant deadlock or crash. The Samsung ID is SVE-2020-16870 (July 2020).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.samsungmobile.com/securityUpdate.smsb
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-8308. | CVE ID: CVE-2019-8308
Date Updated: 2024-08-04T21:17:30.551Z
Date Published: 2019-02-12T23:00:00
Description:
Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922059
- https://github.com/flatpak/flatpak/releases/tag/1.2.3
- https://github.com/flatpak/flatpak/releases/tag/1.0.7
- https://access.redhat.com/errata/RHSA-2019:0375
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00088.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-0271. | CVE ID: CVE-2019-0271
Date Updated: 2024-08-04T17:44:16.313Z
Date Published: 2019-03-12T22:00:00
Description:
ABAP Server (used in NetWeaver and Suite/ERP) and ABAP Platform does not sufficiently validate an XML document accepted from an untrusted source, leading to an XML External Entity (XEE) vulnerability. Fixed in Kernel 7.21 or 7.22, that is ABAP Server 7.00 to 7.31 and Kernel 7.45, 7.49 or 7.53, that is ABAP Server 7.40 to 7.52 or ABAP Platform. For more recent updates please refer to Security Note 2870067 (which supersedes the solution of Security Note 2736825) in the reference section below.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/107355
- https://launchpad.support.sap.com/#/notes/2870067
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812
- https://launchpad.support.sap.com/#/notes/2736825
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=515408080
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-12401. | CVE ID: CVE-2020-12401
Date Updated: 2024-08-04T11:56:51.648Z
Date Published: 2020-10-08T00:00:00
Description:
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.mozilla.org/security/advisories/mfsa2020-39/
- https://www.mozilla.org/security/advisories/mfsa2020-36/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1631573
- https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-7627. | CVE ID: CVE-2016-7627
Date Updated: 2024-08-06T02:04:55.727Z
Date Published: 2017-02-20T08:35:00
Description:
An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "CoreGraphics" component. It allows attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted font.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/HT207487
- https://support.apple.com/HT207422
- http://www.securityfocus.com/bid/94905
- http://www.securitytracker.com/id/1037469
- https://support.apple.com/HT207423
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-21072. | CVE ID: CVE-2023-21072
Date Updated: 2024-08-02T09:28:24.915Z
Date Published: 2023-03-24T00:00:00
Description:
In rtt_unpack_xtlv_cbfn of dhd_rtt.c, there is a possible out of bounds write due to a buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-257290781References: N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/pixel/2023-03-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-11753. | CVE ID: CVE-2017-11753
Date Updated: 2024-08-05T18:19:38.910Z
Date Published: 2017-07-30T18:00:00
Description:
The GetImageDepth function in MagickCore/attribute.c in ImageMagick 7.0.6-4 might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted Flexible Image Transport System (FITS) file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/ImageMagick/ImageMagick/issues/629
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-36313. | CVE ID: CVE-2022-36313
Date Updated: 2024-08-03T10:00:04.274Z
Date Published: 2022-07-21T15:31:27
Description:
An issue was discovered in the file-type package before 16.5.4 and 17.x before 17.1.3 for Node.js. A malformed MKV file could cause the file type detector to get caught in an infinite loop. This would make the application become unresponsive and could be used to cause a DoS attack.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.npmjs.com/package/file-type
- https://github.com/sindresorhus/file-type/releases/tag/v17.1.3
- https://github.com/sindresorhus/file-type/releases/tag/v16.5.4
- https://security.netapp.com/advisory/ntap-20220909-0005/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-16289. | CVE ID: CVE-2020-16289
Date Updated: 2024-08-04T13:37:54.252Z
Date Published: 2020-08-13T02:07:50
Description:
A buffer overflow vulnerability in cif_print_page() in devices/gdevcif.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugs.ghostscript.com/show_bug.cgi?id=701788
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=d31e25ed5b130499e0d880e4609b1b4824699768
- https://lists.debian.org/debian-lts-announce/2020/08/msg00032.html
- https://www.debian.org/security/2020/dsa-4748
- https://security.gentoo.org/glsa/202008-20
- https://usn.ubuntu.com/4469-1/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-36922. | CVE ID: CVE-2023-36922
Date Updated: 2024-08-02T17:01:09.981Z
Date Published: 2023-07-11T02:56:55.299Z
Description:
Due to programming error in function module and report, IS-OIL component in SAP ECC and SAP S/4HANA allows an authenticated attacker to inject an arbitrary operating system command into an unprotected parameter in a common (default) extension. On successful exploitation, the attacker can read or modify the system data as well as shut down the system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://me.sap.com/notes/3350297
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-30074. | CVE ID: CVE-2021-30074
Date Updated: 2024-08-03T22:24:59.234Z
Date Published: 2021-04-02T20:40:10
Description:
docsify 4.12.1 is affected by Cross Site Scripting (XSS) because the search component does not appropriately encode Code Blocks and mishandles the " character.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/docsifyjs/docsify/issues/1549
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-0077. | CVE ID: CVE-2012-0077
Date Updated: 2024-08-06T18:16:18.453Z
Date Published: 2012-01-18T22:00:00
Description:
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 9.2.4, 10.0.2, 10.3.3, 10.3.4, and 10.3.5 allows remote authenticated users to affect integrity, related to WLS-Console.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72477
- http://osvdb.org/78401
- http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
- http://www.securityfocus.com/bid/51460
- http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000007.html
- http://jvn.jp/en/jp/JVN54779201/index.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-3405. | CVE ID: CVE-2010-3405
Date Updated: 2024-08-07T03:11:43.776Z
Date Published: 2010-09-16T20:00:00
Description:
Buffer overflow in sa_snap in the bos.esagent fileset in IBM AIX 6.1, 5.3, and earlier and VIOS 2.1, 1.5, and earlier allows local users to leverage system group membership and gain privileges via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.ibm.com/support/docview.wss?uid=isg1IZ82245
- http://www.ibm.com/support/docview.wss?uid=isg1IZ83942
- http://www.vupen.com/english/advisories/2010/2377
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12214
- http://www.securityfocus.com/bid/43207
- http://www.ibm.com/support/docview.wss?uid=isg1IZ84167
- http://www.ibm.com/support/docview.wss?uid=isg1IZ81819
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61774
- http://www.ibm.com/support/docview.wss?uid=isg1IZ82630
- http://secunia.com/advisories/41446
- http://www.ibm.com/support/docview.wss?uid=isg1IZ83909
- http://www.ibm.com/support/docview.wss?uid=isg1IZ83975
- http://securitytracker.com/id?1024430
- http://aix.software.ibm.com/aix/efixes/security/sa_snap_advisory.asc
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-32791. | CVE ID: CVE-2023-32791
Date Updated: 2024-09-06T14:09:28.930Z
Date Published: 2023-10-03T12:43:01.043Z
Description:
Cross-Site Request Forgery (CSRF) vulnerability in NXLog Manager 5.6.5633 version. This vulnerability allows an attacker to manipulate and delete user accounts within the platform by sending a specifically crafted query to the server. The vulnerability is based on the lack of proper validation of the origin of incoming requests.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-nxlog-manager
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.