instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2022-33177.
CVE ID: CVE-2022-33177 Date Updated: 2024-09-16T19:36:56.664Z Date Published: 2022-09-06T17:18:54.357827Z Description: Cross-Site Request Forgery (CSRF) vulnerability in WPdevelop/Oplugins Booking Calendar plugin <= 9.2.1 at WordPress leading to Translations Update. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/booking/wordpress-booking-calendar-plugin-9-2-1-cross-site-request-forgery-csrf-leading-to-translations-update/_s_id=cve - https://wordpress.org/plugins/booking/#developers No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6643.
CVE ID: CVE-2013-6643 Date Updated: 2024-08-06T17:46:22.299Z Date Published: 2014-01-16T11:00:00 Description: The OneClickSigninBubbleView::WindowClosing function in browser/ui/views/sync/one_click_signin_bubble_view.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows attackers to trigger a sync with an arbitrary Google account by leveraging improper handling of the closing of an untrusted signin confirm dialog. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://src.chromium.org/viewvc/chrome?revision=237115&view=revision - http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html - http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html - https://code.google.com/p/chromium/issues/detail?id=321940 - http://www.debian.org/security/2014/dsa-2862 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3905.
CVE ID: CVE-2010-3905 Date Updated: 2024-08-07T03:26:12.270Z Date Published: 2010-12-22T20:00:00 Description: The password reset feature in the administrator interface for Eucalyptus 2.0.0 and 2.0.1 does not perform authentication, which allows remote attackers to gain privileges by sending password reset requests for other users. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/45462 - http://www.ubuntu.com/usn/USN-1033-1 - https://exchange.xforce.ibmcloud.com/vulnerabilities/64167 - http://secunia.com/advisories/42666 - http://www.vupen.com/english/advisories/2010/3260 - http://secunia.com/advisories/42632 - http://open.eucalyptus.com/wiki/esa-01 - http://www.vupen.com/english/advisories/2010/3259 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2749.
CVE ID: CVE-2018-2749 Date Updated: 2024-10-03T20:22:50.589Z Date Published: 2018-04-19T02:00:00 Description: Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module). Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0 and 14.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Banking Corporate Lending, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Banking Corporate Lending accessible data as well as unauthorized read access to a subset of Oracle Banking Corporate Lending accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/103864 - http://www.securitytracker.com/id/1040693 - http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0267.
CVE ID: CVE-2017-0267 Date Updated: 2024-08-05T12:55:19.343Z Date Published: 2017-05-12T14:00:00 Description: Microsoft Server Message Block 1.0 (SMBv1) allows an information disclosure vulnerability in the way that Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 handles certain requests, aka "Windows SMB Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0268, CVE-2017-0270, CVE-2017-0271, CVE-2017-0274, CVE-2017-0275, and CVE-2017-0276. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/98259 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0267 - https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 - http://www.securitytracker.com/id/1038432 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-0421.
CVE ID: CVE-2012-0421 Date Updated: 2024-09-16T18:19:37.647Z Date Published: 2012-08-08T10:00:00Z Description: The SUSE Audit Log Keeper daemon before 0.2.1-0.4.6.1 for SUSE Manager and Spacewalk uses world-readable permissions for /etc/auditlog-keeper.conf, which allows local users to obtain passwords by reading this file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00001.html - https://bugzilla.novell.com/771335 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-43997.
CVE ID: CVE-2023-43997 Date Updated: 2024-08-02T19:52:11.921Z Date Published: 2024-01-24T00:00:00 Description: An issue in Yoruichi hobby base mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/syz913/CVE-reports/blob/main/CVE-2023-43997.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20651.
CVE ID: CVE-2023-20651 Date Updated: 2024-08-02T09:14:40.321Z Date Published: 2023-03-07T00:00:00 Description: In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629576; Issue ID: ALPS07629576. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/March-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41210.
CVE ID: CVE-2022-41210 Date Updated: 2024-08-03T12:35:49.562Z Date Published: 2022-10-11T00:00:00 Description: SAP Customer Data Cloud (Gigya mobile app for Android) - version 7.4, uses insecure random number generator program which makes it easy for the attacker to predict future random numbers. This can lead to information disclosure and modification of certain user settings. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - https://launchpad.support.sap.com/#/notes/3248384 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40016.
CVE ID: CVE-2022-40016 Date Updated: 2024-08-03T12:07:43.010Z Date Published: 2023-02-15T00:00:00 Description: Use After Free (UAF) vulnerability in ireader media-server before commit 3e0f63f1d3553f75c7d4eb32fa7c7a1976a9ff84 in librtmp, allows attackers to cause a denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ireader/media-server/issues/235 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9960.
CVE ID: CVE-2019-9960 Date Updated: 2024-08-04T22:10:08.510Z Date Published: 2019-03-24T00:27:05 Description: The downloadZip function in application/controllers/admin/export.php in LimeSurvey through 3.16.1+190225 allows a relative path. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/LimeSurvey/LimeSurvey/commit/1ed10d3c423187712b8f6a8cb2bc9d5cc3b2deb8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-25008.
CVE ID: CVE-2023-25008 Date Updated: 2024-08-02T11:11:43.427Z Date Published: 2023-05-12T00:00:00 Description: A malicious actor may convince a user to open a malicious USD file that may trigger an out-of-bounds read vulnerability which could result in code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0008 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5685.
CVE ID: CVE-2012-5685 Date Updated: 2024-08-06T21:14:16.413Z Date Published: 2014-08-14T14:00:00 Description: SQL injection vulnerability in ZPanel 10.0.1 and earlier allows remote attackers to execute arbitrary SQL commands via the inEmailAddress parameter in an UpdateClient action in the manage_clients module to the default URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/22490 - http://osvdb.org/show/osvdb/87142 - http://secunia.com/advisories/51172 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2131.
CVE ID: CVE-2022-2131 Date Updated: 2024-09-17T01:10:51.016Z Date Published: 2022-07-25T14:20:53.830360Z Description: OpenKM Community Edition in its 6.3.10 version and before was using XMLReader parser in XMLTextExtractor.java file without the required security flags, allowing an attacker to perform a XML external entity injection attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.incibe-cert.es/en/early-warning/security-advisories/openkm-xxe-injection No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20012.
CVE ID: CVE-2023-20012 Date Updated: 2024-08-02T08:57:35.036Z Date Published: 2023-02-23T00:00:00 Description: A vulnerability in the CLI console login authentication of Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability is due to the improper implementation of the password validation function. An attacker could exploit this vulnerability by logging in to the console port on an affected device. A successful exploit could allow the attacker to bypass authentication and execute a limited set of commands local to the FEX, which could cause a device reboot and denial of service (DoS) condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-elyfex-dos-gfvcByx No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2020.
CVE ID: CVE-2009-2020 Date Updated: 2024-08-07T05:36:20.434Z Date Published: 2009-06-09T19:00:00 Description: Cross-site scripting (XSS) vulnerability in news_detail.php in Virtue News Manager allows remote attackers to inject arbitrary web script or HTML via the nid parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2009/1528 - https://www.exploit-db.com/exploits/8901 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5870.
CVE ID: CVE-2013-5870 Date Updated: 2024-08-06T17:22:31.407Z Date Published: 2014-01-15T00:30:00 Description: Unspecified vulnerability in Oracle Java SE 7u45 and JavaFX 2.2.45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/56484 - http://osvdb.org/101994 - http://secunia.com/advisories/56535 - http://rhn.redhat.com/errata/RHSA-2014-0030.html - http://secunia.com/advisories/56485 - http://marc.info/?l=bugtraq&m=139402697611681&w=2 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 - http://marc.info/?l=bugtraq&m=139402697611681&w=2 - http://www.securitytracker.com/id/1029608 - http://www.securityfocus.com/bid/64929 - http://www.securityfocus.com/bid/64758 - http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/90337 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42081.
CVE ID: CVE-2021-42081 Date Updated: 2024-08-06T12:32:45.768Z Date Published: 2023-07-10T06:29:48.514Z Description: An authenticated administrator is allowed to remotely execute arbitrary shell commands via the API. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wbsec.nl/osnexus - https://www.divd.nl/DIVD-2021-00020 - https://www.osnexus.com/products/software-defined-storage - https://csirt.divd.nl/CVE-2021-42081 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3360.
CVE ID: CVE-2024-3360 Date Updated: 2024-08-01T20:05:08.507Z Date Published: 2024-04-06T04:31:05.026Z Description: A vulnerability, which was classified as critical, was found in SourceCodester Online Library System 1.0. Affected is an unknown function of the file admin/books/index.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259464. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.259464 - https://vuldb.com/?ctiid.259464 - https://vuldb.com/?submit.310424 - https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-18413.
CVE ID: CVE-2020-18413 Date Updated: 2024-08-04T14:00:49.253Z Date Published: 2023-06-27T00:00:00 Description: Stored cross site scripting (XSS) vulnerability in /index.php?admin-master-navmenu-add of Chaoji CMS v2.18 that allows attackers to execute arbitrary code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/GodEpic/chaojicms/issues/5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15287.
CVE ID: CVE-2019-15287 Date Updated: 2024-09-17T00:36:05.761Z Date Published: 2020-09-23T00:35:26.666806Z Description: Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities exist due to insufficient validation of certain elements with a Webex recording stored in either the Advanced Recording Format (ARF) or the Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191106-webex-player No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0830.
CVE ID: CVE-2015-0830 Date Updated: 2024-08-06T04:26:10.190Z Date Published: 2015-02-25T11:00:00 Description: The WebGL implementation in Mozilla Firefox before 36.0 does not properly allocate memory for copying an unspecified string to a shader's compilation log, which allows remote attackers to cause a denial of service (application crash) via crafted WebGL content. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mozilla.org/security/announce/2015/mfsa2015-14.html - https://bugzilla.mozilla.org/show_bug.cgi?id=1110488 - https://security.gentoo.org/glsa/201504-01 - http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - http://www.securityfocus.com/bid/72745 - http://www.securitytracker.com/id/1031791 - http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html - http://www.ubuntu.com/usn/USN-2505-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11583.
CVE ID: CVE-2020-11583 Date Updated: 2024-08-04T11:35:13.361Z Date Published: 2020-08-03T20:12:17 Description: A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://medium.com/%400x00crash/xss-reflected-in-plesk-onyx-and-obsidian-1173a3eaffb5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3059.
CVE ID: CVE-2018-3059 Date Updated: 2024-10-02T19:45:56.979Z Date Published: 2018-10-17T01:00:00 Description: Vulnerability in the Siebel UI Framework component of Oracle Siebel CRM (subcomponent: UIF Open UI). Supported versions that are affected are 18.7, 18.8 and 18.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Siebel UI Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Siebel UI Framework accessible data as well as unauthorized read access to a subset of Siebel UI Framework accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - http://www.securityfocus.com/bid/105655 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38275.
CVE ID: CVE-2024-38275 Date Updated: 2024-08-02T04:04:25.068Z Date Published: 2024-06-18T19:49:26.986Z Description: The cURL wrapper in Moodle retained the original request headers when following redirects, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://moodle.org/mod/forum/discuss.php?d=459500 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7560.
CVE ID: CVE-2015-7560 Date Updated: 2024-08-06T07:51:28.521Z Date Published: 2016-03-13T22:00:00 Description: The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/84267 - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842 - http://www.securitytracker.com/id/1035220 - http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.html - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html - https://www.samba.org/samba/security/CVE-2015-7560.html - https://bugzilla.samba.org/show_bug.cgi?id=11648 - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html - http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.html - http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.html - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html - http://www.ubuntu.com/usn/USN-2922-1 - http://www.debian.org/security/2016/dsa-3514 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3067.
CVE ID: CVE-2010-3067 Date Updated: 2024-08-07T02:55:46.611Z Date Published: 2010-09-21T17:00:00 Description: Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/42778 - http://www.ubuntu.com/usn/USN-1000-1 - http://secunia.com/advisories/42801 - http://www.securityfocus.com/archive/1/520102/100/0/threaded - http://secunia.com/advisories/46397 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html - http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.36-rc4-next-20100915.bz2 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html - http://www.redhat.com/support/errata/RHSA-2011-0007.html - https://bugzilla.redhat.com/show_bug.cgi?id=629441 - http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html - http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html - http://www.vupen.com/english/advisories/2011/0298 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:051 - http://www.redhat.com/support/errata/RHSA-2010-0839.html - http://www.mandriva.com/security/advisories?name=MDVSA-2010:257 - http://www.vmware.com/security/advisories/VMSA-2011-0012.html - http://www.vupen.com/english/advisories/2011/0375 - http://secunia.com/advisories/42890 - http://www.vupen.com/english/advisories/2011/0012 - https://exchange.xforce.ibmcloud.com/vulnerabilities/61884 - http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html - http://www.mandriva.com/security/advisories?name=MDVSA-2011:029 - http://www.redhat.com/support/errata/RHSA-2010-0758.html - http://secunia.com/advisories/43291 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478 - http://www.redhat.com/support/errata/RHSA-2010-0779.html - http://www.debian.org/security/2010/dsa-2126 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2020-5220
CVE-CVE-2020-5220 is a vulnerability in SyliusResourceBundle. It is related to the MITRE ATT&CK technique T1190: Exploit Public-Facing Application. The vulnerability is classified as a exploitation_technique type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2017-14317.
CVE ID: CVE-2017-14317 Date Updated: 2024-08-05T19:20:41.386Z Date Published: 2017-09-12T15:00:00 Description: A domain cleanup issue was discovered in the C xenstore daemon (aka cxenstored) in Xen through 4.9.x. When shutting down a VM with a stubdomain, a race in cxenstored may cause a double-free. The xenstored daemon may crash, resulting in a DoS of any parts of the system relying on it (including domain creation / destruction, ballooning, device changes, etc.). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1039350 - http://xenbits.xen.org/xsa/advisory-233.html - https://www.debian.org/security/2017/dsa-4050 - https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html - http://www.securityfocus.com/bid/100826 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2070.
CVE ID: CVE-2010-2070 Date Updated: 2024-08-07T02:17:13.589Z Date Published: 2010-06-16T20:00:00 Description: arch/ia64/xen/faults.c in Xen 3.4 and 4.0 in Linux kernel 2.6.18, and possibly other kernel versions, when running on IA-64 architectures, allows local users to cause a denial of service and "turn on BE by modifying the user mask of the PSR," as demonstrated via exploitation of CVE-2006-0742. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.redhat.com/support/errata/RHSA-2010-0610.html - http://xenbits.xensource.com/xen-4.0-testing.hg?rev/42caadb14edb - http://www.openwall.com/lists/oss-security/2010/06/10/2 - http://osvdb.org/65541 - http://www.securityfocus.com/bid/40776 - http://secunia.com/advisories/43315 - https://exchange.xforce.ibmcloud.com/vulnerabilities/59373 - http://www.vmware.com/security/advisories/VMSA-2011-0003.html - https://bugzilla.redhat.com/show_bug.cgi?id=586415 - http://www.securityfocus.com/archive/1/516397/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32154.
CVE ID: CVE-2022-32154 Date Updated: 2024-09-16T20:11:36.885Z Date Published: 2022-06-15T16:48:46.918488Z Description: Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capabilities can limit access to some custom and potentially risky commands (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands) for more information. Note that the attack is browser-based and an attacker cannot exploit it at will. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/Updates - https://www.splunk.com/en_us/product-security/announcements/svd-2022-0604.html - https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands - https://research.splunk.com/application/splunk_command_and_scripting_interpreter_risky_commands/ - https://research.splunk.com/application/splunk_command_and_scripting_interpreter_risky_spl_mltk/ - https://research.splunk.com/application/splunk_command_and_scripting_interpreter_delete_usage/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0087.
CVE ID: CVE-2021-0087 Date Updated: 2023-05-16T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-45222.
CVE ID: CVE-2021-45222 Date Updated: 2024-08-04T04:39:20.517Z Date Published: 2022-01-24T19:55:30 Description: An issue was discovered in COINS Construction Cloud 11.12. Due to logical flaws in the human ressources interface, it is vulnerable to privilege escalation by HR personnel. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-029.txt - https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35739.
CVE ID: CVE-2022-35739 Date Updated: 2024-08-03T09:44:22.089Z Date Published: 2022-10-25T00:00:00 Description: PRTG Network Monitor through 22.2.77.2204 does not prevent custom input for a device’s icon, which can be modified to insert arbitrary content into the style tag for that device. When the device page loads, the arbitrary Cascading Style Sheets (CSS) data is inserted into the style tag, loading malicious content. Due to PRTG Network Monitor preventing “characters, and from modern browsers disabling JavaScript support in style tags, this vulnerability could not be escalated into a Cross-Site Scripting vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.paessler.com/prtg/history/stable - https://raxis.com/blog/cve-2022-35739 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-35085.
CVE ID: CVE-2021-35085 Date Updated: 2024-08-04T00:33:51.001Z Date Published: 2022-06-14T09:50:55 Description: Possible buffer overflow due to lack of buffer length check during management frame Rx handling in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/may-2022-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1574
The MITRE ATT&CK technique T1574: Hijack Execution Flow is related to the vulnerability CVE-CVE-2018-10636. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact.
Provide detailed information about CVE-2016-9018.
CVE ID: CVE-2016-9018 Date Updated: 2024-08-06T02:35:02.756Z Date Published: 2016-10-28T15:00:00 Description: Improper handling of a repeating VRAT chunk in qcpfformat.dll allows attackers to cause a Null pointer dereference and crash in RealNetworks RealPlayer 18.1.5.705 through a crafted .QCP media file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/40617/ - http://www.securityfocus.com/bid/94239 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3421.
CVE ID: CVE-2016-3421 Date Updated: 2024-08-05T23:56:13.487Z Date Published: 2016-04-21T10:00:00 Description: Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53, 8.54, and 8.55 allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to Activity Guide. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1035610 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32965.
CVE ID: CVE-2023-32965 Date Updated: 2024-09-26T15:11:34.073Z Date Published: 2023-07-18T13:24:59.534Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in CRUDLab Jazz Popups plugin <= 1.8.7 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/jazz-popups/wordpress-jazz-popups-plugin-1-8-7-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27187.
CVE ID: CVE-2020-27187 Date Updated: 2024-08-04T16:11:35.915Z Date Published: 2020-10-26T16:19:47 Description: An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related commands, while KDE Partition Manager is running. the mount command can then be used to gain full root privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/KDE/partitionmanager/compare/v4.1.0...v4.2.0 - https://kde.org/info/security/advisory-20201017-1.txt - https://bugzilla.redhat.com/show_bug.cgi?id=1890199 - https://security.gentoo.org/glsa/202011-03 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24883.
CVE ID: CVE-2024-24883 Date Updated: 2024-08-09T20:13:59.196Z Date Published: 2024-03-21T17:55:39.361Z Description: Missing Authorization vulnerability in BdThemes Prime Slider – Addons For Elementor.This issue affects Prime Slider – Addons For Elementor: from n/a through 3.11.10. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/bdthemes-prime-slider-lite/wordpress-prime-slider-plugin-3-11-10-broken-access-control-on-duplicate-post-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3194.
CVE ID: CVE-2008-3194 Date Updated: 2024-08-07T09:28:41.681Z Date Published: 2008-07-16T18:00:00 Description: Multiple directory traversal vulnerabilities in data/inc/themes/predefined_variables.php in pluck 4.5.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) langpref, (2) file, (3) blogpost, or (4) cat parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2008/2104/references - https://www.exploit-db.com/exploits/6074 - http://securityreason.com/securityalert/3996 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43741 - http://secunia.com/advisories/31088 - http://www.securityfocus.com/bid/30218 - http://www.pluck-cms.org/releasenotes.php#4.5.2 - http://www.bugreport.ir/index_48.htm No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32594.
CVE ID: CVE-2021-32594 Date Updated: 2024-08-03T23:25:30.326Z Date Published: 2021-08-04T13:26:46 Description: An unrestricted file upload vulnerability in the web interface of FortiPortal 6.0.0 through 6.0.4, 5.3.0 through 5.3.5, 5.2.0 through 5.2.5, and 4.2.2 and earlier may allow a low-privileged user to potentially tamper with the underlying system's files via the upload of specifically crafted files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/advisory/FG-IR-21-092 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3860.
CVE ID: CVE-2009-3860 Date Updated: 2024-08-07T06:45:50.336Z Date Published: 2009-11-04T17:00:00 Description: Multiple insecure method vulnerabilities in Idefense Labs COMRaider allow remote attackers to create or overwrite arbitrary files via the (1) CreateFolder and (2) Copy methods. NOTE: this might only be a vulnerability in certain insecure configurations of Internet Explorer. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/505042/100/0/threaded - http://www.securityfocus.com/bid/35725 - http://www.juniper.net/security/auto/vulnerabilities/vuln35725.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1748.
CVE ID: CVE-2014-1748 Date Updated: 2024-08-06T09:50:11.329Z Date Published: 2014-05-21T10:00:00 Description: The ScrollView::paint function in platform/scroll/ScrollView.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to spoof the UI by extending scrollbar painting into the parent frame. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://code.google.com/p/chromium/issues/detail?id=331168 - http://www.debian.org/security/2014/dsa-2939 - http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html - http://security.gentoo.org/glsa/glsa-201408-16.xml - http://secunia.com/advisories/60372 - http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html - http://secunia.com/advisories/59155 - http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html - http://support.apple.com/kb/HT6596 - http://lists.apple.com/archives/security-announce/2014/Dec/msg00000.html - http://secunia.com/advisories/58920 - http://www.securitytracker.com/id/1030270 - https://src.chromium.org/viewvc/blink?revision=170625&view=revision - http://www.ubuntu.com/usn/USN-2937-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-5315.
CVE ID: CVE-2020-5315 Date Updated: 2024-09-16T16:18:34.603Z Date Published: 2021-07-19T21:30:31.444529Z Description: Dell EMC Repository Manager (DRM) version 3.2 contains a plain-text password storage vulnerability. Proxy server user password is stored in a plain text in a local database. A local authenticated malicious user with access to the local file system may use the exposed password to access the with privileges of the compromised user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/article/us/en/04/sln319925/dsa-2020-001-dell-emc-repository-manager-drm-sensitive-data-exposure-vulnerability?lang=en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7460.
CVE ID: CVE-2014-7460 Date Updated: 2024-08-06T12:47:33.379Z Date Published: 2014-10-19T10:00:00 Description: The Slots Heaven:FREE Slot Machine (aka com.twelvegigs.heaven.slots) application 1.123 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/815873 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16930.
CVE ID: CVE-2020-16930 Date Updated: 2024-08-04T13:45:34.460Z Date Published: 2020-10-16T22:17:53 Description: <p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.</p> No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16930 - https://www.zerodayinitiative.com/advisories/ZDI-20-1252/ - https://www.zerodayinitiative.com/advisories/ZDI-20-1256/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12933.
CVE ID: CVE-2020-12933 Date Updated: 2024-08-04T12:11:19.001Z Date Published: 2020-10-13T21:11:26 Description: A denial of service vulnerability exists in the D3DKMTEscape handler functionality of AMD ATIKMDAG.SYS (e.g. version 26.20.15029.27017). A specially crafted D3DKMTEscape API request can cause an out-of-bounds read in Windows OS kernel memory area. This vulnerability can be triggered from a non-privileged account. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.amd.com/en/corporate/product-security No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19991.
CVE ID: CVE-2019-19991 Date Updated: 2024-08-05T02:32:10.136Z Date Published: 2020-02-26T15:10:29 Description: An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. Multiple Reflected Cross-site scripting (XSS) vulnerabilities allow remote authenticated users to inject arbitrary web script or HTML via the web pages /vam/vam_anagraphic.php, /vam/vam_vamuser.php, /common/vamp_main.php, and /wiz/change_password.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html - https://www.seling.it/ - https://www.seling.it/product/vam/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4688.
CVE ID: CVE-2014-4688 Date Updated: 2024-08-06T11:27:35.293Z Date Published: 2014-07-02T10:00:00 Description: pfSense before 2.1.4 allows remote authenticated users to execute arbitrary commands via (1) the hostname value to diag_dns.php in a Create Alias action, (2) the smartmonemail value to diag_smart.php, or (3) the database value to status_rrd_graph_img.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pfsense.org/security/advisories/pfSense-SA-14_10.webgui.asc - https://www.exploit-db.com/exploits/43560/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2216.
CVE ID: CVE-2018-2216 Date Updated: 2019-01-22T17:57:02 Date Published: 2019-01-22T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1940.
CVE ID: CVE-2011-1940 Date Updated: 2024-08-06T22:46:00.627Z Date Published: 2012-01-26T15:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.3.x before 3.3.10.1 and 3.4.x before 3.4.1 allow remote attackers to inject arbitrary web script or HTML via a crafted table name that triggers improper HTML rendering on a Tracking page, related to (1) libraries/tbl_links.inc.php and (2) tbl_tracking.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2012/dsa-2391 - http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commitdiff%3Bh=7e10c132a3887c8ebfd7a8eee356b28375f1e287 - http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commitdiff%3Bh=d3ccf798fdbd4f8a89d4088130637d8dee918492 - http://www.phpmyadmin.net/home_page/security/PMASA-2011-3.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39210.
CVE ID: CVE-2024-39210 Date Updated: 2024-08-02T04:19:20.635Z Date Published: 2024-07-05T00:00:00 Description: Best House Rental Management System v1.0 was discovered to contain an arbitrary file read vulnerability via the Page parameter at index.php. This vulnerability allows attackers to read arbitrary PHP files and access other sensitive information within the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/KRookieSec/CVE-2024-39210 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16957.
CVE ID: CVE-2019-16957 Date Updated: 2024-08-05T01:24:48.671Z Date Published: 2020-12-18T08:53:24 Description: SolarWinds Web Help Desk 12.7.0 allows XSS via the First Name field of a User Account. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.solarwinds.com/SuccessCenter/s/ - https://www.solarwinds.com/free-tools/free-help-desk-software - https://www.esecforte.com/cross-site-scripting-vulnerability-in-solarwinds-web-help-desk/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2196.
CVE ID: CVE-2012-2196 Date Updated: 2024-08-06T19:26:08.982Z Date Published: 2012-07-25T10:00:00 Description: IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to read arbitrary XML files via the (1) GET_WRAP_CFG_C or (2) GET_WRAP_CFG_C2 stored procedure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg1IC84712 - http://www-01.ibm.com/support/docview.wss?uid=swg1IC84751 - http://secunia.com/advisories/49919 - http://www.securityfocus.com/bid/54487 - http://www-01.ibm.com/support/docview.wss?uid=swg21600837 - http://www-01.ibm.com/support/docview.wss?uid=swg1IC84614 - http://www-01.ibm.com/support/docview.wss?uid=swg1IC84750 - http://www-01.ibm.com/support/docview.wss?uid=swg1IC84748 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6976.
CVE ID: CVE-2017-6976 Date Updated: 2024-08-05T15:49:02.151Z Date Published: 2018-04-03T06:00:00 Description: An issue was discovered in certain Apple products. iOS before 10.3 is affected. The issue involves the "Sandbox Profiles" component. It allows attackers to bypass intended access restrictions (for iCloud user records) via a crafted app. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT207617 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3011.
CVE ID: CVE-2015-3011 Date Updated: 2024-08-06T05:32:21.258Z Date Published: 2015-05-08T14:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in the contacts application in ownCloud Server Community Edition before 5.0.19, 6.x before 6.0.7, and 7.x before 7.0.5 allow remote authenticated users to inject arbitrary web script or HTML via a crafted contact. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/74445 - https://owncloud.org/security/advisory/?id=oc-sa-2015-001 - http://www.debian.org/security/2015/dsa-3244 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3914.
CVE ID: CVE-2018-3914 Date Updated: 2024-09-16T17:48:04.400Z Date Published: 2018-09-21T15:00:00Z Description: An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 2000 bytes. An attacker can send an arbitrarily long "sessionToken" value in order to exploit this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-14595.
CVE ID: CVE-2020-14595 Date Updated: 2024-09-27T18:35:09.086Z Date Published: 2020-07-15T17:34:29 Description: Vulnerability in the Oracle iLearning product of Oracle iLearning (component: Assessment Manager). Supported versions that are affected are 6.1 and 6.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iLearning. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iLearning accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle iLearning. CVSS 3.1 Base Score 8.2 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujul2020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2939.
CVE ID: CVE-2022-2939 Date Updated: 2024-08-03T00:52:59.815Z Date Published: 2022-09-06T17:19:01 Description: The WP Cerber Security plugin for WordPress is vulnerable to security protection bypass in versions up to, and including 9.0, that makes user enumeration possible. This is due to improper validation on the value supplied through the 'author' parameter found in the ~/cerber-load.php file. In vulnerable versions, the plugin only blocks requests if the value supplied is numeric, making it possible for attackers to supply additional non-numeric characters to bypass the protection. The non-numeric characters are stripped and the user requested is displayed. This can be used by unauthenticated attackers to gather information about users that can targeted in further attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2939 - https://plugins.trac.wordpress.org/changeset/2772930/wp-cerber/trunk/cerber-load.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2788.
CVE ID: CVE-2008-2788 Date Updated: 2024-09-17T01:06:38.933Z Date Published: 2008-06-20T10:00:00Z Description: Cross-site scripting (XSS) vulnerability in index.php in OpenDocMan 1.2.5 allows remote attackers to inject arbitrary web script or HTML via the redirection parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://sourceforge.net/tracker/index.php?func=detail&aid=1975163&group_id=69505&atid=524753 - http://secunia.com/advisories/30750 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-21046.
CVE ID: CVE-2020-21046 Date Updated: 2024-08-04T14:22:25.427Z Date Published: 2022-06-24T15:11:58 Description: A local privilege escalation vulnerability was identified within the "luminati_net_updater_win_eagleget_com" service in EagleGet Downloader version 2.1.5.20 Stable. This issue allows authenticated non-administrative user to escalate their privilege and conduct code execution as a SYSTEM privilege. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://eagleget.com - https://medium.com/%40n1pwn/local-privilege-escalation-in-eagleget-1fde79fe47c0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29584.
CVE ID: CVE-2021-29584 Date Updated: 2024-08-03T22:11:06.088Z Date Published: 2021-05-14T19:15:22 Description: TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in caused by an integer overflow in constructing a new tensor shape. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/0908c2f2397c099338b901b067f6495a5b96760b/tensorflow/core/kernels/sparse_split_op.cc#L66-L70) builds a dense shape without checking that the dimensions would not result in overflow. The `TensorShape` constructor(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when `InitDims`(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xvjm-fvxx-q3hv - https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-28018.
CVE ID: CVE-2020-28018 Date Updated: 2024-08-04T16:25:44.121Z Date Published: 2021-05-06T03:58:59 Description: Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28018-OCORK.txt - http://www.openwall.com/lists/oss-security/2021/05/11/5 - http://www.openwall.com/lists/oss-security/2021/05/11/6 - http://www.openwall.com/lists/oss-security/2021/05/11/17 - http://www.openwall.com/lists/oss-security/2021/05/11/15 - http://www.openwall.com/lists/oss-security/2021/05/11/14 - http://www.openwall.com/lists/oss-security/2021/05/12/2 - http://www.openwall.com/lists/oss-security/2021/05/12/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15931.
CVE ID: CVE-2020-15931 Date Updated: 2024-08-04T13:30:23.305Z Date Published: 2020-10-20T19:23:17 Description: Netwrix Account Lockout Examiner before 5.1 allows remote attackers to capture the Net-NTLMv1/v2 authentication challenge hash of the Domain Administrator (that is configured within the product in its installation state) by generating a single Kerberos Pre-Authentication Failed (ID 4771) event on a Domain Controller. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.optiv.com/explore-optiv-insights/source-zero/netwrix-account-lockout-examiner-41-disclosure-vulnerability - https://www.netwrix.com/netwrix_reports_vulnerability_in_netwrix_account_lockout_examiner_4_1.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4067.
CVE ID: CVE-2008-4067 Date Updated: 2024-08-07T10:00:42.675Z Date Published: 2008-09-24T18:00:00 Description: Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 on Linux allows remote attackers to read arbitrary files via a .. (dot dot) and URL-encoded / (slash) characters in a resource: URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32025 - http://secunia.com/advisories/32011 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10770 - http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.405232 - http://www.debian.org/security/2009/dsa-1697 - http://secunia.com/advisories/32096 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01384.html - http://www.ubuntu.com/usn/usn-645-1 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:206 - http://secunia.com/advisories/32144 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45359 - http://secunia.com/advisories/32010 - http://www.securitytracker.com/id?1020921 - http://www.vupen.com/english/advisories/2009/0977 - http://www.ubuntu.com/usn/usn-645-2 - http://www.securityfocus.com/bid/31346 - http://secunia.com/advisories/31985 - http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html - http://secunia.com/advisories/31984 - http://secunia.com/advisories/32185 - http://secunia.com/advisories/32196 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01335.html - http://www.debian.org/security/2008/dsa-1669 - http://www.mozilla.org/security/announce/2008/mfsa2008-44.html - http://secunia.com/advisories/32042 - http://secunia.com/advisories/33433 - http://www.vupen.com/english/advisories/2008/2661 - http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422 - http://secunia.com/advisories/32095 - http://secunia.com/advisories/32089 - http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 - http://secunia.com/advisories/32092 - http://www.redhat.com/support/errata/RHSA-2008-0879.html - http://www.mandriva.com/security/advisories?name=MDVSA-2008:205 - https://bugzilla.mozilla.org/show_bug.cgi?id=380994 - https://bugzilla.mozilla.org/show_bug.cgi?id=394075 - http://www.debian.org/security/2009/dsa-1696 - http://download.novell.com/Download?buildid=WZXONb-tqBw~ - http://www.0x000000.com/?i=422 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg01403.html - http://secunia.com/advisories/31987 - http://www.ubuntu.com/usn/usn-647-1 - http://secunia.com/advisories/32007 - http://www.redhat.com/support/errata/RHSA-2008-0882.html - http://secunia.com/advisories/32845 - http://www.debian.org/security/2008/dsa-1649 - http://secunia.com/advisories/32012 - http://secunia.com/advisories/33434 - http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123 - http://secunia.com/advisories/32044 - http://www.redhat.com/support/errata/RHSA-2008-0908.html - http://secunia.com/advisories/34501 - http://secunia.com/advisories/32082 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3507.
CVE ID: CVE-2023-3507 Date Updated: 2024-08-02T06:55:03.603Z Date Published: 2023-07-31T09:37:37.183Z Description: The WooCommerce Pre-Orders WordPress plugin before 2.0.3 has a flawed CSRF check when canceling pre-orders, which could allow attackers to make logged in admins cancel arbitrary pre-orders via a CSRF attack No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/e72bbe9b-e51d-40ab-820d-404e0cb86ee6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7260.
CVE ID: CVE-2019-7260 Date Updated: 2024-08-04T20:46:45.994Z Date Published: 2019-07-02T17:06:49 Description: Linear eMerge E3-Series devices have Cleartext Credentials in a Database. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://applied-risk.com/labs/advisories - https://www.applied-risk.com/resources/ar-2019-005 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-30537.
CVE ID: CVE-2024-30537 Date Updated: 2024-08-02T01:38:59.992Z Date Published: 2024-06-09T09:01:58.058Z Description: Missing Authorization vulnerability in WPClever WPC Badge Management for WooCommerce.This issue affects WPC Badge Management for WooCommerce: from n/a through 2.4.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/wpc-badge-management/wordpress-wpc-badge-management-for-woocommerce-plugin-2-4-0-broken-access-control-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-23258.
CVE ID: CVE-2020-23258 Date Updated: 2024-08-04T14:58:14.498Z Date Published: 2023-04-04T00:00:00 Description: An issue found in Jsish v.3.0.11 allows a remote attacker to cause a denial of service via the Jsi_ValueIsNumber function in ./src/jsiValue.c file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/pcmacdon/jsish/issues/12 - https://jsish.org/fossil/jsi2/tktview?name=2ba1d89d32 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1935.
CVE ID: CVE-2011-1935 Date Updated: 2024-08-06T22:46:00.706Z Date Published: 2017-10-20T18:00:00 Description: pcap-linux.c in libpcap 1.1.1 before commit ea9432fabdf4b33cbc76d9437200e028f1c47c93 when snaplen is set may truncate packets, which might allow remote attackers to send arbitrary data while avoiding detection via crafted packets. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://article.gmane.org/gmane.network.tcpdump.devel/4968 - http://www.openwall.com/lists/oss-security/2014/02/08/5 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=623868 - http://www.openwall.com/lists/oss-security/2011/05/19/11 - http://thread.gmane.org/gmane.network.tcpdump.devel/5018 - https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1%3Bbug=623868%3Bfilename=0001-Fix-the-calculation-of-the-frame-size-in-memory-mapp.patch%3Bmsg=10 - https://security-tracker.debian.org/tracker/CVE-2011-1935/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13338.
CVE ID: CVE-2020-13338 Date Updated: 2024-08-04T12:18:17.515Z Date Published: 2020-10-02T19:20:06 Description: An issue has been discovered in GitLab affecting versions prior to 12.10.13, 13.0.8, 13.1.2. A stored cross-site scripting vulnerability was discovered when editing references. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab/-/issues/213273 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13338.json No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0677.
CVE ID: CVE-2013-0677 Date Updated: 2024-09-16T23:10:58.644Z Date Published: 2013-03-21T15:00:00Z Description: The web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to obtain sensitive information or cause a denial of service via a crafted project file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-714398.pdf - http://ics-cert.us-cert.gov/pdf/ICSA-13-079-02.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-33003.
CVE ID: CVE-2024-33003 Date Updated: 2024-08-13T14:57:53.908Z Date Published: 2024-08-13T03:36:55.034Z Description: Some OCC API endpoints in SAP Commerce Cloud allows Personally Identifiable Information (PII) data, such as passwords, email addresses, mobile numbers, coupon codes, and voucher codes, to be included in the request URL as query or path parameters. On successful exploitation, this could lead to a High impact on confidentiality and integrity of the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://me.sap.com/notes/3459935 - https://url.sap/sapsecuritypatchday No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1313.
CVE ID: CVE-2019-1313 Date Updated: 2024-08-04T18:13:30.522Z Date Published: 2019-10-10T13:28:40 Description: An information disclosure vulnerability exists in Microsoft SQL Server Management Studio (SSMS) when it improperly enforces permissions, aka 'SQL Server Management Studio Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1376. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1313 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4440.
CVE ID: CVE-2008-4440 Date Updated: 2024-08-07T10:17:09.825Z Date Published: 2008-10-03T22:00:00 Description: The to-upgrade plugin in feta 1.4.16 allows local users to overwrite arbitrary files via a symlink on the (1) /tmp/feta.install.$USER and (2) /tmp/feta.avail.$USER temporary files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32155 - http://www.openwall.com/lists/oss-security/2008/10/30/2 - http://dev.gentoo.org/~rbu/security/debiantemp/feta - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496397 - https://bugs.gentoo.org/show_bug.cgi?id=235770 - http://www.debian.org/security/2008/dsa-1643 - http://www.securityfocus.com/bid/30899 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25582.
CVE ID: CVE-2022-25582 Date Updated: 2024-08-03T04:42:50.037Z Date Published: 2022-03-25T16:45:09 Description: A stored cross-site scripting (XSS) vulnerability in the Column module of ClassCMS v2.5 and below allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Add Articles field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/k0xx11/Vulscve/blob/master/classcms2.5-xss.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13652.
CVE ID: CVE-2018-13652 Date Updated: 2024-08-05T09:07:52.604Z Date Published: 2018-07-09T06:00:00 Description: The mintToken function of a smart contract implementation for TheGoDigital, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/BlockChainsSecurity/EtherTokens/tree/master/TheGoDigital - https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1694.
CVE ID: CVE-2009-1694 Date Updated: 2024-08-07T05:20:35.166Z Date Published: 2009-06-10T14:00:00 Description: WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle redirects, which allows remote attackers to read images from arbitrary web sites via vectors involving a CANVAS element and redirection, related to a "cross-site image capture issue." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/kb/HT3639 - http://secunia.com/advisories/43068 - http://www.vupen.com/english/advisories/2009/1621 - http://www.vupen.com/english/advisories/2011/0212 - http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - http://www.securityfocus.com/bid/35260 - http://osvdb.org/55005 - http://www.vupen.com/english/advisories/2009/1522 - http://secunia.com/advisories/37746 - http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - http://www.debian.org/security/2009/dsa-1950 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - http://secunia.com/advisories/35379 - http://www.securityfocus.com/bid/35322 - http://support.apple.com/kb/HT3613 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-10048.
CVE ID: CVE-2020-10048 Date Updated: 2024-08-04T10:50:57.903Z Date Published: 2021-02-09T15:38:17 Description: A vulnerability has been identified in SIMATIC PCS 7 (All versions), SIMATIC WinCC (All versions < V7.5 SP2). Due to an insecure password verification process, an attacker could bypass the password protection set on protected files, thus being granted access to the protected content, circumventing authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-944678.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-10723.
CVE ID: CVE-2020-10723 Date Updated: 2024-08-04T11:14:14.697Z Date Published: 2020-05-19T18:02:46 Description: A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://usn.ubuntu.com/4362-1/ - http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00045.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/ - https://www.oracle.com/security-alerts/cpuoct2020.html - https://www.openwall.com/lists/oss-security/2020/05/18/2 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10723 - https://bugs.dpdk.org/show_bug.cgi?id=268 - https://www.oracle.com/security-alerts/cpujan2021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15411.
CVE ID: CVE-2018-15411 Date Updated: 2024-09-17T01:00:31.649Z Date Published: 2018-10-05T14:00:00Z Description: A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or an email attachment and persuading the user to open the file by using the affected software. A successful exploit could allow the attacker to execute arbitrary code on the affected system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1041795 - http://www.securityfocus.com/bid/105520 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3724.
CVE ID: CVE-2013-3724 Date Updated: 2024-09-17T03:13:01.350Z Date Published: 2013-07-31T21:00:00Z Description: The mk_request_header_process function in mk_request.c in Monkey 1.1.1 allows remote attackers to cause a denial of service (thread crash and service outage) via a '\0' character in an HTTP request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://bugs.monkey-project.com/ticket/181 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31938.
CVE ID: CVE-2021-31938 Date Updated: 2024-08-03T23:10:31.288Z Date Published: 2021-06-08T22:46:14 Description: Microsoft VsCode Kubernetes Tools Extension Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31938 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41085.
CVE ID: CVE-2022-41085 Date Updated: 2024-08-03T12:35:49.510Z Date Published: 2022-11-09T00:00:00 Description: Azure CycleCloud Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41085 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15582.
CVE ID: CVE-2020-15582 Date Updated: 2024-08-04T13:22:30.094Z Date Published: 2020-07-07T13:23:03 Description: An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (Exynos 7885 chipsets) software. The Bluetooth Low Energy (BLE) component has a buffer overflow with a resultant deadlock or crash. The Samsung ID is SVE-2020-16870 (July 2020). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8308.
CVE ID: CVE-2019-8308 Date Updated: 2024-08-04T21:17:30.551Z Date Published: 2019-02-12T23:00:00 Description: Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922059 - https://github.com/flatpak/flatpak/releases/tag/1.2.3 - https://github.com/flatpak/flatpak/releases/tag/1.0.7 - https://access.redhat.com/errata/RHSA-2019:0375 - http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00088.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0271.
CVE ID: CVE-2019-0271 Date Updated: 2024-08-04T17:44:16.313Z Date Published: 2019-03-12T22:00:00 Description: ABAP Server (used in NetWeaver and Suite/ERP) and ABAP Platform does not sufficiently validate an XML document accepted from an untrusted source, leading to an XML External Entity (XEE) vulnerability. Fixed in Kernel 7.21 or 7.22, that is ABAP Server 7.00 to 7.31 and Kernel 7.45, 7.49 or 7.53, that is ABAP Server 7.40 to 7.52 or ABAP Platform. For more recent updates please refer to Security Note 2870067 (which supersedes the solution of Security Note 2736825) in the reference section below. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/107355 - https://launchpad.support.sap.com/#/notes/2870067 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812 - https://launchpad.support.sap.com/#/notes/2736825 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=515408080 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12401.
CVE ID: CVE-2020-12401 Date Updated: 2024-08-04T11:56:51.648Z Date Published: 2020-10-08T00:00:00 Description: During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2020-39/ - https://www.mozilla.org/security/advisories/mfsa2020-36/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1631573 - https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7627.
CVE ID: CVE-2016-7627 Date Updated: 2024-08-06T02:04:55.727Z Date Published: 2017-02-20T08:35:00 Description: An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "CoreGraphics" component. It allows attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted font. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT207487 - https://support.apple.com/HT207422 - http://www.securityfocus.com/bid/94905 - http://www.securitytracker.com/id/1037469 - https://support.apple.com/HT207423 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21072.
CVE ID: CVE-2023-21072 Date Updated: 2024-08-02T09:28:24.915Z Date Published: 2023-03-24T00:00:00 Description: In rtt_unpack_xtlv_cbfn of dhd_rtt.c, there is a possible out of bounds write due to a buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-257290781References: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2023-03-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11753.
CVE ID: CVE-2017-11753 Date Updated: 2024-08-05T18:19:38.910Z Date Published: 2017-07-30T18:00:00 Description: The GetImageDepth function in MagickCore/attribute.c in ImageMagick 7.0.6-4 might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted Flexible Image Transport System (FITS) file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ImageMagick/ImageMagick/issues/629 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36313.
CVE ID: CVE-2022-36313 Date Updated: 2024-08-03T10:00:04.274Z Date Published: 2022-07-21T15:31:27 Description: An issue was discovered in the file-type package before 16.5.4 and 17.x before 17.1.3 for Node.js. A malformed MKV file could cause the file type detector to get caught in an infinite loop. This would make the application become unresponsive and could be used to cause a DoS attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.npmjs.com/package/file-type - https://github.com/sindresorhus/file-type/releases/tag/v17.1.3 - https://github.com/sindresorhus/file-type/releases/tag/v16.5.4 - https://security.netapp.com/advisory/ntap-20220909-0005/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16289.
CVE ID: CVE-2020-16289 Date Updated: 2024-08-04T13:37:54.252Z Date Published: 2020-08-13T02:07:50 Description: A buffer overflow vulnerability in cif_print_page() in devices/gdevcif.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.ghostscript.com/show_bug.cgi?id=701788 - https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=d31e25ed5b130499e0d880e4609b1b4824699768 - https://lists.debian.org/debian-lts-announce/2020/08/msg00032.html - https://www.debian.org/security/2020/dsa-4748 - https://security.gentoo.org/glsa/202008-20 - https://usn.ubuntu.com/4469-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-36922.
CVE ID: CVE-2023-36922 Date Updated: 2024-08-02T17:01:09.981Z Date Published: 2023-07-11T02:56:55.299Z Description: Due to programming error in function module and report, IS-OIL component in SAP ECC and SAP S/4HANA allows an authenticated attacker to inject an arbitrary operating system command into an unprotected parameter in a common (default) extension.  On successful exploitation, the attacker can read or modify the system data as well as shut down the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://me.sap.com/notes/3350297 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30074.
CVE ID: CVE-2021-30074 Date Updated: 2024-08-03T22:24:59.234Z Date Published: 2021-04-02T20:40:10 Description: docsify 4.12.1 is affected by Cross Site Scripting (XSS) because the search component does not appropriately encode Code Blocks and mishandles the " character. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/docsifyjs/docsify/issues/1549 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-0077.
CVE ID: CVE-2012-0077 Date Updated: 2024-08-06T18:16:18.453Z Date Published: 2012-01-18T22:00:00 Description: Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 9.2.4, 10.0.2, 10.3.3, 10.3.4, and 10.3.5 allows remote authenticated users to affect integrity, related to WLS-Console. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/72477 - http://osvdb.org/78401 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html - http://www.securityfocus.com/bid/51460 - http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000007.html - http://jvn.jp/en/jp/JVN54779201/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3405.
CVE ID: CVE-2010-3405 Date Updated: 2024-08-07T03:11:43.776Z Date Published: 2010-09-16T20:00:00 Description: Buffer overflow in sa_snap in the bos.esagent fileset in IBM AIX 6.1, 5.3, and earlier and VIOS 2.1, 1.5, and earlier allows local users to leverage system group membership and gain privileges via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=isg1IZ82245 - http://www.ibm.com/support/docview.wss?uid=isg1IZ83942 - http://www.vupen.com/english/advisories/2010/2377 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12214 - http://www.securityfocus.com/bid/43207 - http://www.ibm.com/support/docview.wss?uid=isg1IZ84167 - http://www.ibm.com/support/docview.wss?uid=isg1IZ81819 - https://exchange.xforce.ibmcloud.com/vulnerabilities/61774 - http://www.ibm.com/support/docview.wss?uid=isg1IZ82630 - http://secunia.com/advisories/41446 - http://www.ibm.com/support/docview.wss?uid=isg1IZ83909 - http://www.ibm.com/support/docview.wss?uid=isg1IZ83975 - http://securitytracker.com/id?1024430 - http://aix.software.ibm.com/aix/efixes/security/sa_snap_advisory.asc No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32791.
CVE ID: CVE-2023-32791 Date Updated: 2024-09-06T14:09:28.930Z Date Published: 2023-10-03T12:43:01.043Z Description: Cross-Site Request Forgery (CSRF) vulnerability in NXLog Manager 5.6.5633 version. This vulnerability allows an attacker to manipulate and delete user accounts within the platform by sending a specifically crafted query to the server. The vulnerability is based on the lack of proper validation of the origin of incoming requests. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-nxlog-manager No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.