instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2017-8870.
CVE ID: CVE-2017-8870 Date Updated: 2024-08-05T16:48:22.888Z Date Published: 2017-07-27T18:00:00 Description: Buffer overflow in AudioCoder 0.8.46 allows remote attackers to execute arbitrary code via a crafted .m3u file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/42385/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1401.
CVE ID: CVE-2014-1401 Date Updated: 2024-08-06T09:42:34.969Z Date Published: 2014-02-11T17:00:00 Description: Multiple SQL injection vulnerabilities in AuraCMS 2.3 and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) search parameter to mod/content/content.php or (2) CLIENT_IP, (3) X_FORWARDED_FOR, (4) X_FORWARDED, (5) FORWARDED_FOR, or (6) FORWARDED HTTP header to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/auracms/AuraCMS/commit/790f66ffbc4f23a6e13636fc79d0aa1a7d81e747 - https://github.com/auracms/AuraCMS/commit/4fe9d0d31a32df392f4d6ced8e5c25ed4af19ade - https://exchange.xforce.ibmcloud.com/vulnerabilities/90965 - http://www.exploit-db.com/exploits/31520 - http://www.securityfocus.com/archive/1/530930/100/0/threaded - http://secunia.com/advisories/56804 - http://packetstormsecurity.com/files/125079 - https://www.htbridge.com/advisory/HTB23196 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0357.
CVE ID: CVE-2015-0357 Date Updated: 2024-08-06T04:03:11.085Z Date Published: 2015-04-14T22:00:00 Description: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3040. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html - https://security.gentoo.org/glsa/201504-07 - http://www.securitytracker.com/id/1032105 - http://rhn.redhat.com/errata/RHSA-2015-0813.html - https://helpx.adobe.com/security/products/flash-player/apsb15-06.html - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7043.
CVE ID: CVE-2019-7043 Date Updated: 2024-08-04T20:38:32.857Z Date Published: 2019-05-24T18:15:09 Description: Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-07.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16996.
CVE ID: CVE-2019-16996 Date Updated: 2024-08-05T01:24:48.683Z Date Published: 2019-09-30T12:44:06 Description: In Metinfo 7.0.0beta, a SQL Injection was discovered in app/system/product/admin/product_admin.class.php via the admin/?n=product&c=product_admin&a=dopara&app_type=shop id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/XiaOkuoAi/XiaOkuoAi.github.io/issues/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4846.
CVE ID: CVE-2015-4846 Date Updated: 2024-08-06T06:25:21.952Z Date Published: 2015-10-21T23:00:00 Description: Unspecified vulnerability in the Oracle Applications Manager component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.3, and 12.2.4 allows remote authenticated users to affect confidentiality and integrity via vectors related to SQL Extensions. NOTE: the previous information is from the October 2015 CPU. Oracle has not commented on third-party claims that this issue is a SQL injection vulnerability, which allows remote authenticated users to execute arbitrary SQL commands via a request involving the afamexts.sql SQL extension. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1033877 - http://seclists.org/fulldisclosure/2015/Oct/99 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html - https://erpscan.io/advisories/erpscan-15-026-oracle-e-business-suite-sql-injection-vulnerability/ - http://packetstormsecurity.com/files/134099/Oracle-E-Business-Suite-12.1.3-12.1.4-SQL-Injection.html - http://www.securityfocus.com/bid/77254 - http://www.securityfocus.com/archive/1/536771/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6733.
CVE ID: CVE-2013-6733 Date Updated: 2024-08-06T17:46:22.892Z Date Published: 2013-12-17T11:00:00 Description: Cross-site scripting (XSS) vulnerability in the Web Application in the Classic Meeting Server in IBM Sametime 7.5.1.2 through 8.5.2.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21659419 - https://exchange.xforce.ibmcloud.com/vulnerabilities/89396 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2220.
CVE ID: CVE-2015-2220 Date Updated: 2024-08-06T05:10:14.444Z Date Published: 2015-03-05T16:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in the Ninja Forms plugin before 2.8.9 for WordPress allow (1) remote attackers to inject arbitrary web script or HTML via the ninja_forms_field_1 parameter in a ninja_forms_ajax_submit action to wp-admin/admin-ajax.php or (2) remote administrators to inject arbitrary web script or HTML via the fields[1] parameter to wp-admin/post.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/74857 - http://www.securityfocus.com/archive/1/534687/100/0/threaded - https://wordpress.org/plugins/ninja-forms/changelog/ - http://packetstormsecurity.com/files/130369/WordPress-Ninja-Forms-2.8.8-Cross-Site-Scripting.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32344.
CVE ID: CVE-2022-32344 Date Updated: 2024-08-03T07:39:50.800Z Date Published: 2022-06-14T15:53:36 Description: Hospital's Patient Records Management System v1.0 is vulnerable to SQL Injection via /hprms/classes/Master.php?f=delete_patient. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/hospitals-patient-records-management-system/SQLi-10.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1455.
CVE ID: CVE-2018-1455 Date Updated: 2024-09-16T19:25:00.237Z Date Published: 2018-08-15T15:00:00Z Description: IBM Tivoli Application Dependency Discovery Manager 7.2.2 and 7.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 11029. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/docview.wss?uid=swg22016659 - https://exchange.xforce.ibmcloud.com/vulnerabilities/140090 - http://www.securityfocus.com/bid/105135 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6153.
CVE ID: CVE-2008-6153 Date Updated: 2024-08-07T11:20:25.410Z Date Published: 2009-02-16T17:00:00 Description: SQL injection vulnerability in Photo.asp in Jay Patel Pixel8 Web Photo Album 3.0 allows remote attackers to execute arbitrary SQL commands via the AlbumID parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/33373 - https://www.exploit-db.com/exploits/7627 - http://www.securityfocus.com/bid/33069 - https://exchange.xforce.ibmcloud.com/vulnerabilities/47662 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0180.
CVE ID: CVE-2016-0180 Date Updated: 2024-08-05T22:08:13.345Z Date Published: 2016-05-11T01:00:00 Description: The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 mishandles symbolic links, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Elevation of Privilege Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-060 - http://www.securitytracker.com/id/1035833 - http://www.securityfocus.com/bid/90028 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34152.
CVE ID: CVE-2022-34152 Date Updated: 2024-08-03T08:16:17.170Z Date Published: 2022-11-11T15:48:51.318Z Description: Improper input validation in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC Kits before version TY0070 may allow a privileged user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-3813.
CVE ID: CVE-2019-3813 Date Updated: 2024-09-16T16:23:33.117Z Date Published: 2019-02-04T18:00:00Z Description: Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.debian.org/security/2019/dsa-4375 - https://access.redhat.com/errata/RHSA-2019:0231 - http://www.securityfocus.com/bid/106801 - https://access.redhat.com/errata/RHSA-2019:0457 - https://bugzilla.redhat.com/show_bug.cgi?id=1665371 - https://usn.ubuntu.com/3870-1/ - https://access.redhat.com/errata/RHSA-2019:0232 - https://lists.debian.org/debian-lts-announce/2019/01/msg00026.html - https://security.gentoo.org/glsa/202007-30 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2727.
CVE ID: CVE-2010-2727 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3180.
CVE ID: CVE-2008-3180 Date Updated: 2024-08-07T09:28:41.415Z Date Published: 2008-07-15T18:03:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in upload/file/language_menu.php in ContentNow CMS 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) pageid parameter or (2) PATH_INFO. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/43610 - https://www.exploit-db.com/exploits/6011 - http://www.securityfocus.com/bid/30102 - http://securityreason.com/securityalert/3990 - http://secunia.com/advisories/30888 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39674.
CVE ID: CVE-2023-39674 Date Updated: 2024-08-02T18:18:09.681Z Date Published: 2023-08-18T00:00:00 Description: D-Link DIR-880 A1_FW107WWb08 was discovered to contain a buffer overflow via the function fgets. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dlink.com/en/security-bulletin/ - https://support.dlink.com/ - https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR880%20buffe%20overflow.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-5258.
CVE ID: CVE-2010-5258 Date Updated: 2024-09-17T00:41:56.258Z Date Published: 2012-09-07T10:00:00Z Description: Untrusted search path vulnerability in Adobe Audition 3.0 build 7283.0 allows local users to gain privileges via a Trojan horse Assist.Dll file in the current working directory, as demonstrated by a directory that contains a .ses file. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.corelan.be:8800/index.php/2010/08/25/dll-hijacking-kb-2269637-the-unofficial-list/ - http://secunia.com/advisories/41232 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34172.
CVE ID: CVE-2022-34172 Date Updated: 2024-08-03T08:16:17.202Z Date Published: 2022-06-22T14:40:53 Description: In Jenkins 2.340 through 2.355 (both inclusive) symbol-based icons unescape previously escaped values of 'tooltip' parameters, resulting in a cross-site scripting (XSS) vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7553.
CVE ID: CVE-2016-7553 Date Updated: 2024-08-06T02:04:55.277Z Date Published: 2017-02-27T22:00:00 Description: The buf.pl script before 2.20 in Irssi before 0.8.20 uses weak permissions for the scrollbuffer dump file created between upgrades, which might allow local users to obtain sensitive information from private chat conversations by reading the file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2016/09/26/4 - http://www.openwall.com/lists/oss-security/2016/09/24/1 - https://irssi.org/security/buf_pl_sa_2016.txt - https://github.com/irssi/scripts.irssi.org/commit/f1b1eb154baa684fad5d65bf4dff79c8ded8b65a - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7OM3WHWQ7RIAOZSOZZUM4CUYGKSIAGJJ/ - http://www.securityfocus.com/bid/93155 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1895.
CVE ID: CVE-2013-1895 Date Updated: 2024-08-06T15:20:37.112Z Date Published: 2020-01-28T14:30:24 Description: The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2013/03/26/2 - http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101387.html - http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101382.html - http://www.securityfocus.com/bid/58702 - https://exchange.xforce.ibmcloud.com/vulnerabilities/83039 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1963.
CVE ID: CVE-2019-1963 Date Updated: 2024-09-16T19:20:34.728Z Date Published: 2019-08-28T18:50:15.502235Z Description: A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of Abstract Syntax Notation One (ASN.1)-encoded variables in SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the SNMP daemon on the affected device. A successful exploit could allow the attacker to cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-fxnxos-snmp-dos No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-12508.
CVE ID: CVE-2017-12508 Date Updated: 2024-09-16T20:03:18.489Z Date Published: 2018-02-15T22:00:00Z Description: A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1039152 - http://www.securityfocus.com/bid/100367 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6023.
CVE ID: CVE-2015-6023 Date Updated: 2024-08-06T07:06:35.214Z Date Published: 2017-02-09T15:00:00 Description: ping.cgi in NetCommWireless HSPA 3G10WVE wireless routers with firmware before 3G10WVE-L101-S306ETS-C01_R05 allows remote attackers to bypass intended access restrictions via a direct request. NOTE: this issue can be combined with CVE-2015-6024 to execute arbitrary commands. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/39762/ - http://seclists.org/fulldisclosure/2016/May/18 - http://packetstormsecurity.com/files/136901/NetCommWireless-HSPA-3G10WVE-Authentication-Bypass-Code-Execution.html - http://www.securityfocus.com/archive/1/538297/100/0/threaded - http://seclists.org/fulldisclosure/2016/May/13 - http://www.securityfocus.com/archive/1/538263/100/0/threaded - http://www.securityfocus.com/bid/96383 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2432.
CVE ID: CVE-2011-2432 Date Updated: 2024-08-06T23:00:33.768Z Date Published: 2011-09-15T10:00:00 Description: Buffer overflow in the U3D TIFF Resource in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.adobe.com/support/security/bulletins/apsb11-24.html - http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00013.html - http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00025.html - http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00012.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14031 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5024.
CVE ID: CVE-2008-5024 Date Updated: 2024-08-07T10:40:17.153Z Date Published: 2008-11-13T11:00:00 Description: Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly escape quote characters used for XML processing, which allows remote attackers to conduct XML injection attacks via the default namespace in an E4X document. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2008/3146 - http://www.debian.org/security/2009/dsa-1697 - https://bugzilla.mozilla.org/show_bug.cgi?id=453915 - http://www.debian.org/security/2008/dsa-1671 - http://www.securityfocus.com/bid/32281 - https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html - http://secunia.com/advisories/32713 - http://www.redhat.com/support/errata/RHSA-2008-0977.html - http://www.mandriva.com/security/advisories?name=MDVSA-2008:230 - http://www.vupen.com/english/advisories/2009/0977 - http://secunia.com/advisories/32695 - http://www.redhat.com/support/errata/RHSA-2008-0978.html - http://www.debian.org/security/2008/dsa-1669 - http://secunia.com/advisories/32778 - http://www.redhat.com/support/errata/RHSA-2008-0976.html - https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html - http://secunia.com/advisories/33433 - http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 - http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html - http://secunia.com/advisories/32694 - http://secunia.com/advisories/32721 - http://www.us-cert.gov/cas/techalerts/TA08-319A.html - http://secunia.com/advisories/32853 - http://www.debian.org/security/2009/dsa-1696 - http://www.securitytracker.com/id?1021192 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9063 - http://secunia.com/advisories/32715 - http://secunia.com/advisories/32693 - http://www.mozilla.org/security/announce/2008/mfsa2008-58.html - http://www.mandriva.com/security/advisories?name=MDVSA-2008:228 - http://secunia.com/advisories/32845 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:235 - http://secunia.com/advisories/33434 - http://secunia.com/advisories/32798 - http://secunia.com/advisories/32684 - http://ubuntu.com/usn/usn-667-1 - http://secunia.com/advisories/32714 - http://secunia.com/advisories/34501 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0488.
CVE ID: CVE-2023-0488 Date Updated: 2024-08-02T05:10:56.446Z Date Published: 2023-01-26T00:00:00 Description: Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyload prior to 0.5.0b3.dev42. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a - https://github.com/pyload/pyload/commit/46d75a3087f3237d06530d55998938e2e2bda6bd No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40529.
CVE ID: CVE-2023-40529 Date Updated: 2024-08-02T18:38:49.319Z Date Published: 2024-01-10T22:03:07.433Z Description: This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 17 and iPadOS 17. A person with physical access to a device may be able to use VoiceOver to access private calendar information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213938 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34005.
CVE ID: CVE-2023-34005 Date Updated: 2024-09-30T14:37:43.588Z Date Published: 2023-07-17T14:46:12.815Z Description: Cross-Site Request Forgery (CSRF) vulnerability in Etoile Web Design Front End Users plugin <= 3.2.24 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/front-end-only-users/wordpress-front-end-users-plugin-3-2-24-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4365.
CVE ID: CVE-2013-4365 Date Updated: 2024-08-06T16:38:01.908Z Date Published: 2013-10-17T23:00:00 Description: Heap-based buffer overflow in the fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module before 2.3.9 for the Apache HTTP Server allows remote attackers to have an unspecified impact via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/55197 - http://lists.opensuse.org/opensuse-updates/2013-10/msg00059.html - http://lists.opensuse.org/opensuse-updates/2013-10/msg00055.html - http://www.debian.org/security/2013/dsa-2778 - http://svn.apache.org/viewvc?view=revision&revision=1527362 - http://www.securityfocus.com/bid/62939 - http://lists.opensuse.org/opensuse-updates/2013-11/msg00024.html - http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00011.html - http://www.mail-archive.com/dev%40httpd.apache.org/msg58077.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-47265.
CVE ID: CVE-2023-47265 Date Updated: 2024-08-02T21:09:36.525Z Date Published: 2023-12-21T09:28:09.653Z Description: Apache Airflow, versions 2.6.0 through 2.7.3 has a stored XSS vulnerability that allows a DAG author to add an unbounded and not-sanitized javascript in the parameter description field of the DAG. This Javascript can be executed on the client side of any of the user who looks at the tasks in the browser sandbox. While this issue does not allow to exit the browser sandbox or manipulation of the server-side data - more than the DAG author already has, it allows to modify what the user looking at the DAG details sees in the browser - which opens up all kinds of possibilities of misleading other users. Users of Apache Airflow are recommended to upgrade to version 2.8.0 or newer to mitigate the risk associated with this vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/apache/airflow/pull/35460 - https://lists.apache.org/thread/128f3zl375vb1qv93k82zhnwkpl233pr - http://www.openwall.com/lists/oss-security/2023/12/21/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5945.
CVE ID: CVE-2015-5945 Date Updated: 2024-08-06T07:06:34.997Z Date Published: 2015-10-23T21:00:00 Description: The Sandbox subsystem in Apple OS X before 10.11.1 allows local users to gain privileges via vectors involving NVRAM parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html - https://support.apple.com/HT205375 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-45005.
CVE ID: CVE-2023-45005 Date Updated: 2024-09-13T15:55:38.777Z Date Published: 2023-10-17T09:05:23.248Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Castos Seriously Simple Stats plugin <= 1.5.1 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/seriously-simple-stats/wordpress-seriously-simple-stats-plugin-1-5-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24452.
CVE ID: CVE-2022-24452 Date Updated: 2024-08-03T04:13:55.750Z Date Published: 2022-03-09T17:07:29 Description: HEVC Video Extensions Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24452 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33234.
CVE ID: CVE-2023-33234 Date Updated: 2024-08-02T15:39:35.691Z Date Published: 2023-05-30T10:56:56.139Z Description: Arbitrary code execution in Apache Airflow CNCF Kubernetes provider version 5.0.0 allows user to change xcom sidecar image and resources via Airflow connection. In order to exploit this weakness, a user would already need elevated permissions (Op or Admin) to change the connection object in this manner.  Operators should upgrade to provider version 7.0.0 which has removed the vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/n1vpgl6h2qsdm52o9m2tx1oo86tl4gnq No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3005.
CVE ID: CVE-2022-3005 Date Updated: 2024-08-03T00:53:00.360Z Date Published: 2022-09-20T10:15:26 Description: Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/4b144433-a979-4c4e-a627-659838acc217 - https://github.com/yetiforcecompany/yetiforcecrm/commit/e55886781509fe39951fc7528347696474a17884 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-45483.
CVE ID: CVE-2021-45483 Date Updated: 2024-08-04T04:39:21.042Z Date Published: 2021-12-25T00:03:55 Description: In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::Frame::page, a different vulnerability than CVE-2021-30889. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ChijinZ/security_advisories/tree/master/webkitgtk-2.32.3 - http://www.openwall.com/lists/oss-security/2022/01/21/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-3602.
CVE ID: CVE-2021-3602 Date Updated: 2024-08-03T17:01:08.065Z Date Published: 2022-03-03T18:26:21 Description: An information disclosure flaw was found in Buildah, when building containers using chroot isolation. Running processes in container builds (e.g. Dockerfile RUN commands) can access environment variables from parent and grandparent processes. When run in a container in a CI/CD environment, environment variables may include sensitive information that was shared with the container in order to be used only by Buildah itself (e.g. container registry credentials). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1969264 - https://ubuntu.com/security/CVE-2021-3602 - https://github.com/containers/buildah/security/advisories/GHSA-7638-r9r3-rmjj - https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1332.
CVE ID: CVE-2022-1332 Date Updated: 2024-08-03T00:03:05.448Z Date Published: 2022-04-13T17:06:03 Description: One of the API in Mattermost version 6.4.1 and earlier fails to properly protect the permissions, which allows the authenticated members with restricted custom admin role to bypass the restrictions and view the server logs and server config.json file contents. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mattermost.com/security-updates/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15079.
CVE ID: CVE-2017-15079 Date Updated: 2024-09-16T20:58:03.590Z Date Published: 2017-10-06T18:00:00Z Description: The Smush Image Compression and Optimization plugin before 2.7.6 for WordPress allows directory traversal. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/wp-smushit/#developers - https://wordpress.org/support/topic/file-transversal-bug/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39861.
CVE ID: CVE-2021-39861 Date Updated: 2024-09-17T02:36:53.038Z Date Published: 2021-09-29T15:40:09.348510Z Description: Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb21-55.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4394.
CVE ID: CVE-2023-4394 Date Updated: 2024-08-02T07:24:04.615Z Date Published: 2023-08-17T12:49:14.052Z Description: A use-after-free flaw was found in btrfs_get_dev_args_from_path in fs/btrfs/volumes.c in btrfs file-system in the Linux Kernel. This flaw allows a local attacker with special privileges to cause a system crash or leak internal kernel information No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/security/cve/CVE-2023-4394 - https://bugzilla.redhat.com/show_bug.cgi?id=2219263 - https://patchwork.kernel.org/project/linux-btrfs/patch/20220815151606.3479183-1-r33s3n6@gmail.com/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-0851.
CVE ID: CVE-2012-0851 Date Updated: 2024-08-06T18:38:14.978Z Date Published: 2012-08-20T18:00:00 Description: The ff_h264_decode_seq_parameter_set function in h264_ps.c in libavcodec in FFmpeg before 0.9.1 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted H.264 file, related to the chroma_format_idc value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://ffmpeg.org/trac/ffmpeg/ticket/758 - http://www.ubuntu.com/usn/USN-1479-1 - http://www.openwall.com/lists/oss-security/2012/02/14/4 - http://www.debian.org/security/2012/dsa-2494 - http://libav.org/ - http://www.mandriva.com/security/advisories?name=MDVSA-2013:079 - http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=7fff64e00d886fde11d61958888c82b461cf99b9 - http://ffmpeg.org/security.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/78933 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2598.
CVE ID: CVE-2022-2598 Date Updated: 2024-08-03T00:46:03.472Z Date Published: 2022-08-01T00:00:00 Description: Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/2f08363a-47a2-422d-a7de-ce96a89ad08e - https://github.com/vim/vim/commit/4e677b9c40ccbc5f090971b31dc2fe07bf05541d - https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-3438.
CVE ID: CVE-2021-3438 Date Updated: 2024-08-03T16:53:17.609Z Date Published: 2021-05-20T13:32:49 Description: A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hp.com/us-en/document/ish_3900395-3833905-16 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4961.
CVE ID: CVE-2022-4961 Date Updated: 2024-08-03T01:55:46.201Z Date Published: 2024-01-12T05:00:05.110Z Description: A vulnerability was found in Weitong Mall 1.0.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file platform-shop\src\main\resources\com\platform\dao\OrderDao.xml. The manipulation of the argument sidx/order leads to sql injection. The associated identifier of this vulnerability is VDB-250243. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.250243 - https://vuldb.com/?ctiid.250243 - https://gitee.com/fuyang_lipengjun/platform/issues/I5XC79 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2779.
CVE ID: CVE-2024-2779 Date Updated: 2024-08-01T20:39:08.574Z Date Published: 2024-03-22T01:00:07.154Z Description: A vulnerability was found in Campcodes Online Marriage Registration System 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/application-bwdates-reports-details.php. The manipulation of the argument fromdate leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257613 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.257613 - https://vuldb.com/?ctiid.257613 - https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%204.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-40656.
CVE ID: CVE-2021-40656 Date Updated: 2024-08-04T02:51:06.400Z Date Published: 2022-04-08T15:09:33 Description: libsixel before 1.10 is vulnerable to Buffer Overflow in libsixel/src/quant.c:867. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/libsixel/libsixel/issues/25 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6340.
CVE ID: CVE-2024-6340 Date Updated: 2024-08-01T21:33:05.364Z Date Published: 2024-07-03T07:32:37.632Z Description: The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 4.10.35 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/9ed80507-f3e5-45a8-9498-8cebf97155ff?source=cve - https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/assets/frontend/js/premium-countdown-timer.js#L31 - https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/assets/frontend/js/premium-countdown-timer.js#L113 - https://wordpress.org/plugins/premium-addons-for-elementor/#developers - https://plugins.trac.wordpress.org/changeset/3111117/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9452.
CVE ID: CVE-2014-9452 Date Updated: 2024-08-06T13:47:40.318Z Date Published: 2015-01-02T20:00:00 Description: Directory traversal vulnerability in VDG Security SENSE (formerly DIVA) 2.3.13 allows remote attackers to read arbitrary files via a .. (dot dot) in the default URI to images/. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2014/Dec/76 - http://www.securityfocus.com/bid/71736 - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/99331 - https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-0_VDG_Security_SENSE_Multiple_critical_vulnerabilities_v10.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16303.
CVE ID: CVE-2019-16303 Date Updated: 2024-08-05T01:10:41.654Z Date Published: 2019-09-13T23:43:41 Description: A class generated by the Generator in JHipster before 6.3.0 and JHipster Kotlin through 1.1.0 produces code that uses an insecure source of randomness (apache.commons.lang3 RandomStringUtils). This allows an attacker (if able to obtain their own password reset URL) to compute the value for all other password resets for other accounts, thus allowing privilege escalation or account takeover. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-968c - https://github.com/jhipster/generator-jhipster/issues/10401 - https://github.com/jhipster/generator-jhipster/commit/88448b85fd3e8e49df103f0061359037c2c68ea7 - https://github.com/jhipster/jhipster-kotlin/issues/183 - https://www.jhipster.tech/2019/09/13/jhipster-release-6.3.0.html - https://lists.apache.org/thread.html/r6d243e7e3f25daeb242dacf3def411fba32a9388d3ff84918cb28ddd%40%3Cissues.commons.apache.org%3E - https://lists.apache.org/thread.html/rc87fa35a48b5d70b06af6fb81785ed82e82686eb83307aae6d250dc9%40%3Cissues.commons.apache.org%3E - https://lists.apache.org/thread.html/rc3f00f5d3d2ec0e2381a3b9096d5f5b4d46ec1587ee7e251a3dbb897%40%3Cissues.commons.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38288.
CVE ID: CVE-2023-38288 Date Updated: 2023-08-24T08:10:46.498Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27961.
CVE ID: CVE-2023-27961 Date Updated: 2024-08-02T12:23:30.642Z Date Published: 2023-05-08T00:00:00 Description: Multiple validation issues were addressed with improved input sanitization. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.4, watchOS 9.4, macOS Big Sur 11.7.5. Importing a maliciously crafted calendar invitation may exfiltrate user information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213670 - https://support.apple.com/en-us/HT213676 - https://support.apple.com/en-us/HT213677 - https://support.apple.com/en-us/HT213678 - https://support.apple.com/en-us/HT213675 - https://support.apple.com/en-us/HT213673 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-37211.
CVE ID: CVE-2023-37211 Date Updated: 2024-08-02T17:09:32.968Z Date Published: 2023-07-05T09:00:58.955Z Description: Memory safety bugs present in Firefox 114, Firefox ESR 102.12, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450 - https://www.mozilla.org/security/advisories/mfsa2023-22/ - https://www.mozilla.org/security/advisories/mfsa2023-23/ - https://www.mozilla.org/security/advisories/mfsa2023-24/ - https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html - https://www.debian.org/security/2023/dsa-5450 - https://www.debian.org/security/2023/dsa-5451 - https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-44012.
CVE ID: CVE-2023-44012 Date Updated: 2024-09-23T16:26:27.310Z Date Published: 2023-10-02T00:00:00 Description: Cross Site Scripting vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the helpkey parameter in the Help.aspx component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44012 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33003.
CVE ID: CVE-2022-33003 Date Updated: 2024-08-03T07:54:03.419Z Date Published: 2022-06-24T20:39:45 Description: The watools package in PyPI v0.0.1 to v0.0.8 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://pypi.doubanio.com/simple/request - https://pypi.org/project/watools/ - https://github.com/wateraccounting/watools/issues/5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4741.
CVE ID: CVE-2022-4741 Date Updated: 2024-08-03T01:48:40.295Z Date Published: 2022-12-25T19:47:45.687Z Description: A vulnerability was found in docconv up to 1.2.0 and classified as problematic. This issue affects the function ConvertDocx/ConvertODT/ConvertPages/ConvertXML/XMLToText. The manipulation leads to uncontrolled memory allocation. The attack may be initiated remotely. Upgrading to version 1.2.1 is able to address this issue. The name of the patch is 42bcff666855ab978e67a9041d0cdea552f20301. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216779. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.216779 - https://vuldb.com/?ctiid.216779 - https://github.com/sajari/docconv/pull/111 - https://github.com/sajari/docconv/commit/42bcff666855ab978e67a9041d0cdea552f20301 - https://github.com/sajari/docconv/releases/tag/v1.2.1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6319.
CVE ID: CVE-2016-6319 Date Updated: 2024-08-06T01:29:18.222Z Date Published: 2016-08-19T21:00:00 Description: Cross-site scripting (XSS) vulnerability in app/helpers/form_helper.rb in Foreman before 1.12.2, as used by Remote Execution and possibly other plugins, allows remote attackers to inject arbitrary web script or HTML via the label parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2018:0336 - https://github.com/theforeman/foreman/commit/0f35fe14acf0d0d3b55e9337bc5e2b9640ff2372 - http://projects.theforeman.org/issues/16024 - http://www.securityfocus.com/bid/92429 - http://projects.theforeman.org/issues/16019 - https://bugzilla.redhat.com/show_bug.cgi?id=1365815 - https://theforeman.org/security.html#2016-6319 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19949.
CVE ID: CVE-2019-19949 Date Updated: 2024-08-05T02:32:10.047Z Date Published: 2019-12-24T00:06:26 Description: In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WritePNGImage of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ImageMagick/ImageMagick/issues/1561 - https://lists.debian.org/debian-lts-announce/2019/12/msg00033.html - http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html - https://www.debian.org/security/2020/dsa-4712 - https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html - https://usn.ubuntu.com/4549-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21905.
CVE ID: CVE-2023-21905 Date Updated: 2024-09-16T19:29:33.764Z Date Published: 2023-04-18T19:54:15.282Z Description: Vulnerability in the Oracle Banking Virtual Account Management product of Oracle Financial Services Applications (component: Routing Hub). Supported versions that are affected are 14.5, 14.6 and 14.7. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Banking Virtual Account Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Virtual Account Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Virtual Account Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2023.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4085.
CVE ID: CVE-2012-4085 Date Updated: 2024-08-06T20:28:07.073Z Date Published: 2013-09-24T10:00:00 Description: The Intelligent Platform Management Interface (IPMI) implementation in the Blade Management Controller in Cisco Unified Computing System (UCS) allows remote attackers to enumerate valid usernames by observing IPMI interface responses, aka Bug ID CSCtg20761. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-4085 - http://www.securitytracker.com/id/1029081 - https://exchange.xforce.ibmcloud.com/vulnerabilities/87372 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-24054.
CVE ID: CVE-2020-24054 Date Updated: 2024-08-04T15:05:11.831Z Date Published: 2020-08-21T14:28:06 Description: The administration console of the Moog EXO Series EXVF5C-2 and EXVP7C2-3 units features a 'statusbroadcast' command that can spawn a given process repeatedly at a certain time interval as 'root'. One of the limitations of this feature is that it only takes a path to a binary without arguments; however, this can be circumvented using special shell variables, such as '${IFS}'. As a result, an attacker can execute arbitrary commands as 'root' on the units. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ioactive.com/moog-exo-series-multiple-vulnerabilities/ - https://ioac.tv/3hy1xu6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-5054.
CVE ID: CVE-2009-5054 Date Updated: 2024-09-17T01:35:52.992Z Date Published: 2011-02-03T16:00:00Z Description: Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24191.
CVE ID: CVE-2022-24191 Date Updated: 2024-08-03T04:07:01.496Z Date Published: 2022-04-04T10:33:45 Description: In HTMLDOC 1.9.14, an infinite loop in the gif_read_lzw function can lead to a pointer arbitrarily pointing to heap memory and resulting in a buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/michaelrsweet/htmldoc/issues/470 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RPDZLHOMPSA2LBXXFTZ5UADZWGYYWH7/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-8294.
CVE ID: CVE-2017-8294 Date Updated: 2024-08-05T16:34:21.679Z Date Published: 2017-04-27T14:00:00 Description: libyara/re.c in the regex component in YARA 3.5.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted rule that is mishandled in the yr_re_exec function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/98072 - https://github.com/VirusTotal/yara/issues/646 - https://github.com/VirusTotal/yara/commit/83d799804648c2a0895d40a19835d9b757c6fa4e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-23352.
CVE ID: CVE-2022-23352 Date Updated: 2024-08-03T03:36:20.407Z Date Published: 2022-03-21T19:35:48 Description: An issue in BigAnt Software BigAnt Server v5.6.06 can lead to a Denial of Service (DoS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://bigant.com - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23352 - https://www.bigantsoft.com/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1120.
CVE ID: CVE-2018-1120 Date Updated: 2024-08-05T03:51:48.863Z Date Published: 2018-06-20T13:00:00 Description: A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/<pid>/cmdline (or /proc/<pid>/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://usn.ubuntu.com/3752-2/ - https://access.redhat.com/errata/RHSA-2018:3083 - http://www.securityfocus.com/bid/104229 - https://usn.ubuntu.com/3752-3/ - https://security.gentoo.org/glsa/201805-14 - https://www.exploit-db.com/exploits/44806/ - https://usn.ubuntu.com/3910-1/ - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f7ccc2ccc2e70c6054685f5e3522efa81556830 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1120 - https://usn.ubuntu.com/3910-2/ - https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html - https://access.redhat.com/errata/RHSA-2018:2948 - http://seclists.org/oss-sec/2018/q2/122 - https://usn.ubuntu.com/3752-1/ - https://access.redhat.com/errata/RHSA-2018:3096 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12105.
CVE ID: CVE-2019-12105 Date Updated: 2024-08-04T23:10:30.578Z Date Published: 2019-09-10T16:18:27 Description: In Supervisor through 4.0.2, an unauthenticated user can read log files or restart a service. Note: The maintainer responded that the affected component, inet_http_server, is not enabled by default but if the user enables it and does not set a password, Supervisor logs a warning message. The maintainer indicated the ability to run an open server will not be removed but an additional warning was added to the documentation No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Supervisor/supervisor/commit/4e334d9cf2a1daff685893e35e72398437df3dcb - https://github.com/Supervisor/supervisor/issues/1245 - http://supervisord.org/configuration.html#inet-http-server-section-settings No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3770.
CVE ID: CVE-2012-3770 Date Updated: 2023-09-14T18:40:22.706Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42331.
CVE ID: CVE-2021-42331 Date Updated: 2024-09-17T01:56:36.675Z Date Published: 2021-10-15T12:10:32.855088Z Description: The “Study Edit” function of ShinHer StudyOnline System does not perform permission control. After logging in with user’s privilege, remote attackers can access and edit other users’ tutorial schedule by crafting URL parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.twcert.org.tw/tw/cp-132-5201-dc534-1.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-24438.
CVE ID: CVE-2020-24438 Date Updated: 2024-09-16T16:17:57.147Z Date Published: 2020-11-05T19:32:30.948147Z Description: Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a use-after-free vulnerability that could result in a memory address leak. Exploitation of this issue requires user interaction in that a victim must open a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb20-67.html - https://www.zerodayinitiative.com/advisories/ZDI-20-1357/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4071.
CVE ID: CVE-2010-4071 Date Updated: 2024-09-16T17:58:40.192Z Date Published: 2011-01-20T18:00:00Z Description: Cross-site scripting (XSS) vulnerability in AgentTicketZoom in OTRS 2.4.x before 2.4.9, when RichText is enabled, allows remote attackers to inject arbitrary web script or HTML via JavaScript in an HTML e-mail. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.osvdb.org/68882 - http://secunia.com/advisories/41978 - http://bugs.gentoo.org/342687 - http://otrs.org/advisory/OSA-2010-03-en/ - http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html - http://www.vuxml.org/freebsd/96e776c7-e75c-11df-8f26-00151735203a.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8958.
CVE ID: CVE-2020-8958 Date Updated: 2024-08-04T10:19:18.184Z Date Published: 2020-07-15T20:13:32 Description: Guangzhou 1GE ONU V2801RW 1.9.1-181203 through 2.9.0-181024 and V2804RGW 1.9.1-181203 through 2.9.0-181024 devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the boaform/admin/formPing Dest IP Address field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.gpononu.com/dual-mode-onu/1GE-Router-WiFi-ONU.html - https://www.gpononu.com/gpon-ont/4ge-epon-onu-v2804ew.html - https://github.com/qurbat/gpon - https://www.karansaini.com/os-command-injection-v-sol/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7138.
CVE ID: CVE-2019-7138 Date Updated: 2024-08-04T20:38:33.427Z Date Published: 2019-05-23T15:30:12 Description: Adobe Bridge CC versions 9.0.2 have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/bridge/apsb19-25.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-7749.
CVE ID: CVE-2024-7749 Date Updated: 2024-08-14T13:40:47.761Z Date Published: 2024-08-13T22:00:05.975Z Description: A vulnerability, which was classified as problematic, was found in SourceCodester Accounts Manager App 1.0. Affected is an unknown function of the file /endpoint/add-account.php. The manipulation of the argument account_name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.274368 - https://vuldb.com/?ctiid.274368 - https://vuldb.com/?submit.389359 - https://github.com/joinia/webray.com.cn/blob/main/Accounts-Manager-App/Accounts-Manager-Appxss.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-20675.
CVE ID: CVE-2024-20675 Date Updated: 2024-08-01T21:59:42.767Z Date Published: 2024-01-11T21:12:16.351Z Description: Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20675 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4762.
CVE ID: CVE-2018-4762 Date Updated: 2023-09-14T18:43:21.540Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-30921.
CVE ID: CVE-2024-30921 Date Updated: 2024-08-02T01:39:00.943Z Date Published: 2024-04-18T00:00:00 Description: Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the photo.php component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chocapikk.com/posts/2024/derbynet-vulnerabilities/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32893.
CVE ID: CVE-2022-32893 Date Updated: 2024-08-03T07:54:03.184Z Date Published: 2022-08-24T00:00:00 Description: An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213414 - https://support.apple.com/en-us/HT213412 - https://support.apple.com/en-us/HT213413 - http://www.openwall.com/lists/oss-security/2022/08/25/5 - http://www.openwall.com/lists/oss-security/2022/08/26/2 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/ - https://www.debian.org/security/2022/dsa-5220 - https://www.debian.org/security/2022/dsa-5219 - http://www.openwall.com/lists/oss-security/2022/08/29/1 - http://www.openwall.com/lists/oss-security/2022/08/29/2 - https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html - https://security.gentoo.org/glsa/202208-39 - http://seclists.org/fulldisclosure/2022/Aug/16 - http://www.openwall.com/lists/oss-security/2022/09/02/10 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/ - http://www.openwall.com/lists/oss-security/2022/09/13/1 - http://seclists.org/fulldisclosure/2022/Oct/49 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4105.
CVE ID: CVE-2018-4105 Date Updated: 2024-08-05T05:04:29.809Z Date Published: 2018-04-03T06:00:00 Description: An issue was discovered in certain Apple products. macOS before 10.13.4 is affected. The issue involves the "APFS" component. It allows attackers to trigger truncation of an APFS volume password via an unspecified injection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT208692 - http://www.securityfocus.com/bid/103582 - http://www.securitytracker.com/id/1040608 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-22955.
CVE ID: CVE-2024-22955 Date Updated: 2024-08-01T22:51:11.239Z Date Published: 2024-01-19T00:00:00 Description: swftools 0.9.2 was discovered to contain a stack-buffer-underflow vulnerability via the function parseExpression at swftools/src/swfc.c:2576. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/matthiaskramm/swftools/issues/207 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2270.
CVE ID: CVE-2009-2270 Date Updated: 2024-08-07T05:44:55.592Z Date Published: 2009-07-01T12:26:00 Description: Unrestricted file upload vulnerability in member/uploads_edit.php in dedecms 5.3 allows remote attackers to execute arbitrary code by uploading a file with a double extension in the filename, then accessing this file via unspecified vectors, as demonstrated by a .jpg.php filename. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/504653/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18436.
CVE ID: CVE-2018-18436 Date Updated: 2024-09-16T18:29:07.094Z Date Published: 2018-10-17T05:00:00Z Description: JTBC(PHP) 3.0 allows CSRF for creating an account via the console/account/manage.php?type=action&action=add URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/w3irdo001/demo/blob/master/1.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4801.
CVE ID: CVE-2023-4801 Date Updated: 2024-09-25T17:38:58.900Z Date Published: 2023-09-13T15:14:36.165Z Description: An improper certification validation vulnerability in the Insider Threat Management (ITM) Agent for MacOS could be used by an anonymous actor on an adjacent network to establish a man-in-the-middle position between the agent and the ITM server after the agent has registered. All versions prior to 7.14.3.69 are affected. Agents for Windows, Linux, and Cloud are unaffected. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-006 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27635.
CVE ID: CVE-2023-27635 Date Updated: 2024-08-02T12:16:36.748Z Date Published: 2023-03-05T00:00:00 Description: debmany in debian-goodies 0.88.1 allows attackers to execute arbitrary shell commands (because of an eval call) via a crafted .deb file. (The path is shown to the user before execution.) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.debian.org/1031267 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5078.
CVE ID: CVE-2008-5078 Date Updated: 2024-08-07T10:40:17.170Z Date Published: 2008-12-19T17:00:00 Description: Multiple buffer overflows in the (1) recognize_eps_file function (src/psgen.c) and (2) tilde_subst function (src/util.c) in GNU enscript 1.6.1, and possibly earlier, might allow remote attackers to execute arbitrary code via an epsf escape sequence with a long filename. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/47680 - http://support.avaya.com/elmodocs2/security/ASA-2008-504.htm - http://secunia.com/advisories/33181 - http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html - http://www.redhat.com/support/errata/RHSA-2008-1021.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11807 - http://www.securitytracker.com/id?1021401 - https://bugzilla.redhat.com/show_bug.cgi?id=473958 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3223.
CVE ID: CVE-2015-3223 Date Updated: 2024-08-06T05:39:32.055Z Date Published: 2015-12-29T22:00:00 Description: The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop) via crafted packets. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1290287 - http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html - http://www.ubuntu.com/usn/USN-2855-2 - https://www.samba.org/samba/security/CVE-2015-3223.html - http://www.ubuntu.com/usn/USN-2856-1 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html - http://www.securityfocus.com/bid/79731 - https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=ec504dbf69636a554add1f3d5703dd6c3ad450b8 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html - http://www.securitytracker.com/id/1034493 - http://www.debian.org/security/2016/dsa-3433 - https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=aa6c27148b9d3f8c1e4fdd5dd46bfecbbd0ca465 - https://security.gentoo.org/glsa/201612-47 - http://www.ubuntu.com/usn/USN-2855-1 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13547.
CVE ID: CVE-2020-13547 Date Updated: 2024-08-04T12:18:18.297Z Date Published: 2020-12-22T18:59:28 Description: A type confusion vulnerability exists in the JavaScript engine of Foxit Software’s Foxit PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger an improper use of an object, resulting in memory corruption and arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1165 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3027.
CVE ID: CVE-2016-3027 Date Updated: 2024-08-05T23:40:15.158Z Date Published: 2017-02-01T20:00:00 Description: IBM Security Access Manager for Web is vulnerable to a denial of service, caused by an XML External Entity Injection (XXE) error when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume all available memory resources. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=swg21994440 - http://www.securityfocus.com/bid/96127 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29511.
CVE ID: CVE-2021-29511 Date Updated: 2024-08-03T22:11:05.441Z Date Published: 2021-05-12T17:15:11 Description: evm is a pure Rust implementation of Ethereum Virtual Machine. Prior to the patch, when executing specific EVM opcodes related to memory operations that use `evm_core::Memory::copy_large`, the `evm` crate can over-allocate memory when it is not needed, making it possible for an attacker to perform denial-of-service attack. The flaw was corrected in commit `19ade85`. Users should upgrade to `==0.21.1, ==0.23.1, ==0.24.1, ==0.25.1, >=0.26.1`. There are no workarounds. Please upgrade your `evm` crate version. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/rust-blockchain/evm/security/advisories/GHSA-4jwq-572w-4388 - https://github.com/rust-blockchain/evm/commit/19ade858c430ab13eb562764a870ac9f8506f8dd - https://crates.io/crates/evm No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6126.
CVE ID: CVE-2024-6126 Date Updated: 2024-09-17T10:42:03.908Z Date Published: 2024-07-03T14:51:17.880Z Description: A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/security/cve/CVE-2024-6126 - https://bugzilla.redhat.com/show_bug.cgi?id=2292897 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29977.
CVE ID: CVE-2021-29977 Date Updated: 2024-08-03T22:24:57.552Z Date Published: 2021-08-05T19:46:01 Description: Mozilla developers reported memory safety bugs present in Firefox 89. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 90. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2021-28/ - https://bugzilla.mozilla.org/buglist.cgi?bug_id=1665836%2C1686138%2C1704316%2C1706314%2C1709931%2C1712084%2C1712357%2C1714066 - https://security.gentoo.org/glsa/202202-03 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26495.
CVE ID: CVE-2022-26495 Date Updated: 2024-08-03T05:03:32.903Z Date Published: 2022-03-06T00:00:00 Description: In nbd-server in nbd before 3.24, there is an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name, resulting in a write to a dangling pointer. This issue exists for the NBD_OPT_INFO, NBD_OPT_GO, and NBD_OPT_EXPORT_NAME messages. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.debian.org/nbd/2022/01/msg00037.html - https://sourceforge.net/projects/nbd/files/nbd/ - https://lists.debian.org/debian-lts-announce/2022/03/msg00014.html - https://www.debian.org/security/2022/dsa-5100 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZHR73XMAJTCFGKUZRXVTZKCK2X3IFNA/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU5JFD4PEJED72TZLZ5R2Q2SFXICU5I5/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2UPX62BIWOOHSACGUDB7E3O4URNN37F/ - https://security.gentoo.org/glsa/202402-10 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1000255.
CVE ID: CVE-2017-1000255 Date Updated: 2024-08-05T22:00:39.695Z Date Published: 2017-10-30T20:00:00 Description: On Linux running on PowerPC hardware (Power8 or later) a user process can craft a signal frame and then do a sigreturn so that the kernel will take an exception (interrupt), and use the r1 value *from the signal frame* as the kernel stack pointer. As part of the exception entry the content of the signal frame is written to the kernel stack, allowing an attacker to overwrite arbitrary locations with arbitrary values. The exception handling does produce an oops, and a panic if panic_on_oops=1, but only after kernel memory has been over written. This flaw was introduced in commit: "5d176f751ee3 (powerpc: tm: Enable transactional memory (TM) lazily for userspace)" which was merged upstream into v4.9-rc1. Please note that kernels built with CONFIG_PPC_TRANSACTIONAL_MEM=n are not vulnerable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2018:0654 - https://access.redhat.com/security/cve/CVE-2017-1000255 - http://www.securityfocus.com/bid/101264 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-21253.
CVE ID: CVE-2018-21253 Date Updated: 2024-08-05T12:26:39.550Z Date Published: 2020-06-19T16:45:02 Description: An issue was discovered in Mattermost Server before 5.1, 5.0.2, and 4.10.2. An attacker could use the invite_people slash command to invite a non-permitted user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mattermost.com/security-updates/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4493.
CVE ID: CVE-2013-4493 Date Updated: 2022-06-30T20:29:03 Date Published: 2022-06-30T20:29:03 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21980.
CVE ID: CVE-2021-21980 Date Updated: 2024-08-03T18:30:23.351Z Date Published: 2021-11-24T16:32:43 Description: The vSphere Web Client (FLEX/Flash) contains an unauthorized arbitrary file read vulnerability. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vmware.com/security/advisories/VMSA-2021-0027.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15947.
CVE ID: CVE-2019-15947 Date Updated: 2024-08-05T01:03:32.586Z Date Published: 2019-09-05T16:25:23 Description: In Bitcoin Core 0.18.0, bitcoin-qt stores wallet.dat data unencrypted in memory. Upon a crash, it may dump a core file. If a user were to mishandle a core file, an attacker can reconstruct the user's wallet.dat file, including their private keys, via a grep "6231 0500" command. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/oxagast/50a121b2df32186e0c48411859d5861b - https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2019-15947 - https://github.com/bitcoin/bitcoin/issues/16824 - https://security.gentoo.org/glsa/202009-18 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1566
The MITRE ATT&CK technique T1566: Phishing is related to the vulnerability CVE-CVE-2018-15782. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as exploitation_technique.
Provide detailed information about CVE-2019-7038.
CVE ID: CVE-2019-7038 Date Updated: 2024-08-04T20:38:32.594Z Date Published: 2019-05-24T18:12:00 Description: Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-07.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.