instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2023-20674.
CVE ID: CVE-2023-20674 Date Updated: 2024-08-02T09:14:40.652Z Date Published: 2023-04-06T00:00:00 Description: In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID: ALPS07588552. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/April-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19326.
CVE ID: CVE-2019-19326 Date Updated: 2024-08-05T02:16:46.998Z Date Published: 2020-07-15T18:54:55 Description: Silverstripe CMS sites through 4.4.4 which have opted into HTTP Cache Headers on responses served by the framework's HTTP layer can be vulnerable to web cache poisoning. Through modifying the X-Original-Url and X-HTTP-Method-Override headers, responses with malicious HTTP headers can return unexpected responses to other consumers of this cached response. Most other headers associated with web cache poisoning are already disabled through request hostname forgery whitelists. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.silverstripe.org/download/security-releases/CVE-2019-19326 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-29421.
CVE ID: CVE-2023-29421 Date Updated: 2024-08-02T14:07:46.216Z Date Published: 2023-04-06T00:00:00 Description: An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is an out-of-bounds write in bz3_decode_block. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/kspalaiologos/bzip3/compare/1.2.2...1.2.3 - https://github.com/kspalaiologos/bzip3/issues/94 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NA7S7HDUAINOTCSWQZ5LIW756DYY22V2/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JLSE25SV7K2NB6FTFT4UHJOJUHBHYHY/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMLFV2FJK3CM7NJLVPZI5RUAFQZICPWW/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1968.
CVE ID: CVE-2024-1968 Date Updated: 2024-08-01T18:56:22.474Z Date Published: 2024-05-20T08:03:43.129Z Description: In scrapy/scrapy, an issue was identified where the Authorization header is not removed during redirects that only change the scheme (e.g., HTTPS to HTTP) but remain within the same domain. This behavior contravenes the Fetch standard, which mandates the removal of Authorization headers in cross-origin requests when the scheme, host, or port changes. Consequently, when a redirect downgrades from HTTPS to HTTP, the Authorization header may be inadvertently exposed in plaintext, leading to potential sensitive information disclosure to unauthorized actors. The flaw is located in the _build_redirect_request function of the redirect middleware. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.com/bounties/27f6a021-a891-446a-ada5-0226d619dd1a - https://github.com/scrapy/scrapy/commit/1d0502f25bbe55a22899af915623fda1aaeb9dd8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5663.
CVE ID: CVE-2024-5663 Date Updated: 2024-08-01T21:18:06.840Z Date Published: 2024-06-08T02:35:20.761Z Description: The Cards for Beaver Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Cards widget in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/55ff923e-9d04-4ce7-b6d6-165fa4fc5433?source=cve - https://plugins.trac.wordpress.org/browser/bb-bootstrap-cards/trunk/bb-bootstrap-cards-module/includes/frontend.php#L13 - https://wordpress.org/plugins/bb-bootstrap-cards/#developers - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3099081%40bb-bootstrap-cards&new=3099081%40bb-bootstrap-cards&sfp_email=&sfph_mail=#file4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2742.
CVE ID: CVE-2010-2742 Date Updated: 2024-08-07T02:46:47.202Z Date Published: 2010-12-16T19:00:00 Description: The Netlogon RPC Service in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, and R2, when the domain controller role is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a crafted RPC packet, aka "Netlogon RPC Null dereference DOS Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.us-cert.gov/cas/techalerts/TA10-348A.html - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-101 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11963 - http://www.securitytracker.com/id?1024883 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-2270.
CVE ID: CVE-2020-2270 Date Updated: 2024-08-04T07:01:41.305Z Date Published: 2020-09-16T13:20:46 Description: Jenkins ClearCase Release Plugin 0.3 and earlier does not escape the composite baseline in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1911 - http://www.openwall.com/lists/oss-security/2020/09/16/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3416.
CVE ID: CVE-2013-3416 Date Updated: 2024-08-06T16:07:37.929Z Date Published: 2013-07-10T21:00:00 Description: Cross-site scripting (XSS) vulnerability in the web framework in the unified-communications management implementation in Cisco Unified Operations Manager and Unified Service Monitor allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug IDs CSCuh47574 and CSCuh95997. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1028765 - http://www.securitytracker.com/id/1028766 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3416 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4063.
CVE ID: CVE-2015-4063 Date Updated: 2024-08-06T06:04:02.662Z Date Published: 2015-05-27T18:00:00 Description: Cross-site scripting (XSS) vulnerability in includes/nsp_search.php in the NewStatPress plugin before 0.9.9 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the where1 parameter in the nsp_search page to wp-admin/admin.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/132038/WordPress-NewStatPress-0.9.8-Cross-Site-Scripting-SQL-Injection.html - https://wordpress.org/plugins/newstatpress/changelog/ - http://www.securityfocus.com/bid/74773 - https://www.exploit-db.com/exploits/37107/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0493.
CVE ID: CVE-2010-0493 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2598.
CVE ID: CVE-2012-2598 Date Updated: 2024-09-17T02:02:35.301Z Date Published: 2012-06-08T18:00:00Z Description: Buffer overflow in the DiagAgent web server in Siemens WinCC 7.0 SP3 through Update 2 allows remote attackers to cause a denial of service (agent outage) via crafted input. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-223158.pdf - http://www.us-cert.gov/control_systems/pdf/ICSA-12-158-01.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8267.
CVE ID: CVE-2015-8267 Date Updated: 2024-08-06T08:13:32.058Z Date Published: 2015-12-24T00:00:00 Description: The PasswordReset.Controllers.ResetController.ChangePasswordIndex method in PasswordReset.dll in Dovestones AD Self Password Reset before 3.0.4.0 allows remote attackers to reset arbitrary passwords via a crafted request with a valid username. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/79642 - http://www.dovestones.com/security-vulnerability-in-ad-self-password-reset-v3-0-3-0/ - https://www.kb.cert.org/vuls/id/757840 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-31478.
CVE ID: CVE-2024-31478 Date Updated: 2024-08-02T01:52:57.134Z Date Published: 2024-05-14T22:32:51.129Z Description: Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exists in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilites result in the ability to interrupt the normal operation of the affected Access Point. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14707.
CVE ID: CVE-2018-14707 Date Updated: 2024-08-05T09:38:13.227Z Date Published: 2018-12-03T22:00:00 Description: Directory traversal in the Drobo Pix web application on Drobo 5N2 NAS version 4.0.5-13.28.96115 allows unauthenticated attackers to upload files to arbitrary locations. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8818.
CVE ID: CVE-2016-8818 Date Updated: 2024-08-06T02:35:01.235Z Date Published: 2016-12-16T21:00:00 Description: All versions of NVIDIA Windows GPU Display contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape where a pointer passed from a user to the driver is used without validation, leading to denial of service or potential escalation of privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://nvidia.custhelp.com/app/answers/detail/a_id/4257 - http://www.securityfocus.com/bid/95056 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5587.
CVE ID: CVE-2015-5587 Date Updated: 2024-08-06T06:50:03.256Z Date Published: 2015-09-22T10:00:00 Description: Stack-based buffer overflow in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2015-1814.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 - http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00023.html - http://www.securitytracker.com/id/1033629 - http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00024.html - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04939841 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - https://helpx.adobe.com/security/products/flash-player/apsb15-23.html - http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html - https://security.gentoo.org/glsa/201509-07 - http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html - http://www.securityfocus.com/bid/76797 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-25651.
CVE ID: CVE-2020-25651 Date Updated: 2024-08-04T15:40:36.225Z Date Published: 2020-11-26T01:18:45 Description: A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.openwall.com/lists/oss-security/2020/11/04/1 - https://bugzilla.redhat.com/show_bug.cgi?id=1886359 - https://lists.debian.org/debian-lts-announce/2021/01/msg00012.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIWJ2EIQXWEA2VDBODEATHAT37X4CREP/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQT56LATVTB2DJOVVJOKQVMVUXYCT2VB/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-28275.
CVE ID: CVE-2021-28275 Date Updated: 2024-08-03T21:40:14.193Z Date Published: 2022-03-23T00:00:00 Description: A Denial of Service vulnerability exists in jhead 3.04 and 3.05 due to a wild address read in the Get16u function in exif.c in will cause segmentation fault via a crafted_file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Matthias-Wandel/jhead/issues/17 - https://security.gentoo.org/glsa/202210-17 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-24781.
CVE ID: CVE-2023-24781 Date Updated: 2024-08-02T11:03:19.198Z Date Published: 2023-03-07T00:00:00 Description: Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\MemberLevel.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/funadmin/funadmin/issues/8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9940.
CVE ID: CVE-2014-9940 Date Updated: 2024-08-06T14:02:37.412Z Date Published: 2017-05-02T21:00:00 Description: The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=60a2362f769cf549dc466134efe71c8bf9fbaaba - http://www.securityfocus.com/bid/98195 - https://source.android.com/security/bulletin/2017-05-01 - https://github.com/torvalds/linux/commit/60a2362f769cf549dc466134efe71c8bf9fbaaba - http://www.debian.org/security/2017/dsa-3945 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4766.
CVE ID: CVE-2014-4766 Date Updated: 2024-08-06T11:27:36.674Z Date Published: 2014-10-23T01:00:00 Description: IBM Sametime Classic Meeting Server 8.0.x and 8.5.x allows remote attackers to obtain sensitive information by reading an exported Record and Playback (RAP) file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/94793 - http://www-01.ibm.com/support/docview.wss?uid=swg21687361 - http://secunia.com/advisories/61847 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9702.
CVE ID: CVE-2019-9702 Date Updated: 2024-08-04T21:54:45.170Z Date Published: 2019-07-01T20:28:16 Description: Symantec Endpoint Encryption, prior to SEE 11.3.0, may be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/108795 - https://support.symantec.com/us/en/article.SYMSA1485.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6361.
CVE ID: CVE-2008-6361 Date Updated: 2024-08-07T11:27:35.719Z Date Published: 2009-03-02T16:00:00 Description: Directory traversal vulnerability in index.php in InSun Feed CMS 1.7.3 19Beta allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the lang parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/32783/exploit - http://www.securityfocus.com/bid/32783 - https://exchange.xforce.ibmcloud.com/vulnerabilities/47276 - https://www.exploit-db.com/exploits/7422 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39461.
CVE ID: CVE-2024-39461 Date Updated: 2024-09-11T17:34:42.350Z Date Published: 2024-06-25T14:25:01.453Z Description: In the Linux kernel, the following vulnerability has been resolved: clk: bcm: rpi: Assign ->num before accessing ->hws Commit f316cdff8d67 ("clk: Annotate struct clk_hw_onecell_data with __counted_by") annotated the hws member of 'struct clk_hw_onecell_data' with __counted_by, which informs the bounds sanitizer about the number of elements in hws, so that it can warn when hws is accessed out of bounds. As noted in that change, the __counted_by member must be initialized with the number of elements before the first array access happens, otherwise there will be a warning from each access prior to the initialization because the number of elements is zero. This occurs in raspberrypi_discover_clocks() due to ->num being assigned after ->hws has been accessed: UBSAN: array-index-out-of-bounds in drivers/clk/bcm/clk-raspberrypi.c:374:4 index 3 is out of range for type 'struct clk_hw *[] __counted_by(num)' (aka 'struct clk_hw *[]') Move the ->num initialization to before the first access of ->hws, which clears up the warning. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/9562dbe5cdbb16ac887d27ef6f179980bb99193c - https://git.kernel.org/stable/c/cdf9c7871d58d3df59d2775982e3533adb8ec920 - https://git.kernel.org/stable/c/6dc445c1905096b2ed4db1a84570375b4e00cc0f No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3385.
CVE ID: CVE-2023-3385 Date Updated: 2024-09-18T13:09:46.886Z Date Published: 2023-08-01T23:35:55.776Z Description: An issue has been discovered in GitLab affecting all versions starting from 8.10 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. Under specific circumstances, a user importing a project 'from export' could access and read unrelated files via uploading a specially crafted file. This was due to a bug in `tar`, fixed in [`tar-1.35`](https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab/-/issues/416161 - https://hackerone.com/reports/2032730 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2692.
CVE ID: CVE-2008-2692 Date Updated: 2024-08-07T09:14:14.269Z Date Published: 2008-06-13T19:19:00 Description: SQL injection vulnerability in the yvComment (com_yvcomment) component 1.16.0 and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the ArticleID parameter in a comment action to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/42920 - http://secunia.com/advisories/30567 - http://www.securityfocus.com/bid/29596 - https://www.exploit-db.com/exploits/5755 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4142.
CVE ID: CVE-2014-4142 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-5233.
CVE ID: CVE-2010-5233 Date Updated: 2024-09-16T19:14:09.378Z Date Published: 2012-09-07T10:00:00Z Description: Untrusted search path vulnerability in Virtual DJ 6.1.2 Trial b301 allows local users to gain privileges via a Trojan horse HDJAPI.dll file in the current working directory, as demonstrated by a directory that contains a .mp3 file. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/ - http://secunia.com/advisories/41115 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11785.
CVE ID: CVE-2018-11785 Date Updated: 2024-09-16T20:06:46.672Z Date Published: 2018-10-24T20:00:00Z Description: Missing authorization check in Apache Impala before 3.0.1 allows a Kerberos-authenticated but unauthorized user to inject random data into a running query, leading to wrong results for a query. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/105742 - https://lists.apache.org/thread.html/cba8f18df15af862aa07c584d8dc85c44a199fb8f460edd498059247%40%3Cdev.impala.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27063.
CVE ID: CVE-2023-27063 Date Updated: 2024-08-02T12:01:32.509Z Date Published: 2023-03-13T00:00:00 Description: Tenda V15V1.0 V15.11.0.14(1521_3190_1058) was discovered to contain a buffer overflow vulnerability via the DNSDomainName parameter in the formModifyDnsForward function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formModifyDnsForward.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-38923.
CVE ID: CVE-2022-38923 Date Updated: 2024-08-03T11:10:31.679Z Date Published: 2023-04-03T00:00:00 Description: BluePage CMS thru v3.9 processes an insufficiently sanitized HTTP Header allowing MySQL Injection in the 'User-Agent' field using a Time-based blind SLEEP payload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.bluepage-cms.com/index.php - https://www.iss-oberlausitz.de/index.php - https://github.com/dtssec/CVE-Disclosures/blob/main/CVE-2022-38922_CVE-2022-38923_Bluepage_CMS_SQLi/CVE-2022-38922-BluePage_CMS_3.9.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-40788.
CVE ID: CVE-2024-40788 Date Updated: 2024-08-05T10:22:09.122Z Date Published: 2024-07-29T22:17:02.532Z Description: A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. A local attacker may be able to cause unexpected system shutdown. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT214117 - https://support.apple.com/en-us/HT214116 - https://support.apple.com/en-us/HT214120 - https://support.apple.com/en-us/HT214124 - https://support.apple.com/en-us/HT214119 - https://support.apple.com/en-us/HT214123 - https://support.apple.com/en-us/HT214122 - https://support.apple.com/en-us/HT214118 - http://seclists.org/fulldisclosure/2024/Jul/16 - http://seclists.org/fulldisclosure/2024/Jul/23 - http://seclists.org/fulldisclosure/2024/Jul/21 - http://seclists.org/fulldisclosure/2024/Jul/20 - http://seclists.org/fulldisclosure/2024/Jul/17 - http://seclists.org/fulldisclosure/2024/Jul/22 - http://seclists.org/fulldisclosure/2024/Jul/18 - http://seclists.org/fulldisclosure/2024/Jul/19 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15248.
CVE ID: CVE-2020-15248 Date Updated: 2024-08-04T13:08:23.177Z Date Published: 2020-11-23T19:40:15 Description: October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October CMS from version 1.0.319 and before version 1.0.470, backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access. Issue has been patched in Build 470 (v1.0.470) & v1.1.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw - https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5907.
CVE ID: CVE-2015-5907 Date Updated: 2024-08-06T07:06:34.292Z Date Published: 2015-09-18T10:00:00 Description: WebKit in Apple iOS before 9 allows man-in-the-middle attackers to conduct redirection attacks by leveraging the mishandling of the resource cache of an SSL web site with an invalid X.509 certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1033609 - https://support.apple.com/HT205212 - http://www.securityfocus.com/bid/76766 - http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10020.
CVE ID: CVE-2019-10020 Date Updated: 2024-08-04T22:10:08.682Z Date Published: 2019-03-24T23:10:58 Description: An issue was discovered in Xpdf 4.01.01. There is an FPE in the function Splash::scaleImageYuXu at Splash.cc for x Bresenham parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20881.
CVE ID: CVE-2022-20881 Date Updated: 2024-09-16T22:19:37.195Z Date Published: 2022-07-21T03:54:14.273488Z Description: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41092.
CVE ID: CVE-2022-41092 Date Updated: 2024-08-03T12:35:49.244Z Date Published: 2022-11-09T00:00:00 Description: Windows Win32k Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41092 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20492.
CVE ID: CVE-2022-20492 Date Updated: 2024-08-03T02:17:51.838Z Date Published: 2023-01-24T00:00:00 Description: In many functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242704043 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2023-01-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1487.
CVE ID: CVE-2013-1487 Date Updated: 2024-08-06T15:04:48.892Z Date Published: 2013-02-20T21:00:00 Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 Update 13 and earlier and 6 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19511 - http://www.us-cert.gov/cas/techalerts/TA13-051A.html - http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html - http://rhn.redhat.com/errata/RHSA-2013-1455.html - http://www.ubuntu.com/usn/USN-1735-1 - http://marc.info/?l=bugtraq&m=136439120408139&w=2 - http://marc.info/?l=bugtraq&m=136733161405818&w=2 - http://marc.info/?l=bugtraq&m=136439120408139&w=2 - http://www.securityfocus.com/bid/58031 - http://rhn.redhat.com/errata/RHSA-2013-1456.html - http://marc.info/?l=bugtraq&m=136733161405818&w=2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20129.
CVE ID: CVE-2021-20129 Date Updated: 2024-08-03T17:30:07.422Z Date Published: 2021-10-13T15:49:35 Description: An information disclosure vulnerability exists in Draytek VigorConnect 1.6.0-B3, allowing an unauthenticated attacker to export system logs. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2021-42 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4554.
CVE ID: CVE-2012-4554 Date Updated: 2024-09-17T00:00:50.515Z Date Published: 2012-11-11T11:00:00Z Description: The OpenID module in Drupal 7.x before 7.16 allows remote OpenID servers to read arbitrary files via a crafted DOCTYPE declaration in an XRDS file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://drupalcode.org/project/drupal.git/commit/b912710 - http://www.openwall.com/lists/oss-security/2012/10/29/4 - http://drupal.org/node/1815912 - http://www.openwall.com/lists/oss-security/2012/10/30/5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7112.
CVE ID: CVE-2015-7112 Date Updated: 2024-08-06T07:43:44.447Z Date Published: 2015-12-11T11:00:00 Description: The IOHIDFamily API in Apple iOS before 9.2, OS X before 10.11.2, tvOS before 9.1, and watchOS before 2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2015-7111. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT205635 - https://support.apple.com/HT205637 - http://www.securitytracker.com/id/1034344 - http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html - http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html - http://www.securityfocus.com/bid/78719 - http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html - https://support.apple.com/HT205641 - https://support.apple.com/HT205640 - http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17073.
CVE ID: CVE-2017-17073 Date Updated: 2018-01-29T18:57:01 Date Published: 2018-01-29T19:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7779.
CVE ID: CVE-2019-7779 Date Updated: 2024-08-04T20:54:28.473Z Date Published: 2019-05-22T13:44:43 Description: Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a security bypass vulnerability. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-18.html - http://www.securityfocus.com/bid/108319 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-37539.
CVE ID: CVE-2024-37539 Date Updated: 2024-08-02T03:57:39.751Z Date Published: 2024-07-06T12:13:09.384Z Description: Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Delower WP To Do allows Stored XSS.This issue affects WP To Do: from n/a through 1.3.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/wp-todo/wordpress-wp-to-do-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3000.
CVE ID: CVE-2022-3000 Date Updated: 2024-08-03T00:53:00.686Z Date Published: 2022-09-20T07:10:09 Description: Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/a060d3dd-6fdd-4958-82a9-364df1cb770c - https://github.com/yetiforcecompany/yetiforcecrm/commit/eebc12601495ada38495076bec12841b2477516b No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4912.
CVE ID: CVE-2024-4912 Date Updated: 2024-08-01T20:55:10.318Z Date Published: 2024-05-15T20:31:05.765Z Description: A vulnerability classified as critical has been found in Campcodes Online Examination System 1.0. This affects an unknown part of the file addExamExe.php. The manipulation of the argument examTitle leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264447. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.264447 - https://vuldb.com/?ctiid.264447 - https://vuldb.com/?submit.333402 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addExamExe.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36159.
CVE ID: CVE-2022-36159 Date Updated: 2024-08-03T10:00:04.266Z Date Published: 2022-09-26T10:07:27 Description: Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.contec.com/products-services/computer-networking/flexlan-fx/fx-accesspoint/fxa3200/feature/#section - https://gist.github.com/Nwqda/aac33d1936d2b514a3268f145345abb4 - https://samy.link/blog/contec-flexlan-fxa2000-and-fxa3000-series-vulnerability-repo - https://jvn.jp/en/vu/JVNVU98305100/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8455.
CVE ID: CVE-2015-8455 Date Updated: 2024-08-06T08:20:41.728Z Date Published: 2015-12-10T02:00:00 Description: Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, and CVE-2015-8451. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00008.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 - https://helpx.adobe.com/security/products/flash-player/apsb15-32.html - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00012.html - http://www.securitytracker.com/id/1034318 - https://security.gentoo.org/glsa/201601-03 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 - http://www.securityfocus.com/bid/78710 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-2002.
CVE ID: CVE-2020-2002 Date Updated: 2024-09-17T04:03:36.143Z Date Published: 2020-05-13T19:07:14.142942Z Description: An authentication bypass by spoofing vulnerability exists in the authentication daemon and User-ID components of Palo Alto Networks PAN-OS by failing to verify the integrity of the Kerberos key distribution center (KDC) before authenticating users. This affects all forms of authentication that use a Kerberos authentication profile. A man-in-the-middle type of attacker with the ability to intercept communication between PAN-OS and KDC can login to PAN-OS as an administrator. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.6; All version of PAN-OS 8.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.paloaltonetworks.com/CVE-2020-2002 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5784.
CVE ID: CVE-2008-5784 Date Updated: 2024-08-07T11:04:44.475Z Date Published: 2008-12-31T11:00:00 Description: V3 Chat - Profiles/Dating Script 3.0.2 allows remote attackers to bypass authentication and gain administrative access by setting the admin cookie to 1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/46479 - https://www.exploit-db.com/exploits/7063 - http://www.securityfocus.com/bid/32216 - http://www.vupen.com/english/advisories/2008/3071 - http://secunia.com/advisories/32603 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40419.
CVE ID: CVE-2023-40419 Date Updated: 2024-08-02T18:31:53.778Z Date Published: 2023-09-26T20:14:57.130Z Description: The issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10. An app may be able to gain elevated privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213938 - https://support.apple.com/en-us/HT213936 - https://support.apple.com/en-us/HT213937 - http://seclists.org/fulldisclosure/2023/Oct/10 - http://seclists.org/fulldisclosure/2023/Oct/8 - http://seclists.org/fulldisclosure/2023/Oct/9 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30642.
CVE ID: CVE-2022-30642 Date Updated: 2024-08-03T06:56:13.174Z Date Published: 2023-09-07T13:12:16.054Z Description: Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/illustrator/apsb22-26.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3471.
CVE ID: CVE-2010-3471 Date Updated: 2024-09-17T02:37:17.821Z Date Published: 2010-09-20T21:00:00Z Description: Session fixation vulnerability in the Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 4.0.2.x before 4.0.2.7-P8AE-FP007 allows remote attackers to hijack web sessions via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/43271 - http://secunia.com/advisories/41460 - http://www-01.ibm.com/support/docview.wss?uid=swg1PJ37346 - http://download2.boulder.ibm.com/sar/CMA/IMA/00y3y/0/readme-4027-P8AE-FP007.htm No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5249.
CVE ID: CVE-2024-5249 Date Updated: 2024-09-09T20:32:20.470Z Date Published: 2024-07-30T18:23:29.074Z Description: In versions of Akana API Platform prior to 2024.1.0, SAML tokens can be replayed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.perforce.com/s/detail/a91PA000001SUH7YAO No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0037.
CVE ID: CVE-2017-0037 Date Updated: 2024-08-05T12:47:57.595Z Date Published: 2017-02-26T23:30:00 Description: Microsoft Internet Explorer 10 and 11 and Microsoft Edge have a type confusion issue in the Layout::MultiColumnBoxBuilder::HandleColumnBreakOnColumnSpanningElement function in mshtml.dll, which allows remote attackers to execute arbitrary code via vectors involving a crafted Cascading Style Sheets (CSS) token sequence and crafted JavaScript code that operates on a TH element. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.chromium.org/p/project-zero/issues/detail?id=1011 - https://0patch.blogspot.si/2017/03/0patching-another-0-day-internet.html - http://www.securityfocus.com/bid/96088 - https://www.exploit-db.com/exploits/41454/ - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0037 - https://www.exploit-db.com/exploits/43125/ - http://www.securitytracker.com/id/1037905 - https://www.exploit-db.com/exploits/42354/ - http://www.securitytracker.com/id/1037906 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14788.
CVE ID: CVE-2017-14788 Date Updated: 2018-05-22T19:57:01 Date Published: 2018-05-22T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4844.
CVE ID: CVE-2019-4844 Date Updated: 2019-12-30T16:19:30 Date Published: 2019-12-30T16:19:30 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34889.
CVE ID: CVE-2022-34889 Date Updated: 2024-08-03T09:22:10.733Z Date Published: 2022-07-15T20:10:32 Description: This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 17.1.1 (51537). An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the ACPI virtual device. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-16554. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.parallels.com/125013 - https://www.zerodayinitiative.com/advisories/ZDI-22-940/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-31465.
CVE ID: CVE-2024-31465 Date Updated: 2024-08-13T13:56:21.898Z Date Published: 2024-04-10T19:12:35.517Z Description: XWiki Platform is a generic wiki platform. Starting in version 5.0-rc-1 and prior to versions 14.10.20, 15.5.4, and 15.9-rc-1, any user with edit right on any page can execute any code on the server by adding an object of type `XWiki.SearchSuggestSourceClass` to their user profile or any other page. This compromises the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10 RC1. As a workaround, manually apply the patch to the document `XWiki.SearchSuggestSourceSheet`. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-34fj-r5gq-7395 - https://github.com/xwiki/xwiki-platform/commit/0317a3aa78065e66c86fc725976b06bf7f9b446e - https://github.com/xwiki/xwiki-platform/commit/2740974c32dbb7cc565546d0f04e2374b32b36f7 - https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809 - https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809#diff-67b473d2b6397d65b7726c6a13555850b11b10128321adf9e627e656e1d130a5 - https://jira.xwiki.org/browse/XWIKI-21474 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23081.
CVE ID: CVE-2024-23081 Date Updated: 2024-08-01T22:51:11.278Z Date Published: 2024-04-08T00:00:00 Description: ThreeTen Backport v1.6.8 was discovered to contain a NullPointerException via the component org.threeten.bp.LocalDate::compareTo(ChronoLocalDate). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://threeten.com - https://github.com/ThreeTen/threetenbp - https://gist.github.com/LLM4IG/3cc9183dcd887020368a0bafeafec5e3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10409.
CVE ID: CVE-2017-10409 Date Updated: 2024-08-05T17:41:55.469Z Date Published: 2017-10-19T17:00:00 Description: Vulnerability in the Oracle iStore component of Oracle E-Business Suite (subcomponent: Merchant UI). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - http://www.securitytracker.com/id/1039592 - http://www.securityfocus.com/bid/101332 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12349.
CVE ID: CVE-2020-12349 Date Updated: 2024-08-04T11:56:51.495Z Date Published: 2020-11-12T18:56:00 Description: Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable information disclosure via network access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00430 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4139.
CVE ID: CVE-2019-4139 Date Updated: 2024-09-16T16:18:10.502Z Date Published: 2019-05-29T15:10:24.253198Z Description: IBM Cognos Analytics 11.0, 11.1.0, and 11.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158335. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=ibm10883872 - https://exchange.xforce.ibmcloud.com/vulnerabilities/158335 - http://www.securityfocus.com/bid/108527 - https://security.netapp.com/advisory/ntap-20190617-0004/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30815.
CVE ID: CVE-2021-30815 Date Updated: 2024-08-03T22:48:12.690Z Date Published: 2021-10-19T13:12:45 Description: A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in iOS 15 and iPadOS 15. A local attacker may be able to view contacts from the lock screen. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT212814 - http://seclists.org/fulldisclosure/2021/Oct/61 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11284.
CVE ID: CVE-2020-11284 Date Updated: 2024-08-04T11:28:13.847Z Date Published: 2021-05-07T09:10:34 Description: Locked memory can be unlocked and modified by non secure boot loader through improper system call sequence making the memory region untrusted source of input for secure boot loader in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/may-2021-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15436.
CVE ID: CVE-2020-15436 Date Updated: 2024-08-04T13:15:20.795Z Date Published: 2020-11-23T20:08:17 Description: Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lkml.org/lkml/2020/6/7/379 - https://security.netapp.com/advisory/ntap-20201218-0002/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41278.
CVE ID: CVE-2022-41278 Date Updated: 2024-08-03T12:42:45.639Z Date Published: 2022-12-13T00:00:00 Description: A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CGM_NIST_Loader.dll contains a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-700053.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-6982.
CVE ID: CVE-2020-6982 Date Updated: 2024-08-04T09:18:03.074Z Date Published: 2020-03-24T20:04:38 Description: In Honeywell WIN-PAK 4.7.2, Web and prior versions, the header injection vulnerability has been identified, which may allow remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.us-cert.gov/ics/advisories/icsa-20-056-05 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41508.
CVE ID: CVE-2023-41508 Date Updated: 2024-09-26T20:50:45.046Z Date Published: 2023-09-05T00:00:00 Description: A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://superstorefinder.net/support/forums/topic/super-store-finder-patch-notes/ - https://github.com/redblueteam/CVE-2023-41508/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27025.
CVE ID: CVE-2023-27025 Date Updated: 2024-08-02T12:01:31.462Z Date Published: 2023-04-02T00:00:00 Description: An arbitrary file download vulnerability in the background management module of RuoYi v4.7.6 and below allows attackers to download arbitrary files in the server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitee.com/y_project/RuoYi/issues/I697Q5 - https://gitee.com/y_project/RuoYi/commit/432d5ce1be2e9384a6230d7ccd8401eef5ce02b0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-14479.
CVE ID: CVE-2020-14479 Date Updated: 2024-09-16T18:24:46.119Z Date Published: 2022-04-01T22:17:52.198000Z Description: Sensitive information can be obtained through the handling of serialized data. The issue results from the lack of proper authentication required to query the server No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsa-20-147-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3624.
CVE ID: CVE-2014-3624 Date Updated: 2024-08-06T10:50:18.071Z Date Published: 2017-10-30T14:00:00 Description: Apache Traffic Server 5.1.x before 5.1.1 allows remote attackers to bypass access restrictions by leveraging failure to properly tunnel remap requests using CONNECT. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://issues.apache.org/jira/browse/TS-2677 - http://mail-archives.apache.org/mod_mbox/www-announce/201411.mbox/%3C20141101231749.2E3561043F%40minotaur.apache.org%3E - http://www.securityfocus.com/bid/101630 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-7111.
CVE ID: CVE-2013-7111 Date Updated: 2024-08-06T18:01:18.850Z Date Published: 2014-04-29T14:00:00 Description: The put_call function in the API client (api/api_client.rb) in the BaseSpace Ruby SDK (aka bio-basespace-sdk) gem 0.1.7 for Ruby uses the API_KEY on the command line, which allows remote attackers to obtain sensitive information by listing the processes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vapid.dhs.org/advisories/bio-basespace-sdk.html - http://www.openwall.com/lists/oss-security/2013/12/14/2 - http://www.openwall.com/lists/oss-security/2013/12/15/5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0526.
CVE ID: CVE-2008-0526 Date Updated: 2024-08-07T07:46:54.824Z Date Published: 2008-02-15T01:00:00 Description: Cisco Unified IP Phone 7940, 7940G, 7960, and 7960G running SCCP firmware allows remote attackers to cause a denial of service (reboot) via a long ICMP echo request (ping) packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id?1019407 - https://exchange.xforce.ibmcloud.com/vulnerabilities/40487 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080949c7a.shtml - http://www.securityfocus.com/bid/27774 - http://www.vupen.com/english/advisories/2008/0543 - http://secunia.com/advisories/28935 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-42985.
CVE ID: CVE-2022-42985 Date Updated: 2024-08-03T13:19:05.514Z Date Published: 2022-11-17T00:00:00 Description: The ScratchLogin extension through 1.1 for MediaWiki does not escape verification failure messages, which allows users with administrator privileges to perform cross-site scripting (XSS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/InternationalScratchWiki/mediawiki-scratch-login/pull/22 - https://github.com/InternationalScratchWiki/mediawiki-scratch-login/blob/4d2c1229b558b9cd685961274f20b621d114f4db/ScratchLogin.common.php#L104 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3619.
CVE ID: CVE-2024-3619 Date Updated: 2024-08-09T14:25:42.051Z Date Published: 2024-04-11T03:00:05.077Z Description: A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /control/addcase_stage.php. The manipulation of the argument cname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260275. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.260275 - https://vuldb.com/?ctiid.260275 - https://vuldb.com/?submit.312813 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32935.
CVE ID: CVE-2022-32935 Date Updated: 2024-08-03T07:54:03.494Z Date Published: 2022-11-01T00:00:00 Description: A lock screen issue was addressed with improved state management. This issue is fixed in iOS 15.7.1 and iPadOS 15.7.1, iOS 16.1 and iPadOS 16, macOS Ventura 13. A user may be able to view restricted content from the lock screen. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213488 - https://support.apple.com/en-us/HT213489 - https://support.apple.com/en-us/HT213490 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1000541.
CVE ID: CVE-2018-1000541 Date Updated: 2018-06-25T12:57:01 Date Published: 2018-06-25T13:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1278.
CVE ID: CVE-2008-1278 Date Updated: 2024-08-07T08:17:34.339Z Date Published: 2008-03-10T23:00:00 Description: The RemotelyAnywhere.exe service in the Remotely Anywhere Server and Workstation 8.0.668 and earlier allows remote attackers to cause a denial of service (crash) via an invalid Accept-Charset header, which triggers a NULL pointer dereference. NOTE: the service is automatically restarted. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/29296 - http://www.securityfocus.com/archive/1/489354/100/0/threaded - https://exchange.xforce.ibmcloud.com/vulnerabilities/41077 - http://www.vupen.com/english/advisories/2008/0816/references - http://aluigi.altervista.org/adv/remotelynowhere-adv.txt - http://www.securityfocus.com/bid/28175 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27339.
CVE ID: CVE-2023-27339 Date Updated: 2024-08-02T12:09:43.038Z Date Published: 2024-05-03T01:56:00.662Z Description: PDF-XChange Editor PNG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNG files. Crafted data in a PNG file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18663. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-351/ - https://www.tracker-software.com/product/pdf-xchange-editor/history No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3576.
CVE ID: CVE-2022-3576 Date Updated: 2024-09-16T19:36:43.491Z Date Published: 2022-10-20T05:50:24.922383Z Description: A vulnerability regarding out-of-bounds read is found in the session processing functionality of Out-of-Band (OOB) Management. This allows remote attackers to obtain sensitive information via unspecified vectors. The following models with Synology DiskStation Manager (DSM) versions before 7.1.1-42962-2 may be affected: DS3622xs+, FS3410, and HD6500. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.synology.com/security/advisory/Synology_SA_22_17 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12713.
CVE ID: CVE-2018-12713 Date Updated: 2024-08-05T08:45:02.100Z Date Published: 2018-06-24T22:00:00 Description: GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was intended to be private. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/GNOME/gimp/commit/c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f - https://gitlab.gnome.org/GNOME/gimp/issues/1689 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20008.
CVE ID: CVE-2018-20008 Date Updated: 2024-08-05T11:51:18.238Z Date Published: 2019-05-28T20:03:27 Description: iBall Baton iB-WRB302N20122017 devices have improper access control over the UART interface, allowing physical attackers to discover Wi-Fi credentials (plain text) and the web-console password (base64) via the debugging console. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.iball.co.in/Category/Baton/283 - https://payatu.com/ibaton-routers-responsible-disclosure/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25411.
CVE ID: CVE-2024-25411 Date Updated: 2024-09-27T19:24:45.430Z Date Published: 2024-09-27T00:00:00 Description: A cross-site scripting (XSS) vulnerability in Flatpress v1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter in setup.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://drive.google.com/file/d/1GBL-iY5ZRaxRqLVqpBe1w6dVgEfywAG7/view?usp=sharing - https://github.com/flatpressblog/flatpress/pull/261 - https://github.com/paragbagul111/CVE-2024-25411 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-43888.
CVE ID: CVE-2024-43888 Date Updated: 2024-09-15T17:54:57.849Z Date Published: 2024-08-26T10:10:40.890Z Description: In the Linux kernel, the following vulnerability has been resolved: mm: list_lru: fix UAF for memory cgroup The mem_cgroup_from_slab_obj() is supposed to be called under rcu lock or cgroup_mutex or others which could prevent returned memcg from being freed. Fix it by adding missing rcu read lock. Found by code inspection. [songmuchun@bytedance.com: only grab rcu lock when necessary, per Vlastimil] Link: https://lkml.kernel.org/r/20240801024603.1865-1-songmuchun@bytedance.com No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/4589f77c18dd98b65f45617b6d1e95313cf6fcab - https://git.kernel.org/stable/c/5161b48712dcd08ec427c450399d4d1483e21dea No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-4376.
CVE ID: CVE-2020-4376 Date Updated: 2024-09-17T02:01:05.852Z Date Published: 2020-07-01T14:25:31.874715Z Description: IBM MQ, IBM MQ Appliance, IBM MQ for HPE NonStop 8.0.4 and 8.1.0 could allow an attacker to cause a denial of service caused by an error within the pubsub logic. IBM X-Force ID: 179081. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6242364 - https://exchange.xforce.ibmcloud.com/vulnerabilities/179081 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2183.
CVE ID: CVE-2016-2183 Date Updated: 2024-08-05T23:17:50.753Z Date Published: 2016-09-01T00:00:00 Description: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2017:3113 - http://rhn.redhat.com/errata/RHSA-2017-0338.html - https://www.tenable.com/security/tns-2016-20 - https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us - https://security.gentoo.org/glsa/201612-16 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415 - https://access.redhat.com/errata/RHSA-2017:3240 - https://www.tenable.com/security/tns-2016-16 - https://access.redhat.com/errata/RHSA-2017:2709 - http://www.securityfocus.com/bid/92630 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499 - https://www.tenable.com/security/tns-2016-21 - https://kc.mcafee.com/corporate/index?page=content&id=SB10171 - https://access.redhat.com/errata/RHSA-2017:3239 - https://www.exploit-db.com/exploits/42091/ - https://security.gentoo.org/glsa/201701-65 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - http://www.securitytracker.com/id/1036696 - https://security.netapp.com/advisory/ntap-20160915-0001/ - https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us - https://security.gentoo.org/glsa/201707-01 - http://www.securityfocus.com/bid/95568 - https://access.redhat.com/errata/RHSA-2017:3114 - https://bto.bluecoat.com/security-advisory/sa133 - https://www.tenable.com/security/tns-2017-09 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116 - https://access.redhat.com/errata/RHSA-2017:1216 - https://wiki.opendaylight.org/view/Security_Advisories - https://access.redhat.com/errata/RHSA-2017:2710 - https://security.netapp.com/advisory/ntap-20170119-0001/ - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984 - https://www.ietf.org/mail-archive/web/tls/current/msg04560.html - https://access.redhat.com/errata/RHSA-2018:2123 - http://rhn.redhat.com/errata/RHSA-2017-0337.html - https://access.redhat.com/errata/RHSA-2017:2708 - http://rhn.redhat.com/errata/RHSA-2017-0336.html - http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 - http://rhn.redhat.com/errata/RHSA-2017-0462.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 - https://kc.mcafee.com/corporate/index?page=content&id=SB10215 - http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html - http://www.securityfocus.com/archive/1/540341/100/0/threaded - http://www.ubuntu.com/usn/USN-3087-1 - http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html - https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680 - http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html - http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded - http://www.ubuntu.com/usn/USN-3087-2 - http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded - https://kc.mcafee.com/corporate/index?page=content&id=SB10197 - https://kc.mcafee.com/corporate/index?page=content&id=SB10186 - http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html - http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded - https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849 - http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html - https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613 - http://seclists.org/fulldisclosure/2017/Jul/31 - http://www.ubuntu.com/usn/USN-3194-1 - http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html - https://seclists.org/bugtraq/2018/Nov/21 - https://support.f5.com/csp/article/K13167034 - https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722 - http://www.securityfocus.com/archive/1/542005/100/0/threaded - http://www.debian.org/security/2016/dsa-3673 - http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html - http://www.ubuntu.com/usn/USN-3372-1 - http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html - http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html - http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html - http://www.ubuntu.com/usn/USN-3270-1 - http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded - https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178 - http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html - http://seclists.org/fulldisclosure/2017/May/105 - http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html - https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 - http://www.securityfocus.com/archive/1/539885/100/0/threaded - http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html - https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415 - http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html - http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html - http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html - http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html - http://www.ubuntu.com/usn/USN-3198-1 - http://seclists.org/fulldisclosure/2017/May/105 - https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403 - http://www.securityfocus.com/archive/1/541104/100/0/threaded - http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html - http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html - http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded - http://www.ubuntu.com/usn/USN-3179-1 - http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en - https://access.redhat.com/errata/RHSA-2019:1245 - https://access.redhat.com/errata/RHSA-2019:2859 - https://access.redhat.com/errata/RHSA-2020:0451 - https://kc.mcafee.com/corporate/index?page=content&id=SB10310 - https://www.oracle.com/security-alerts/cpuapr2020.html - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - https://www.oracle.com/security-alerts/cpujul2020.html - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html - https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - https://www.oracle.com/security-alerts/cpujan2020.html - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - https://sweet32.info/ - http://www.splunk.com/view/SP-CAAAPUE - https://bugzilla.redhat.com/show_bug.cgi?id=1369383 - https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/ - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html - https://access.redhat.com/articles/2548661 - https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue - http://www.splunk.com/view/SP-CAAAPSV - http://www-01.ibm.com/support/docview.wss?uid=swg21995039 - https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633 - https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ - https://www.sigsac.org/ccs/CCS2016/accepted-papers/ - http://www-01.ibm.com/support/docview.wss?uid=swg21991482 - https://www.openssl.org/blog/blog/2016/08/24/sweet32/ - https://access.redhat.com/security/cve/cve-2016-2183 - https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/ - https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 - http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html - https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ - https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008 - http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 - https://www.oracle.com/security-alerts/cpuoct2020.html - https://www.oracle.com/security-alerts/cpuoct2021.html - https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 - https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11527.
CVE ID: CVE-2018-11527 Date Updated: 2024-08-05T08:10:14.864Z Date Published: 2018-05-29T07:00:00 Description: An issue was discovered in CScms v4.1. A Cross-site request forgery (CSRF) vulnerability in plugins/sys/admin/Sys.php allows remote attackers to change the administrator's username and password via /admin.php/sys/editpass_save. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/fanyibo2009/cscms/blob/master/v4.1%20csrf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1454.
CVE ID: CVE-2020-1454 Date Updated: 2024-08-04T06:39:10.390Z Date Published: 2020-07-14T22:54:49 Description: This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server, aka 'Microsoft SharePoint Reflective XSS Vulnerability'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1454 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18344.
CVE ID: CVE-2019-18344 Date Updated: 2024-08-05T01:54:13.306Z Date Published: 2019-10-23T14:36:36 Description: Sourcecodester Online Grading System 1.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the student, instructor, department, room, class, or user page (id or classid parameter). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sevenlayers.com/index.php/262-online-grading-system-1-0-sqli No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0951.
CVE ID: CVE-2009-0951 Date Updated: 2024-08-07T04:57:17.347Z Date Published: 2009-06-02T18:00:00 Description: Heap-based buffer overflow in Apple QuickTime before 7.6.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted FLC compression file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/50887 - http://secunia.com/advisories/35091 - http://support.apple.com/kb/HT3591 - http://www.securitytracker.com/id?1022314 - http://www.vupen.com/english/advisories/2009/1469 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16098 - http://www.securityfocus.com/bid/35161 - http://lists.apple.com/archives/security-announce/2009/Jun/msg00000.html - http://osvdb.org/54878 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10095.
CVE ID: CVE-2019-10095 Date Updated: 2024-08-04T22:10:09.552Z Date Published: 2021-09-02T00:00:00 Description: bash command injection vulnerability in Apache Zeppelin allows an attacker to inject system commands into Spark interpreter settings. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208%40%3Cusers.zeppelin.apache.org%3E - https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208%40%3Cusers.zeppelin.apache.org%3E - http://www.openwall.com/lists/oss-security/2021/09/02/1 - https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208%40%3Cannounce.apache.org%3E - https://lists.apache.org/thread.html/rd56389ba9cab30a6c976b9a4a6df0f85cbe8fba6a60a3cf6e3ba716b%40%3Cusers.zeppelin.apache.org%3E - https://security.gentoo.org/glsa/202311-04 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5519.
CVE ID: CVE-2013-5519 Date Updated: 2024-08-06T17:15:20.936Z Date Published: 2013-10-03T10:00:00 Description: Cross-site scripting (XSS) vulnerability in the management interface on Cisco Wireless LAN Controller (WLC) devices allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuf77810. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/viewAlert.x?alertId=31112 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-5519 - http://www.securityfocus.com/bid/62787 - http://osvdb.org/98083 - http://secunia.com/advisories/55171 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28192.
CVE ID: CVE-2022-28192 Date Updated: 2024-08-03T05:48:37.479Z Date Published: 2022-05-17T19:15:41 Description: NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (nvidia.ko), where it may lead to a use-after-free, which in turn may cause denial of service. This attack is complex to carry out because the attacker needs to have control over freeing some host side resources out of sequence, which requires elevated privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nvidia.custhelp.com/app/answers/detail/a_id/5353 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13080.
CVE ID: CVE-2020-13080 Date Updated: 2022-01-14T16:25:25 Date Published: 2022-01-14T16:25:25 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-9586.
CVE ID: CVE-2018-9586 Date Updated: 2024-09-16T16:58:02.607Z Date Published: 2019-02-12T00:00:00Z Description: In run of InstallPackageTask.java in Android-7.0, Android-7.1.1, Android-7.1.2, Android-8.0, Android-8.1 and Android-9, it is possible that package verification is turned off and remains off due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Android ID: A-116754444. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/106495 - https://source.android.com/security/bulletin/2019-01-01.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-42790.
CVE ID: CVE-2023-42790 Date Updated: 2024-09-17T14:08:06.101Z Date Published: 2024-03-12T15:09:17.594Z Description: A stack-based buffer overflow in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/psirt/FG-IR-23-328 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21014.
CVE ID: CVE-2023-21014 Date Updated: 2024-08-02T09:21:34.116Z Date Published: 2023-03-24T00:00:00 Description: In multiple locations of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-257029326 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2023-03-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2129.
CVE ID: CVE-2015-2129 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.