instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2019-1010238.
CVE ID: CVE-2019-1010238 Date Updated: 2024-08-05T03:07:18.524Z Date Published: 2019-07-19T16:42:41 Description: Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact is: The heap based buffer overflow can be used to get code execution. The component is: function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop condition. The attack vector is: Bug can be used when application pass invalid utf-8 strings to functions like pango_itemize. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://usn.ubuntu.com/4081-1/ - https://www.debian.org/security/2019/dsa-4496 - https://seclists.org/bugtraq/2019/Aug/14 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D6HWAHXJ2ZXINYMANHPFDDCJFWUQ57M4/ - https://access.redhat.com/errata/RHSA-2019:2571 - https://access.redhat.com/errata/RHSA-2019:2582 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VFFF4FY7SCAYT3EKTYPGRN6BVKZTH7Y7/ - https://security.gentoo.org/glsa/201909-03 - https://access.redhat.com/errata/RHSA-2019:2594 - https://access.redhat.com/errata/RHBA-2019:2824 - https://access.redhat.com/errata/RHSA-2019:3234 - https://www.oracle.com/security-alerts/cpuapr2020.html - https://gitlab.gnome.org/GNOME/pango/-/commits/main/pango/pango-bidi-type.c - https://gitlab.gnome.org/GNOME/pango/-/issues/342 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13325.
CVE ID: CVE-2020-13325 Date Updated: 2024-08-04T12:18:17.028Z Date Published: 2020-09-29T18:33:33 Description: A vulnerability was discovered in GitLab versions prior 13.1. The comment section of the issue page was not restricting the characters properly, potentially resulting in a denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab/-/issues/215978 - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13325.json No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1763.
CVE ID: CVE-2020-1763 Date Updated: 2024-08-04T06:46:30.902Z Date Published: 2020-05-12T13:41:20 Description: An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where, an unauthenticated attacker could use this flaw to crash libreswan by sending specially-crafted IKEv1 Informational Exchange packets. The daemon respawns after the crash. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://libreswan.org/security/CVE-2020-1763/CVE-2020-1763.txt - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1763 - https://bugzilla.redhat.com/show_bug.cgi?id=1813329 - https://github.com/libreswan/libreswan/commit/471a3e41a449d7c753bc4edbba4239501bb62ba8 - https://www.debian.org/security/2020/dsa-4684 - https://security.gentoo.org/glsa/202007-21 - https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf - https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6412.
CVE ID: CVE-2016-6412 Date Updated: 2024-08-06T01:29:20.023Z Date Published: 2016-09-24T01:00:00 Description: The Cisco Application-hosting Framework (CAF) component in Cisco IOS 15.6(1)T1 and IOS XE, when the IOx feature set is enabled, allows man-in-the-middle attackers to trigger arbitrary downloads via crafted HTTP headers, aka Bug ID CSCuz84773. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/93088 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-caf1 - http://www.securitytracker.com/id/1036874 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2272.
CVE ID: CVE-2022-2272 Date Updated: 2024-08-03T00:32:09.547Z Date Published: 2022-08-03T15:20:59 Description: This vulnerability allows remote attackers to bypass authentication on affected installations of Sante PACS Server 3.0.4. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of calls to the login endpoint. When parsing the username element, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-17331. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-22-955/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28231.
CVE ID: CVE-2024-28231 Date Updated: 2024-08-02T00:48:49.620Z Date Published: 2024-03-20T20:03:18.402Z Description: eprosima Fast DDS is a C++ implementation of the Data Distribution Service standard of the Object Management Group. Prior to versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8, manipulated DATA Submessage can cause a heap overflow error in the Fast-DDS process, causing the process to be terminated remotely. Additionally, the payload_size in the DATA Submessage packet is declared as uint32_t. When a negative number, such as -1, is input into this variable, it results in an Integer Overflow (for example, -1 gets converted to 0xFFFFFFFF). This eventually leads to a heap-buffer-overflow, causing the program to terminate. Versions 2.14.0, 2.13.4, 2.12.3, 2.10.4, and 2.6.8 contain a fix for this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-9m2j-qw67-ph4w - https://github.com/eProsima/Fast-DDS/commit/355706386f4af9ce74125eeec3c449b06113112b No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-1446.
CVE ID: CVE-2016-1446 Date Updated: 2024-08-05T22:55:14.551Z Date Published: 2016-07-15T16:00:00 Description: SQL injection vulnerability in Cisco WebEx Meetings Server 2.6 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCuy83200. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/91786 - http://www.securitytracker.com/id/1036312 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160714-wms No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5324.
CVE ID: CVE-2008-5324 Date Updated: 2024-09-17T01:31:14.149Z Date Published: 2008-12-05T00:00:00Z Description: Multiple cross-site scripting (XSS) vulnerabilities in CQ Web in IBM Rational ClearQuest 2007 before 2007D and 2008 before 2008B allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg1PK69316 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0784.
CVE ID: CVE-2018-0784 Date Updated: 2024-09-16T16:28:50.346Z Date Published: 2018-01-10T01:00:00Z Description: ASP.NET Core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to the ASP.NET Core project templates, aka "ASP.NET Core Elevation Of Privilege Vulnerability". This CVE is unique from CVE-2018-0808. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/102377 - http://www.securitytracker.com/id/1040151 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0784 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-36650.
CVE ID: CVE-2020-36650 Date Updated: 2024-08-04T17:30:08.543Z Date Published: 2023-01-11T17:52:05.766Z Description: A vulnerability, which was classified as critical, was found in IonicaBizau node-gry up to 5.x. This affects an unknown part. The manipulation leads to command injection. Upgrading to version 6.0.0 is able to address this issue. The patch is named 5108446c1e23960d65e8b973f1d9486f9f9dbd6c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218019. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.218019 - https://vuldb.com/?ctiid.218019 - https://github.com/IonicaBizau/node-gry/pull/22 - https://github.com/IonicaBizau/node-gry/commit/5108446c1e23960d65e8b973f1d9486f9f9dbd6c - https://github.com/IonicaBizau/node-gry/releases/tag/6.0.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25486.
CVE ID: CVE-2022-25486 Date Updated: 2024-08-03T04:42:49.697Z Date Published: 2022-03-15T17:41:02 Description: CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertConfigField.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/CuppaCMS/CuppaCMS/issues/25 - https://github.com/hansmach1ne/MyExploits/tree/main/Multiple_LFIs_in_CuppaCMS_alerts - https://github.com/CuppaCMS/CuppaCMS/issues/15 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36992.
CVE ID: CVE-2024-36992 Date Updated: 2024-08-02T03:43:50.532Z Date Published: 2024-07-01T16:30:51.507Z Description: In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View that could result in execution of unauthorized JavaScript code in the browser of a user. The “url” parameter of the Dashboard element does not have proper input validation to reject invalid URLs, which could lead to a Persistent Cross-site Scripting (XSS) exploit. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://advisory.splunk.com/advisories/SVD-2024-0712 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-44040.
CVE ID: CVE-2023-44040 Date Updated: 2024-08-02T19:52:11.921Z Date Published: 2024-04-03T00:00:00 Description: In VeridiumID before 3.5.0, the identity provider page is susceptible to a cross-site scripting (XSS) vulnerability that can be exploited by an internal unauthenticated attacker for JavaScript execution in the context of the user trying to authenticate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://veridiumid.com/veridium-id-authentication-platform/ - https://docs.veridiumid.com/docs/v3.5/security-advisory#id-%28v3.52%29SecurityAdvisory-Acknowledgement No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13144.
CVE ID: CVE-2018-13144 Date Updated: 2024-08-05T08:52:50.586Z Date Published: 2018-07-04T00:00:00 Description: The transfer and transferFrom functions of a smart contract implementation for Pandora (PDX), an Ethereum token, have an integer overflow. NOTE: this has been disputed by a third party. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/safecomet/EtherTokens/blob/master/Pandora%20%28PDX%29/Pandora%20%28PDX%29.md - https://github.com/soohoio/VeriSmartBench/wiki/CVE-False-Reported-Case No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6699.
CVE ID: CVE-2012-6699 Date Updated: 2024-08-06T21:36:02.240Z Date Published: 2016-04-11T15:00:00 Description: The decode_search function in dhcp.c in dhcpcd 3.x allows remote DHCP servers to cause a denial of service (out-of-bounds read) via a crafted response. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.launchpad.net/ubuntu/+source/dhcpcd/+bug/1517226 - http://www.openwall.com/lists/oss-security/2015/12/02/1 - https://launchpadlibrarian.net/228152582/dhcp.c.patch - http://www.debian.org/security/2016/dsa-3534 - http://www.openwall.com/lists/oss-security/2015/12/03/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15792.
CVE ID: CVE-2017-15792 Date Updated: 2017-11-02T20:57:01 Date Published: 2017-10-22T19:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25730.
CVE ID: CVE-2024-25730 Date Updated: 2024-08-16T17:14:35.095Z Date Published: 2024-02-23T00:00:00 Description: Hitron CODA-4582 and CODA-4589 devices have default PSKs that are generated from 5-digit hex values concatenated with a "Hitron" substring, resulting in insufficient entropy (only about one million possibilities). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://i.ebayimg.com/images/g/I-8AAOSwGE9lsGwI/s-l1600.webp - https://i.ebayimg.com/images/g/qK8AAOSwbr9lq3PJ/s-l1600.webp - https://i.ebayimg.com/images/g/VDcAAOSwlodlSuz4/s-l1600.webp - https://i.ebayimg.com/images/g/MwMAAOSwjTFk3kpd/s-l1600.webp - https://i.ebayimg.com/images/g/XaAAAOSwvMNkuESk/s-l1600.webp - https://i.ebayimg.com/images/g/hzUAAOSwUwVllGMZ/s-l1600.webp - https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-25730 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-9683.
CVE ID: CVE-2017-9683 Date Updated: 2024-09-16T20:06:51.050Z Date Published: 2017-10-10T20:00:00Z Description: In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while flashing a meta image, an integer overflow can occur, if user-defined image offset and size values are too large. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-10-01 - http://www.securityfocus.com/bid/101117 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9638.
CVE ID: CVE-2014-9638 Date Updated: 2024-08-06T13:47:41.738Z Date Published: 2015-01-23T15:00:00 Description: oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://trac.xiph.org/ticket/2137 - http://www.openwall.com/lists/oss-security/2015/01/21/5 - http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150543.html - http://www.openwall.com/lists/oss-security/2015/01/22/9 - http://lists.opensuse.org/opensuse-updates/2015-03/msg00054.html - http://seclists.org/fulldisclosure/2015/Jan/78 - http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150570.html - http://www.securityfocus.com/bid/72290 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28622.
CVE ID: CVE-2022-28622 Date Updated: 2024-08-03T05:56:16.162Z Date Published: 2022-06-27T18:51:25 Description: A potential security vulnerability has been identified in HPE StoreOnce Software. The SSH server supports weak key exchange algorithms which could lead to remote unauthorized access. HPE has made the following software update to resolve the vulnerability in HPE StoreOnce Software 4.3.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst04311en_us No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-17228.
CVE ID: CVE-2019-17228 Date Updated: 2024-08-05T01:33:17.322Z Date Published: 2020-02-24T18:25:34 Description: includes/options.php in the motors-car-dealership-classified-listings (aka Motors - Car Dealer & Classified Ads) plugin through 1.4.0 for WordPress allows unauthenticated options changes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpvulndb.com/vulnerabilities/9884 - https://wordpress.org/plugins/motors-car-dealership-classified-listings/#developers - https://blog.nintechnet.com/multiple-vulnerabilities-in-wordpress-motors-car-dealer-classified-ads-plugin/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16714.
CVE ID: CVE-2017-16714 Date Updated: 2024-09-17T01:51:12.158Z Date Published: 2018-09-06T19:00:00Z Description: In Ice Qube Thermal Management Center versions prior to version 4.13, passwords are stored in plaintext in a file that is accessible without authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-18-249-01 - http://www.securityfocus.com/bid/105303 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27656.
CVE ID: CVE-2020-27656 Date Updated: 2024-09-16T17:28:58.260Z Date Published: 2020-10-29T09:00:26.440634Z Description: Cleartext transmission of sensitive information vulnerability in DDNS in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to eavesdrop authentication information of DNSExit via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.synology.com/security/advisory/Synology_SA_20_18 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1071 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5401.
CVE ID: CVE-2008-5401 Date Updated: 2024-08-07T10:49:12.541Z Date Published: 2008-12-09T11:00:00 Description: Stack-based buffer overflow in the image tooltip implementation in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a long image filename, related to "AIM IMG Tag Parsing." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id?1021335 - http://www.securityfocus.com/bid/32645 - https://exchange.xforce.ibmcloud.com/vulnerabilities/47093 - http://osvdb.org/50472 - http://www.vupen.com/english/advisories/2008/3348 - http://www.securityfocus.com/archive/1/498932/100/0/threaded - http://securityreason.com/securityalert/4700 - http://secunia.com/advisories/33001 - http://www.zerodayinitiative.com/advisories/ZDI-08-077 - http://blog.ceruleanstudios.com/?p=404 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-47393.
CVE ID: CVE-2022-47393 Date Updated: 2024-08-03T14:55:08.190Z Date Published: 2023-05-15T10:03:58.680Z Description: An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1880.
CVE ID: CVE-2024-1880 Date Updated: 2024-08-01T18:56:22.364Z Date Published: 2024-06-06T18:39:43.516Z Description: An OS command injection vulnerability exists in the MacOS Text-To-Speech class MacOSTTS of the significant-gravitas/autogpt project, affecting versions up to v0.5.0. The vulnerability arises from the improper neutralization of special elements used in an OS command within the `_speech` method of the MacOSTTS class. Specifically, the use of `os.system` to execute the `say` command with user-supplied text allows for arbitrary code execution if an attacker can inject shell commands. This issue is triggered when the AutoGPT instance is run with the `--speak` option enabled and configured with `TEXT_TO_SPEECH_PROVIDER=macos`, reflecting back a shell injection snippet. The impact of this vulnerability is the potential execution of arbitrary code on the instance running AutoGPT. The issue was addressed in version 5.1.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.com/bounties/4e742624-8771-4f3c-9634-3eaf33d6d58e - https://github.com/significant-gravitas/autogpt/commit/26324f29849967fa72c207da929af612f1740669 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31972.
CVE ID: CVE-2021-31972 Date Updated: 2024-08-03T23:10:31.407Z Date Published: 2021-06-08T22:46:36 Description: Event Tracing for Windows Information Disclosure Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31972 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0803.
CVE ID: CVE-2018-0803 Date Updated: 2024-09-16T23:41:27.406Z Date Published: 2018-01-04T14:00:00Z Description: Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to access information from one domain and inject it into another domain, due to how Microsoft Edge enforces cross-domain policies, aka "Microsoft Edge Elevation of Privilege Vulnerability". No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0803 - http://www.securitytracker.com/id/1040100 - http://www.securityfocus.com/bid/102384 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5492.
CVE ID: CVE-2018-5492 Date Updated: 2024-09-17T01:21:51.777Z Date Published: 2018-10-04T13:00:00Z Description: NetApp E-Series SANtricity OS Controller Software 11.30 and later version 11.30.5 is susceptible to unauthenticated remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.netapp.com/advisory/ntap-20181003-0001/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0552.
CVE ID: CVE-2019-0552 Date Updated: 2024-08-04T17:51:26.850Z Date Published: 2019-01-08T21:00:00 Description: An elevation of privilege exists in Windows COM Desktop Broker, aka "Windows COM Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2019, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/46162/ - http://www.securityfocus.com/bid/106407 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0552 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-23482.
CVE ID: CVE-2022-23482 Date Updated: 2024-08-03T03:43:45.996Z Date Published: 2022-12-09T17:50:39.075Z Description: xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Out of Bound Read in xrdp_sec_process_mcs_data_CS_CORE() function. There are no known workarounds for this issue. Users are advised to upgrade. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-56pq-2pm9-7fhm - https://www.debian.org/security/2023/dsa-5502 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43718.
CVE ID: CVE-2022-43718 Date Updated: 2024-08-03T13:40:06.455Z Date Published: 2023-01-16T10:10:04.630Z Description: Upload data forms do not correctly render user input leading to possible XSS attack vectors that can be performed by authenticated users with database connection update permissions. This issue affects Apache Superset version 1.5.2 and prior versions and version 2.0.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/8615608jt2x7b3rmqrtngldy8pn3nz2r No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8132.
CVE ID: CVE-2020-8132 Date Updated: 2024-08-04T09:48:25.599Z Date Published: 2020-02-28T19:24:41 Description: Lack of input validation in pdf-image npm package version <= 2.0.0 may allow an attacker to run arbitrary code if PDF file path is constructed based on untrusted user input. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/781664 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-7170.
CVE ID: CVE-2024-7170 Date Updated: 2024-08-01T21:52:30.503Z Date Published: 2024-07-28T22:00:06.652Z Description: A vulnerability was found in TOTOLINK A3000RU 5.9c.5185. It has been rated as problematic. This issue affects some unknown processing of the file /web_cste/cgi-bin/product.ini. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272591. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.272591 - https://vuldb.com/?ctiid.272591 - https://vuldb.com/?submit.377957 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3000RU/product.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10634.
CVE ID: CVE-2019-10634 Date Updated: 2024-08-04T22:31:59.918Z Date Published: 2019-04-09T05:00:20 Description: An XSS vulnerability in the Zyxel NAS 326 version 5.21 and below allows a remote authenticated attacker to inject arbitrary JavaScript or HTML via the user, group, and file-share description fields. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://maxwelldulin.com/BlogPost?post=3236967424 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20887.
CVE ID: CVE-2022-20887 Date Updated: 2024-09-16T19:05:14.656Z Date Published: 2022-07-21T03:53:19.629374Z Description: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-35359.
CVE ID: CVE-2020-35359 Date Updated: 2024-08-04T17:02:07.906Z Date Published: 2020-12-26T04:30:32 Description: Pure-FTPd 1.0.48 allows remote attackers to prevent legitimate server use by making enough connections to exceed the connection limit. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/49105 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18654.
CVE ID: CVE-2019-18654 Date Updated: 2024-08-05T01:54:14.647Z Date Published: 2019-11-01T18:25:52 Description: A Cross Site Scripting (XSS) issue exists in AVG AntiVirus (Internet Security Edition) 19.3.3084 build 19.3.4241.440 in the Network Notification Popup, allowing an attacker to execute JavaScript code via an SSID Name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://medium.com/%40YoKoKho/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968 - http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6231.
CVE ID: CVE-2016-6231 Date Updated: 2024-08-06T01:22:20.632Z Date Published: 2016-08-25T18:00:00 Description: Kaspersky Safe Browser iOS before 1.7.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.info-sec.ca/advisories/Kaspersky-Safe-Browser.html - http://www.securityfocus.com/bid/92200 - https://support.kaspersky.com/vulnerability.aspx?el=12430#280716 - http://www.securityfocus.com/archive/1/539071/100/0/threaded - http://seclists.org/fulldisclosure/2016/Aug/30 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-30426.
CVE ID: CVE-2024-30426 Date Updated: 2024-08-02T01:32:07.358Z Date Published: 2024-03-29T13:21:31.452Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HashThemes Hash Elements allows Stored XSS.This issue affects Hash Elements: from n/a through 1.3.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/hash-elements/wordpress-hash-elements-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8634.
CVE ID: CVE-2020-8634 Date Updated: 2024-08-04T10:03:46.369Z Date Published: 2020-03-06T23:33:20 Description: Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions on files modified within the HTTP file management interface, resulting in files being saved with world-readable and world-writable permissions. If a sensitive system file were edited this way, a low-privilege user may escalate privileges to root. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.hooperlabs.xyz/disclosures/cve-2020-8635.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5025.
CVE ID: CVE-2019-5025 Date Updated: 2019-03-28T15:00:26 Date Published: 2019-03-28T15:00:26 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35387.
CVE ID: CVE-2022-35387 Date Updated: 2022-07-11T19:42:03 Date Published: 2022-07-11T19:42:03 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9003.
CVE ID: CVE-2020-9003 Date Updated: 2024-08-04T10:19:19.661Z Date Published: 2020-02-20T21:52:32 Description: A stored XSS vulnerability exists in the Modula Image Gallery plugin before 2.2.5 for WordPress. Successful exploitation of this vulnerability would allow an authenticated low-privileged user to inject arbitrary JavaScript code that is viewed by other users. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/MachoThemes/modula-lite/blob/master/changelog.txt - https://wordpress.org/plugins/modula-best-grid-gallery/ - https://wpvulndb.com/vulnerabilities/10077 - https://fortiguard.com/zeroday/FG-VD-20-041 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7375.
CVE ID: CVE-2014-7375 Date Updated: 2024-08-06T12:47:33.140Z Date Published: 2014-10-19T10:00:00 Description: The Childcare (aka com.app_macchildcare.layout) application 1.399 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing - http://www.kb.cert.org/vuls/id/281889 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12923.
CVE ID: CVE-2018-12923 Date Updated: 2024-08-05T08:45:02.536Z Date Published: 2018-06-28T11:00:00 Description: BWS Systems HA-Bridge devices allow remote attackers to obtain potentially sensitive information via a direct request for the #!/system URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.seebug.org/vuldb/ssvid-97373 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1059
The MITRE ATT&CK technique T1059: Command and Scripting Interpreter is related to the vulnerability CVE-CVE-2018-18987. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact.
Provide detailed information about CVE-2018-20172.
CVE ID: CVE-2018-20172 Date Updated: 2024-08-05T11:51:19.271Z Date Published: 2018-12-17T15:00:00 Description: An issue was discovered in Nagios XI before 5.5.8. The rss_url parameter of rss_dashlet/magpierss/scripts/magpie_slashbox.php is not filtered, resulting in an XSS vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.nagios.com/downloads/nagios-xi/change-log/ - https://www.seebug.org/vuldb/ssvid-97714 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-25928.
CVE ID: CVE-2021-25928 Date Updated: 2024-08-03T20:11:28.484Z Date Published: 2021-04-26T10:54:47 Description: Prototype pollution vulnerability in 'safe-obj' versions 1.0.0 through 1.0.2 allows an attacker to cause a denial of service and may lead to remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25928 - https://github.com/mantacode/safe-obj/blob/6ab63529182b6cf11704ac84f10800290afd3f9f/lib/index.js#L122 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-35096.
CVE ID: CVE-2023-35096 Date Updated: 2024-09-30T14:40:03.470Z Date Published: 2023-07-17T13:35:21.634Z Description: Cross-Site Request Forgery (CSRF) vulnerability in myCred plugin <= 2.5 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/mycred/wordpress-mycred-plugin-2-5-cross-site-request-forgery-csrf?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1059
The MITRE ATT&CK technique T1059: Command and Scripting Interpreter is related to the vulnerability CVE-CVE-2018-15444. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact.
Provide detailed information about CVE-2024-27198.
CVE ID: CVE-2024-27198 Date Updated: 2024-08-02T00:27:59.636Z Date Published: 2024-03-04T17:21:39.422Z Description: In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jetbrains.com/privacy-security/issues-fixed/ - https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-2839.
CVE ID: CVE-2020-2839 Date Updated: 2024-09-27T19:05:47.766Z Date Published: 2020-04-15T13:29:48 Description: Vulnerability in the Oracle Service Intelligence product of Oracle E-Business Suite (component: Internal Operations- Search). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Intelligence. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Service Intelligence, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Service Intelligence accessible data as well as unauthorized update, insert or delete access to some of Oracle Service Intelligence accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1156.
CVE ID: CVE-2013-1156 Date Updated: 2024-09-17T03:18:55.686Z Date Published: 2013-05-01T10:00:00Z Description: Directory traversal vulnerability in Cisco Prime Central for Hosted Collaboration Solution allows remote attackers to read arbitrary files via a crafted URL, aka Bug ID CSCud51034. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1156 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34447.
CVE ID: CVE-2022-34447 Date Updated: 2024-08-03T09:15:15.129Z Date Published: 2023-02-10T20:48:05.160Z Description: PowerPath Management Appliance with versions 3.3 & 3.2*, 3.1 & 3.0* contains OS Command Injection vulnerability. An authenticated remote attacker with administrative privileges could potentially exploit the issue and execute commands on the system as the root user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/000205404 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15377.
CVE ID: CVE-2020-15377 Date Updated: 2024-08-04T13:15:20.483Z Date Published: 2021-06-09T15:15:05 Description: Webtools in Brocade SANnav before version 2.1.1 allows unauthenticated users to make requests to arbitrary hosts due to a misconfiguration; this is commonly referred to as Server-Side Request Forgery (SSRF). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1480 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29031.
CVE ID: CVE-2021-29031 Date Updated: 2024-08-03T21:55:12.503Z Date Published: 2021-03-24T12:03:40 Description: A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/users_import.php URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xoffense/POC/blob/main/Multiple%20URI%20Based%20XSS%20in%20Bitweaver%203.1.0.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20402.
CVE ID: CVE-2018-20402 Date Updated: 2024-09-17T02:21:25.009Z Date Published: 2018-12-23T21:00:00Z Description: Safe Software FME Server through 2018.1 creates and enables three additional accounts in addition to the initial administrator account. The passwords to the three accounts are the same as the usernames, which are guest, user, and author. Logging in with these accounts will grant any user the default privilege roles that were also created for each of the accounts. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://docs.safe.com/fme/html/FME_Server_Documentation/Content/AdminGuide/Default_User_Accounts_and_Passwords.htm No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13757.
CVE ID: CVE-2018-13757 Date Updated: 2024-08-05T09:14:47.246Z Date Published: 2018-07-09T06:00:00 Description: The mintToken function of a smart contract implementation for Coinquer, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/BlockChainsSecurity/EtherTokens/tree/master/Coinquer - https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6504.
CVE ID: CVE-2017-6504 Date Updated: 2024-08-05T15:33:20.225Z Date Published: 2017-03-06T02:00:00 Description: WebUI in qBittorrent before 3.3.11 did not set the X-Frame-Options header, which could potentially lead to clickjacking. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/qbittorrent/qBittorrent/commit/f5ad04766f4abaa78374ff03704316f8ce04627d - https://www.qbittorrent.org/news.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27411.
CVE ID: CVE-2024-27411 Date Updated: 2024-09-11T17:33:25.106Z Date Published: 2024-05-17T11:50:46.770Z Description: In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: keep DMA buffers required for suspend/resume Nouveau deallocates a few buffers post GPU init which are required for GPU suspend/resume to function correctly. This is likely not as big an issue on systems where the NVGPU is the only GPU, but on multi-GPU set ups it leads to a regression where the kernel module errors and results in a system-wide rendering freeze. This commit addresses that regression by moving the two buffers required for suspend and resume to be deallocated at driver unload instead of post init. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/be00e15b240ed71fc30c0576af7ab670c8271661 - https://git.kernel.org/stable/c/f6ecfdad359a01c7fd8a3bcfde3ef0acdf107e6e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40114.
CVE ID: CVE-2023-40114 Date Updated: 2024-08-15T18:10:22.035Z Date Published: 2024-02-15T22:31:15.925Z Description: In multiple functions of MtpFfsHandle.cpp , there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://android.googlesource.com/platform/frameworks/av/+/2fdf54b050f728fd965c9afdd03116e9b9dafbae - https://source.android.com/security/bulletin/2023-11-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1472.
CVE ID: CVE-2008-1472 Date Updated: 2024-08-07T08:24:42.123Z Date Published: 2008-03-24T22:00:00 Description: Stack-based buffer overflow in the ListCtrl ActiveX Control (ListCtrl.ocx), as used in multiple CA products including BrightStor ARCserve Backup R11.5, Desktop Management Suite r11.1 through r11.2, and Unicenter products r11.1 through r11.2, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long argument to the AddColumn method. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/28268 - http://www.vupen.com/english/advisories/2008/0902/references - http://secunia.com/advisories/29408 - https://www.exploit-db.com/exploits/5264 - https://exchange.xforce.ibmcloud.com/vulnerabilities/41225 - http://www.securityfocus.com/archive/1/489893/100/0/threaded - http://www.securitytracker.com/id?1019617 - http://www.securityfocus.com/archive/1/490263/100/0/threaded - http://community.ca.com/blogs/casecurityresponseblog/archive/2008/3/28.aspx No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5063.
CVE ID: CVE-2017-5063 Date Updated: 2024-08-05T14:47:44.392Z Date Published: 2017-10-27T05:00:00 Description: A numeric overflow in Skia in Google Chrome prior to 58.0.3029.81 for Linux, Windows, and Mac, and 58.0.3029.83 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2017:1124 - https://security.gentoo.org/glsa/201705-02 - http://www.securitytracker.com/id/1038317 - https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html - http://www.securityfocus.com/bid/97939 - https://crbug.com/700836 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-45707.
CVE ID: CVE-2021-45707 Date Updated: 2024-08-04T04:47:02.459Z Date Published: 2021-12-26T21:48:02 Description: An issue was discovered in the nix crate 0.16.0 and later before 0.20.2, 0.21.x before 0.21.2, and 0.22.x before 0.22.2 for Rust. unistd::getgrouplist has an out-of-bounds write if a user is in more than 16 /etc/groups groups. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://rustsec.org/advisories/RUSTSEC-2021-0119.html - https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/nix/RUSTSEC-2021-0119.md - https://github.com/advisories/GHSA-wgrg-5h56-jg27 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3714.
CVE ID: CVE-2016-3714 Date Updated: 2024-09-09T16:20:23.386Z Date Published: 2016-05-05T18:00:00 Description: The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/security/vulnerabilities/2296071 - http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html - http://www.securitytracker.com/id/1035742 - https://imagetragick.com/ - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588 - http://www.openwall.com/lists/oss-security/2016/05/03/13 - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00041.html - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html - http://www.ubuntu.com/usn/USN-2990-1 - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html - http://www.securityfocus.com/archive/1/538378/100/0/threaded - https://www.exploit-db.com/exploits/39767/ - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html - http://www.rapid7.com/db/modules/exploit/unix/fileformat/imagemagick_delegate - http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - http://www.openwall.com/lists/oss-security/2016/05/03/18 - http://www.debian.org/security/2016/dsa-3746 - https://security.gentoo.org/glsa/201611-21 - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html - http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568 - https://www.imagemagick.org/script/changelog.php - https://www.exploit-db.com/exploits/39791/ - http://www.debian.org/security/2016/dsa-3580 - http://www.securityfocus.com/bid/89848 - http://rhn.redhat.com/errata/RHSA-2016-0726.html - https://bugzilla.redhat.com/show_bug.cgi?id=1332492 - https://www.kb.cert.org/vuls/id/250519 - http://packetstormsecurity.com/files/152364/ImageTragick-ImageMagick-Proof-Of-Concepts.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-17142.
CVE ID: CVE-2019-17142 Date Updated: 2024-08-05T01:33:17.260Z Date Published: 2019-10-25T18:14:18 Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of script within a Keystroke action of a listbox field. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9081. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.foxitsoftware.com/support/security-bulletins.php - https://www.zerodayinitiative.com/advisories/ZDI-19-912/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16773.
CVE ID: CVE-2019-16773 Date Updated: 2020-01-10T21:04:25 Date Published: 2020-01-09T02:00:16 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0892.
CVE ID: CVE-2014-0892 Date Updated: 2024-08-06T09:27:20.209Z Date Published: 2014-04-23T19:00:00 Description: IBM Notes and Domino 8.5.x before 8.5.3 FP6 IF3 and 9.x before 9.0.1 FP1 on 32-bit Linux platforms use incorrect gcc options, which makes it easier for remote attackers to execute arbitrary code by leveraging the absence of the NX protection mechanism and placing crafted x86 code on the stack, aka SPR KLYH9GGS9W. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/350089 - http://www-01.ibm.com/support/docview.wss?uid=swg21670264 - https://exchange.xforce.ibmcloud.com/vulnerabilities/91286 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41206.
CVE ID: CVE-2021-41206 Date Updated: 2024-08-04T03:08:31.625Z Date Published: 2021-11-05T22:05:14 Description: TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenarios writes and reads from heap populated arrays are also possible. We have discovered these issues internally via tooling while working on improving/testing GPU op determinism. As such, we don't have reproducers and there will be multiple fixes for these issues. These fixes will be included in TensorFlow 2.7.0. We will also cherrypick these commits on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69 - https://github.com/tensorflow/tensorflow/commit/4d74d8a00b07441cba090a02e0dd9ed385145bf4 - https://github.com/tensorflow/tensorflow/commit/4dddb2fd0b01cdd196101afbba6518658a2c9e07 - https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d - https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a - https://github.com/tensorflow/tensorflow/commit/da4aad5946be30e5f049920fa076e1f7ef021261 - https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3478.
CVE ID: CVE-2022-3478 Date Updated: 2024-08-03T01:14:01.420Z Date Published: 2023-01-24T00:00:00 Description: An issue has been discovered in GitLab affecting all versions starting from 12.8 before 15.4.6, all versions starting from 15.5 before 15.5.5, all versions starting from 15.6 before 15.6.1. It was possible to trigger a DoS attack by uploading a malicious nuget package. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab/-/issues/377788 - https://hackerone.com/reports/1716296 - https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3478.json No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7822.
CVE ID: CVE-2014-7822 Date Updated: 2024-08-06T13:03:27.355Z Date Published: 2015-03-16T10:00:00 Description: The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1163792 - http://www.ubuntu.com/usn/USN-2544-1 - http://www.debian.org/security/2015/dsa-3170 - https://www.exploit-db.com/exploits/36743/ - http://www.ubuntu.com/usn/USN-2542-1 - http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html - http://rhn.redhat.com/errata/RHSA-2015-0164.html - http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html - http://www.securityfocus.com/bid/72347 - http://www.ubuntu.com/usn/USN-2541-1 - https://github.com/torvalds/linux/commit/8d0207652cbe27d1f962050737848e5ad4671958 - http://rhn.redhat.com/errata/RHSA-2015-0694.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - http://www.osvdb.org/117810 - http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d0207652cbe27d1f962050737848e5ad4671958 - http://www.ubuntu.com/usn/USN-2543-1 - http://rhn.redhat.com/errata/RHSA-2015-0102.html - http://rhn.redhat.com/errata/RHSA-2015-0674.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3060.
CVE ID: CVE-2024-3060 Date Updated: 2024-08-01T19:32:42.649Z Date Published: 2024-04-26T05:00:04.385Z Description: The ENL Newsletter WordPress plugin through 1.0.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admin+ to perform SQL injection attacks No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11278.
CVE ID: CVE-2019-11278 Date Updated: 2024-09-16T23:51:53.473Z Date Published: 2019-09-26T21:11:24.033285Z Description: CF UAA versions prior to 74.1.0, allow external input to be directly queried against. A remote malicious user with 'client.write' and 'groups.update' can craft a SCIM query, which leaks information that allows an escalation of privileges, ultimately allowing the malicious user to gain control of UAA scopes they should not have. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cloudfoundry.org/blog/cve-2019-11278 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38302.
CVE ID: CVE-2024-38302 Date Updated: 2024-08-02T04:04:25.240Z Date Published: 2024-07-18T15:51:54.140Z Description: Dell Data Lakehouse, version(s) 1.0.0.0, contain(s) a Missing Encryption of Sensitive Data vulnerability in the DDAE (Starburst). A low privileged attacker with adjacent network access could potentially exploit this vulnerability, leading to Information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000227053/dsa-2024-303-security-update-for-dell-data-lakehouse-system-software-for-multiple-security-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6663.
CVE ID: CVE-2013-6663 Date Updated: 2024-08-06T17:46:22.303Z Date Published: 2014-03-05T02:00:00 Description: Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing of a view. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/65930 - http://www.debian.org/security/2014/dsa-2883 - http://support.apple.com/kb/HT6441 - https://support.apple.com/kb/HT6537 - http://support.apple.com/kb/HT6442 - http://secunia.com/advisories/61318 - http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html - http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html - http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html - http://support.apple.com/kb/HT6440 - http://secunia.com/advisories/61306 - https://code.google.com/p/chromium/issues/detail?id=344492 - https://src.chromium.org/viewvc/blink?revision=168152&view=revision No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15507.
CVE ID: CVE-2020-15507 Date Updated: 2024-08-04T13:15:20.702Z Date Published: 2020-07-07T01:42:44 Description: An arbitrary file reading vulnerability in MobileIron Core versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0 that allows remote attackers to read files on the system via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mobileiron.com/en/blog/mobileiron-security-updates-available - https://www.mobileiron.com/en/blog/mobileiron-security-updates-available No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6414.
CVE ID: CVE-2017-6414 Date Updated: 2024-08-05T15:25:49.287Z Date Published: 2017-03-15T14:00:00 Description: Memory leak in the vcard_apdu_new function in card_7816.c in libcacard before 2.5.3 allows local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/96541 - http://www.openwall.com/lists/oss-security/2017/03/01/11 - https://bugzilla.redhat.com/show_bug.cgi?id=1427833 - https://access.redhat.com/errata/RHSA-2017:2408 - https://cgit.freedesktop.org/spice/libcacard/commit/?id=9113dc6a303604a2d9812ac70c17d076ef11886c - https://cgit.freedesktop.org/spice/libcacard/tree/NEWS?id=aaa5251791bf0b1640afcba77a7d79ea23c42d53 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15079.
CVE ID: CVE-2020-15079 Date Updated: 2024-08-04T13:08:21.404Z Date Published: 2020-07-02T16:45:24 Description: In PrestaShop from version 1.5.0.0 and before version 1.7.6.6, there is improper access control in Carrier page, Module Manager and Module Positions. The problem is fixed in version 1.7.6.6 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-xp3x-3h8q-c386 - https://github.com/PrestaShop/PrestaShop/commit/8833d9504cc5d69a2a6d10197f56f0c11443cbfa No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-28313.
CVE ID: CVE-2020-28313 Date Updated: 2021-01-22T19:44:55 Date Published: 2021-01-22T19:44:55 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-39188.
CVE ID: CVE-2022-39188 Date Updated: 2024-08-03T12:00:42.380Z Date Published: 2022-09-02T00:00:00 Description: An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.chromium.org/p/project-zero/issues/detail?id=2329 - https://lore.kernel.org/stable/CAG48ez3SEqOPcPCYGHVZv4iqEApujD5VtM3Re-tCKLDEFdEdbg%40mail.gmail.com/ - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19 - https://github.com/torvalds/linux/commit/b67fbebd4cf980aecbcc750e1462128bffe8ae15 - https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15 - https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html - https://www.debian.org/security/2022/dsa-5257 - https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1000226.
CVE ID: CVE-2018-1000226 Date Updated: 2024-08-05T12:40:46.918Z Date Published: 2018-08-20T20:00:00 Description: Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Incorrect Access Control vulnerability in XMLRPC API (/cobbler_api) that can result in Privilege escalation, data manipulation or exfiltration, LDAP credential harvesting. This attack appear to be exploitable via "network connectivity". Taking advantage of improper validation of security tokens in API endpoints. Please note this is a different issue than CVE-2018-10931. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://movermeyer.com/2018-08-02-privilege-escalation-exploits-in-cobblers-api/ - https://github.com/cobbler/cobbler/issues/1916 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26106.
CVE ID: CVE-2022-26106 Date Updated: 2024-08-03T04:56:37.602Z Date Published: 2022-04-12T16:11:23 Description: When a user opens a manipulated Computer Graphics Metafile (.cgm, CgmCore.dll) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.support.sap.com/#/notes/3143437 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14157.
CVE ID: CVE-2019-14157 Date Updated: 2021-12-20T22:43:58 Date Published: 2021-12-20T22:43:58 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26277.
CVE ID: CVE-2024-26277 Date Updated: 2024-08-13T07:54:03.735Z Date Published: 2024-04-09T08:34:38.896Z Description: A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted X_T files. An attacker could leverage this vulnerability to crash the application causing denial of service condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/html/ssa-222019.html - https://cert-portal.siemens.com/productcert/html/ssa-771940.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30787.
CVE ID: CVE-2022-30787 Date Updated: 2024-08-03T07:03:38.621Z Date Published: 2022-05-26T00:00:00 Description: An integer underflow in fuse_lib_readdir enables arbitrary memory read operations in NTFS-3G through 2021.8.22 when using libfuse-lite. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tuxera/ntfs-3g/releases - https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58 - http://www.openwall.com/lists/oss-security/2022/06/07/4 - https://www.debian.org/security/2022/dsa-5160 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JPX6OUCQKZX4PN5DQPVDUFZCOOZUX7Z/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECDCISL24TYH4CTDFCUVF24WAKRSYF7F/ - https://lists.debian.org/debian-lts-announce/2022/06/msg00017.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FAXFYIJWT5SHHRNPOJETM77EIMJ6ZP6I/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEXHDCUSLJD2HSPMAAVZ5AWMPUOG6UI7/ - https://security.gentoo.org/glsa/202301-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26314.
CVE ID: CVE-2024-26314 Date Updated: 2024-08-02T00:07:19.173Z Date Published: 2024-07-02T00:00:00 Description: Improper privilege management in Jungo WinDriver 6.0.0 through 16.1.0 allows local attackers to escalate privileges and execute arbitrary code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jungo.com/windriver/versions/ - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf - https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18259.
CVE ID: CVE-2019-18259 Date Updated: 2024-08-05T01:47:14.082Z Date Published: 2019-12-16T19:19:04 Description: In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof arbitrary messages or execute commands. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.us-cert.gov/ics/advisories/icsa-19-346-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-36012.
CVE ID: CVE-2020-36012 Date Updated: 2024-08-04T17:16:13.937Z Date Published: 2021-01-27T12:11:02 Description: Stored XSS vulnerability in BDTASK Multi-Store Inventory Management System 1.0 allows a local admin to inject arbitrary code via the Customer Name Field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://bdtask.com - http://multi-store.com - https://kislay00.medium.com/m-store-multi-store-inventory-management-system-add-customer-stored-xss-875a376770ec No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4936.
CVE ID: CVE-2023-4936 Date Updated: 2024-09-18T18:42:24.025Z Date Published: 2023-10-11T17:00:07.311Z Description: It is possible to sideload a compromised DLL during the installation at elevated privilege. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.synaptics.com/ - https://www.synaptics.com/products/displaylink-graphics/downloads/windows - https://www.synaptics.com/sites/default/files/nr-154525-tc-synaptics_displaylink_windows_driver_security_brief_-_oct2023.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-23922.
CVE ID: CVE-2022-23922 Date Updated: 2024-09-16T19:37:00.261Z Date Published: 2022-02-24T18:26:58.463797Z Description: WIN-911 2021 R1 and R2 are vulnerable to a permissions misconfiguration that may allow an attacker to locally write files to the Program Announcer directory and elevate permissions whenever the program is executed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsa-22-053-03 - https://supportdesk.win911.com/support/solutions/articles/24000074683-win-911-2021-r1-r2-file-permission-vulnerability No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3238.
CVE ID: CVE-2008-3238 Date Updated: 2024-08-07T09:28:41.972Z Date Published: 2008-07-21T16:00:00 Description: Multiple SQL injection vulnerabilities in ITechBids 7.0 Gold allow remote attackers to execute arbitrary SQL commands via (1) the seller_id parameter in sellers_othersitem.php, (2) the productid parameter in classifieds.php, and (3) the id parameter in shop.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://securityreason.com/securityalert/4015 - http://secunia.com/advisories/31084 - http://www.securityfocus.com/bid/30215 - http://www.vupen.com/english/advisories/2008/2107/references - https://www.exploit-db.com/exploits/6069 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43759 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-31657.
CVE ID: CVE-2022-31657 Date Updated: 2024-08-03T07:26:00.799Z Date Published: 2022-08-05T15:07:39 Description: VMware Workspace ONE Access and Identity Manager contain a URL injection vulnerability. A malicious actor with network access may be able to redirect an authenticated user to an arbitrary domain. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vmware.com/security/advisories/VMSA-2022-0021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4802.
CVE ID: CVE-2022-4802 Date Updated: 2024-08-03T01:48:40.475Z Date Published: 2022-12-28T00:00:00 Description: Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53 - https://huntr.dev/bounties/d47d4a94-92e3-4400-b012-a8577cbd7956 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-23376.
CVE ID: CVE-2020-23376 Date Updated: 2024-08-04T14:58:15.147Z Date Published: 2021-05-10T22:12:53 Description: NoneCMS v1.3 has a CSRF vulnerability in public/index.php/admin/nav/add.html, as demonstrated by adding a navigation column which can be injected with arbitrary web script or HTML via the name parameter to launch a stored XSS attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/nangge/noneCms/issues/35 - https://cwe.mitre.org/data/definitions/352.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20432.
CVE ID: CVE-2021-20432 Date Updated: 2024-09-16T16:18:23.973Z Date Published: 2021-04-26T16:30:43.094832Z Description: IBM Spectrum Protect Plus 10.1.0 through 10.1.7 uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive information as the domain name is not being limited to only trusted domains. IBM X-Force ID: 196344. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6445733 - https://exchange.xforce.ibmcloud.com/vulnerabilities/196344 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1571.
CVE ID: CVE-2011-1571 Date Updated: 2024-09-17T00:56:46.207Z Date Published: 2011-05-07T19:00:00Z Description: Unspecified vulnerability in the XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat is used, allows remote attackers to execute arbitrary commands via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://issues.liferay.com/browse/LPS-14726 - http://openwall.com/lists/oss-security/2011/04/08/5 - http://openwall.com/lists/oss-security/2011/04/11/9 - http://openwall.com/lists/oss-security/2011/03/29/1 - http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5255.
CVE ID: CVE-2024-5255 Date Updated: 2024-08-01T21:03:11.107Z Date Published: 2024-07-17T06:45:08.866Z Description: The Ultimate Addons for WPBakery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ultimate_dual_color shortcode in all versions up to, and including, 3.19.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/66d77518-a258-4e79-b483-275855c0a416?source=cve - https://ultimate.brainstormforce.com/changelog/?utm_source=codecanyon-item-page&utm_campaign=uavc-changelog&utm_medium=changelog No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-12304.
CVE ID: CVE-2017-12304 Date Updated: 2024-08-05T18:36:54.508Z Date Published: 2017-11-16T07:00:00 Description: A vulnerability in the IOS daemon (IOSd) web-based management interface of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the web-based management interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf60862. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/101856 - http://www.securitytracker.com/id/1039825 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-ios No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0353.
CVE ID: CVE-2009-0353 Date Updated: 2024-08-07T04:31:26.229Z Date Published: 2009-02-04T19:00:00 Description: Unspecified vulnerability in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html - http://secunia.com/advisories/33808 - http://www.vupen.com/english/advisories/2009/0313 - http://www.debian.org/security/2009/dsa-1830 - http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html - https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html - http://secunia.com/advisories/33809 - http://www.mandriva.com/security/advisories?name=MDVSA-2009:044 - http://rhn.redhat.com/errata/RHSA-2009-0256.html - http://www.mozilla.org/security/announce/2009/mfsa2009-01.html - http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420 - http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm - http://secunia.com/advisories/33831 - http://www.redhat.com/support/errata/RHSA-2009-0258.html - http://www.mandriva.com/security/advisories?name=MDVSA-2009:083 - http://www.securitytracker.com/id?1021663 - https://bugzilla.mozilla.org/show_bug.cgi?id=452913 - http://secunia.com/advisories/34464 - http://secunia.com/advisories/34417 - http://secunia.com/advisories/33841 - http://secunia.com/advisories/34527 - http://secunia.com/advisories/33816 - http://secunia.com/advisories/33846 - http://secunia.com/advisories/33799 - https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html - http://www.redhat.com/support/errata/RHSA-2009-0257.html - https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html - http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952 - http://secunia.com/advisories/34462 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11193 - http://www.securityfocus.com/bid/33598 - https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html - http://secunia.com/advisories/33802 - http://secunia.com/advisories/34324 - http://secunia.com/advisories/33869 - http://www.ubuntu.com/usn/usn-717-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.