instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2021-39876.
CVE ID: CVE-2021-39876 Date Updated: 2024-08-04T02:20:33.669Z Date Published: 2022-03-28T18:53:09 Description: In all versions of GitLab CE/EE since version 11.3, the endpoint for auto-completing Assignee discloses the members of private groups. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab/-/issues/29683 - https://hackerone.com/reports/627507 - https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39876.json No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16216.
CVE ID: CVE-2019-16216 Date Updated: 2024-08-05T01:10:41.549Z Date Published: 2019-09-18T11:08:09 Description: Zulip server before 2.0.5 incompletely validated the MIME types of uploaded files. A user who is logged into the server could upload files of certain types to mount a stored cross-site scripting attack on other logged-in users. On a Zulip server using the default local uploads backend, the attack is only effective against browsers lacking support for Content-Security-Policy such as Internet Explorer 11. On a Zulip server using the S3 uploads backend, the attack is confined to the origin of the configured S3 uploads hostname and cannot reach the Zulip server itself. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.zulip.org/2019/09/11/zulip-server-2-0-5-security-release/ - https://github.com/zulip/zulip/commit/1195841dfb9aa26b3b0dabc6f05d72e4af25be3e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39215.
CVE ID: CVE-2021-39215 Date Updated: 2024-08-04T01:58:18.219Z Date Published: 2021-09-15T17:20:11 Description: Jitsi Meet is an open source video conferencing application. In versions prior to 2.0.5963, a Prosody module allows the use of symmetrical algorithms to validate JSON web tokens. This means that tokens generated by arbitrary sources can be used to gain authorization to protected rooms. This issue is fixed in Jitsi Meet 2.0.5963. There are no known workarounds aside from updating. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jitsi/jitsi-meet/security/advisories/GHSA-45ff-37jm-xjfx - https://github.com/jitsi/jitsi-meet/pull/9319 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0841.
CVE ID: CVE-2008-0841 Date Updated: 2024-08-07T08:01:39.317Z Date Published: 2008-02-20T21:00:00 Description: SQL injection vulnerability in index.php in the Giorgio Nordo Ricette (com_ricette) 1.0 component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/27834 - https://www.exploit-db.com/exploits/5133 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35449.
CVE ID: CVE-2022-35449 Date Updated: 2024-08-03T09:36:44.343Z Date Published: 2022-08-16T20:12:35 Description: OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b0466. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cvjark.github.io/2022/07/06/CVE-2022-33047/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-47714.
CVE ID: CVE-2023-47714 Date Updated: 2024-08-02T21:16:43.653Z Date Published: 2024-04-12T12:17:19.660Z Description: IBM Sterling File Gateway 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 271531. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7148016 - https://exchange.xforce.ibmcloud.com/vulnerabilities/271531 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-31369.
CVE ID: CVE-2024-31369 Date Updated: 2024-08-02T01:52:56.858Z Date Published: 2024-04-09T08:28:00.839Z Description: Cross-Site Request Forgery (CSRF) vulnerability in PenciDesign Soledad.This issue affects Soledad: from n/a through 8.4.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/soledad/wordpress-soledad-theme-8-4-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15585.
CVE ID: CVE-2019-15585 Date Updated: 2024-08-05T00:49:13.654Z Date Published: 2020-01-28T02:21:16 Description: Improper authentication exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE) in the GitLab SAML integration had a validation issue that permitted an attacker to takeover another user's account. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://about.gitlab.com/blog/2019/09/30/security-release-gitlab-12-dot-3-dot-2-released/ - https://hackerone.com/reports/471323 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46537.
CVE ID: CVE-2021-46537 Date Updated: 2024-08-04T05:10:35.090Z Date Published: 2022-01-27T20:22:26 Description: Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x9a30e. This vulnerability can lead to a Denial of Service (DoS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/cesanta/mjs/issues/212 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33154.
CVE ID: CVE-2021-33154 Date Updated: 2024-02-23T21:06:36.430Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27820.
CVE ID: CVE-2024-27820 Date Updated: 2024-08-02T00:41:55.470Z Date Published: 2024-06-10T20:56:43.282Z Description: The issue was addressed with improved memory handling. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing web content may lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT214101 - https://support.apple.com/en-us/HT214100 - https://support.apple.com/en-us/HT214106 - https://support.apple.com/en-us/HT214108 - https://support.apple.com/en-us/HT214104 - https://support.apple.com/en-us/HT214103 - https://support.apple.com/en-us/HT214102 - http://seclists.org/fulldisclosure/2024/Jun/5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3743.
CVE ID: CVE-2012-3743 Date Updated: 2024-08-06T20:13:51.781Z Date Published: 2012-09-20T21:00:00 Description: The System Logs implementation in Apple iOS before 6 does not restrict /var/log access by sandboxed apps, which allows remote attackers to obtain sensitive information via a crafted app that reads log files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html - http://support.apple.com/kb/HT5503 - https://exchange.xforce.ibmcloud.com/vulnerabilities/78718 - http://osvdb.org/85621 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9247.
CVE ID: CVE-2020-9247 Date Updated: 2024-08-04T10:19:20.138Z Date Published: 2020-12-07T12:49:00 Description: There is a buffer overflow vulnerability in several Huawei products. The system does not sufficiently validate certain configuration parameter which is passed from user that would cause buffer overflow. The attacker should trick the user into installing and running a malicious application with a high privilege, successful exploit may cause code execution. Affected product include Huawei HONOR 20 PRO, Mate 20, Mate 20 Pro, Mate 20 X, P30, P30 Pro, Hima-L29C, Laya-AL00EP, Princeton-AL10B, Tony-AL00B, Yale-L61A, Yale-TL00B and YaleP-AL10B. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200729-03-smartphone-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15418.
CVE ID: CVE-2019-15418 Date Updated: 2024-08-05T00:49:12.191Z Date Published: 2019-11-14T16:26:28 Description: The Asus ASUS_X00K_1 Android device with a build fingerprint of asus/CN_X00K/ASUS_X00K_1:7.0/NRD90M/CN_X00K-14.01.1711.27-20180420:user/release-keys contains a pre-installed app with a package name of com.lovelyfont.defcontainer app (versionCode=5, versionName=5.0.1) that allows unauthorized command execution via a confused deputy attack. This capability can be accessed by any app co-located on the device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.kryptowire.com/android-firmware-2019/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12380.
CVE ID: CVE-2019-12380 Date Updated: 2024-08-04T23:17:39.987Z Date Published: 2019-05-28T02:05:08 Description: **DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e - http://www.securityfocus.com/bid/108477 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/ - http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html - http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html - http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html - https://security.netapp.com/advisory/ntap-20190710-0002/ - https://usn.ubuntu.com/4427-1/ - https://usn.ubuntu.com/4414-1/ - https://usn.ubuntu.com/4439-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41075.
CVE ID: CVE-2023-41075 Date Updated: 2024-08-26T20:09:19.352Z Date Published: 2024-01-10T22:03:36.440Z Description: A type confusion issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.7.5, macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.4. An app may be able to execute arbitrary code with kernel privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213670 - https://support.apple.com/en-us/HT213676 - https://support.apple.com/en-us/HT213677 - https://support.apple.com/en-us/HT213675 - https://support.apple.com/en-us/HT213673 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7089.
CVE ID: CVE-2018-7089 Date Updated: 2020-08-17T14:10:15 Date Published: 2020-08-17T14:10:15 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-13869.
CVE ID: CVE-2017-13869 Date Updated: 2024-08-05T19:13:41.361Z Date Published: 2017-12-25T21:00:00 Description: An issue was discovered in certain Apple products. iOS before 11.2 is affected. macOS before 10.13.2 is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT208331 - https://support.apple.com/HT208327 - https://www.exploit-db.com/exploits/43319/ - https://support.apple.com/HT208325 - http://www.securitytracker.com/id/1039966 - http://www.securitytracker.com/id/1039953 - https://support.apple.com/HT208334 - http://www.securitytracker.com/id/1039952 - http://www.securityfocus.com/bid/102100 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1071.
CVE ID: CVE-2011-1071 Date Updated: 2024-08-06T22:14:27.827Z Date Published: 2011-04-08T15:00:00 Description: The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/46563 - http://securityreason.com/securityalert/8175 - https://bugzilla.redhat.com/show_bug.cgi?id=681054 - http://www.securityfocus.com/archive/1/520102/100/0/threaded - http://secunia.com/advisories/46397 - http://www.redhat.com/support/errata/RHSA-2011-0412.html - http://www.vupen.com/english/advisories/2011/0863 - http://bugs.debian.org/615120 - http://secunia.com/advisories/43989 - http://securitytracker.com/id?1025290 - http://sourceware.org/bugzilla/show_bug.cgi?id=11883 - http://secunia.com/advisories/43492 - http://openwall.com/lists/oss-security/2011/02/26/3 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853 - http://openwall.com/lists/oss-security/2011/02/28/11 - http://seclists.org/fulldisclosure/2011/Feb/635 - http://seclists.org/fulldisclosure/2011/Feb/644 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:178 - http://secunia.com/advisories/43830 - http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6 - http://www.redhat.com/support/errata/RHSA-2011-0413.html - http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html - http://www.vmware.com/security/advisories/VMSA-2011-0012.html - http://openwall.com/lists/oss-security/2011/02/28/15 - http://code.google.com/p/chromium/issues/detail?id=48733 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4814.
CVE ID: CVE-2018-4814 Date Updated: 2023-09-14T18:43:42.245Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5597.
CVE ID: CVE-2013-5597 Date Updated: 2024-08-06T17:15:21.584Z Date Published: 2013-10-30T10:00:00 Description: Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mozilla.org/security/announce/2013/mfsa2013-98.html - http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html - https://bugzilla.mozilla.org/show_bug.cgi?id=918864 - https://security.gentoo.org/glsa/201504-01 - http://rhn.redhat.com/errata/RHSA-2013-1480.html - http://rhn.redhat.com/errata/RHSA-2013-1476.html - http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19277 - http://www.debian.org/security/2013/dsa-2788 - http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html - http://www.debian.org/security/2013/dsa-2797 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-43346.
CVE ID: CVE-2023-43346 Date Updated: 2024-09-12T14:59:50.799Z Date Published: 2023-10-20T00:00:00 Description: Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Backend - Dashboard parameter in the Languages Menu component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/sromanhu/Quick-CMS-Stored-XSS---Languages-Backend - https://github.com/sromanhu/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28445.
CVE ID: CVE-2022-28445 Date Updated: 2024-08-03T05:56:15.460Z Date Published: 2022-04-21T19:04:50 Description: KiteCMS v1.1.1 was discovered to contain an arbitrary file read vulnerability via the background management module. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/k0xx11/bug_report/blob/main/kitecms/Arbitrary-file-reading-1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-42538.
CVE ID: CVE-2022-42538 Date Updated: 2024-08-03T13:10:41.253Z Date Published: 2023-11-29T21:29:46.455Z Description: Elevation of privilege No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/docs/security/bulletin/chromecast/2023-07-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39479.
CVE ID: CVE-2024-39479 Date Updated: 2024-08-02T04:26:15.833Z Date Published: 2024-07-05T06:55:08.597Z Description: In the Linux kernel, the following vulnerability has been resolved: drm/i915/hwmon: Get rid of devm When both hwmon and hwmon drvdata (on which hwmon depends) are device managed resources, the expectation, on device unbind, is that hwmon will be released before drvdata. However, in i915 there are two separate code paths, which both release either drvdata or hwmon and either can be released before the other. These code paths (for device unbind) are as follows (see also the bug referenced below): Call Trace: release_nodes+0x11/0x70 devres_release_group+0xb2/0x110 component_unbind_all+0x8d/0xa0 component_del+0xa5/0x140 intel_pxp_tee_component_fini+0x29/0x40 [i915] intel_pxp_fini+0x33/0x80 [i915] i915_driver_remove+0x4c/0x120 [i915] i915_pci_remove+0x19/0x30 [i915] pci_device_remove+0x32/0xa0 device_release_driver_internal+0x19c/0x200 unbind_store+0x9c/0xb0 and Call Trace: release_nodes+0x11/0x70 devres_release_all+0x8a/0xc0 device_unbind_cleanup+0x9/0x70 device_release_driver_internal+0x1c1/0x200 unbind_store+0x9c/0xb0 This means that in i915, if use devm, we cannot gurantee that hwmon will always be released before drvdata. Which means that we have a uaf if hwmon sysfs is accessed when drvdata has been released but hwmon hasn't. The only way out of this seems to be do get rid of devm_ and release/free everything explicitly during device unbind. v2: Change commit message and other minor code changes v3: Cleanup from i915_hwmon_register on error (Armin Wolf) v4: Eliminate potential static analyzer warning (Rodrigo) Eliminate fetch_and_zero (Jani) v5: Restore previous logic for ddat_gt->hwmon_dev error return (Andi) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/cfa73607eb21a4ce1d6294a2c5733628897b48a2 - https://git.kernel.org/stable/c/ce5a22d22db691d14516c3b8fdbf69139eb2ea8f - https://git.kernel.org/stable/c/5bc9de065b8bb9b8dd8799ecb4592d0403b54281 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4150.
CVE ID: CVE-2019-4150 Date Updated: 2024-09-17T00:56:34.677Z Date Published: 2019-06-25T15:45:29.935158Z Description: IBM Security Access Manager 9.0.1 through 9.0.6 does not validate, or incorrectly validates, a certificate which could allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. IBM X-Force ID: 158510. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/docview.wss?uid=ibm10888379 - https://exchange.xforce.ibmcloud.com/vulnerabilities/158510 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-36888.
CVE ID: CVE-2021-36888 Date Updated: 2024-09-16T17:14:36.693Z Date Published: 2021-12-15T18:06:58.217839Z Description: Unauthenticated Arbitrary Options Update vulnerability leading to full website compromise discovered in Image Hover Effects Ultimate (versions <= 9.6.1) WordPress plugin. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/image-hover-effects-ultimate/#developers - https://patchstack.com/database/vulnerability/image-hover-effects-ultimate/wordpress-image-hover-effects-ultimate-plugin-9-6-1-unauthenticated-arbitrary-options-update-leading-to-full-website-compromise No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9610.
CVE ID: CVE-2019-9610 Date Updated: 2024-09-16T18:18:56.872Z Date Published: 2019-03-06T22:00:00Z Description: An issue was discovered in OFCMS before 1.1.3. It has admin/cms/template/getTemplates.html?res_path=res&up_dir=../ directory traversal, related to the getTemplates function in TemplateController.java. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.seebug.org/vuldb/ssvid-97838 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10649.
CVE ID: CVE-2018-10649 Date Updated: 2024-08-05T07:46:46.459Z Date Published: 2018-05-23T17:00:00 Description: There is a Cross-Site Scripting Vulnerability in Citrix XenMobile Server 10.7 before RP3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.citrix.com/article/CTX234879 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-29323.
CVE ID: CVE-2023-29323 Date Updated: 2024-08-02T14:07:46.102Z Date Published: 2023-04-04T00:00:00 Description: ascii_load_sockaddr in smtpd in OpenBSD before 7.1 errata 024 and 7.2 before errata 020, and OpenSMTPD Portable before 7.0.0-portable commit f748277, can abort upon a connection from a local, scoped IPv6 address. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/020_smtpd.patch.sig - https://ftp.openbsd.org/pub/OpenBSD/patches/7.1/common/024_smtpd.patch.sig - https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/smtpd/envelope.c.diff?r1=1.49&r2=1.49.4.1&f=h - https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/smtpd/envelope.c.diff?r1=1.50&r2=1.50.4.1&f=h - https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/smtpd/envelope.c.diff?r1=1.50&r2=1.51&f=h - https://github.com/OpenSMTPD/OpenSMTPD/commit/41d0eae481f538956b1f1fbadfb535043454061f - https://github.com/openbsd/src/commit/f748277ed1fc7065ae8998d61ed78b9ab1e55fae - https://security.netapp.com/advisory/ntap-20230526-0006/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZBNQBHCM6PIOUR6I5GEQS35XYT2NX6T/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18488.
CVE ID: CVE-2018-18488 Date Updated: 2024-09-16T17:22:49.135Z Date Published: 2018-10-18T21:00:00Z Description: In \lib\admin\action\dataaction.class.php in Gxlcms v2.0, SQL Injection exists via the ids[] parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://sunu11.com/2018/10/18/glxcms/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4172.
CVE ID: CVE-2023-4172 Date Updated: 2024-08-02T07:17:12.163Z Date Published: 2023-08-05T23:00:05.984Z Description: A vulnerability, which was classified as problematic, has been found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This issue affects some unknown processing of the file \Service\FileHandler.ashx. The manipulation of the argument FileDirectory leads to absolute path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-236207. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.236207 - https://vuldb.com/?ctiid.236207 - https://github.com/nagenanhai/cve/blob/main/duqu2.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7615.
CVE ID: CVE-2017-7615 Date Updated: 2024-08-05T16:12:26.897Z Date Published: 2017-04-16T14:45:00 Description: MantisBT through 2.3.0 allows arbitrary password reset and unauthenticated admin access via an empty confirm_hash value to verify.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/97707 - https://mantisbt.org/bugs/view.php?id=22690 - http://www.openwall.com/lists/oss-security/2017/04/16/2 - https://www.exploit-db.com/exploits/41890/ - http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt - http://packetstormsecurity.com/files/159219/Mantis-Bug-Tracker-2.3.0-Remote-Code-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0944.
CVE ID: CVE-2011-0944 Date Updated: 2024-09-16T17:58:55.266Z Date Published: 2011-10-03T23:00:00Z Description: Cisco IOS 12.4, 15.0, and 15.1 allows remote attackers to cause a denial of service (device reload) via malformed IPv6 packets, aka Bug ID CSCtj41194. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/viewAlert.x?alertId=24131 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d59.shtml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0388.
CVE ID: CVE-2017-0388 Date Updated: 2024-08-05T13:03:57.074Z Date Published: 2017-01-12T20:00:00 Description: An elevation of privilege vulnerability in the External Storage Provider could enable a local secondary user to read data from an external storage SD card inserted by the primary user. This issue is rated as High because it is a general bypass for operating system protections that isolate application data from other applications. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32523490. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-01-01.html - http://www.securityfocus.com/bid/95252 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-40371.
CVE ID: CVE-2021-40371 Date Updated: 2024-08-04T02:44:09.501Z Date Published: 2021-10-25T06:33:27 Description: Gridpro Request Management for Windows Azure Pack before 2.0.7912 allows Directory Traversal for remote code execution, as demonstrated by ..\\ in a scriptName JSON value to ServiceManagerTenant/GetVisibilityMap. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.gridprosoftware.com/products/requestmanagement/ - http://seclists.org/fulldisclosure/2021/Oct/33 - http://packetstormsecurity.com/files/164621/GridPro-Request-Management-For-Windows-Azure-Pack-2.0.7905-Directory-Traversal.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-8371.
CVE ID: CVE-2017-8371 Date Updated: 2024-09-16T20:11:21.215Z Date Published: 2017-04-30T20:00:00Z Description: Schneider Electric StruxureWare Data Center Expert before 7.4.0 uses cleartext RAM storage for passwords, which might allow remote attackers to obtain sensitive information via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2016-343-01 - http://www.datacenterdynamics.com/content-tracks/security-risk/schneider-patches-critical-vulnerability-in-struxureware-dcim/97738.fullarticle No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4206.
CVE ID: CVE-2010-4206 Date Updated: 2024-08-07T03:34:37.756Z Date Published: 2010-11-05T22:00:00 Description: Array index error in the FEBlend::apply function in WebCore/platform/graphics/filters/FEBlend.cpp in WebKit, as used in Google Chrome before 7.0.517.44, webkitgtk before 1.2.6, and other products, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted SVG document, related to effects in the application of filters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 - http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html - http://trac.webkit.org/changeset/70652 - http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html - http://www.vupen.com/english/advisories/2011/0216 - http://secunia.com/advisories/42109 - http://code.google.com/p/chromium/issues/detail?id=60688 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11949 - http://secunia.com/advisories/43086 - https://bugs.webkit.org/show_bug.cgi?id=48371 - http://www.securityfocus.com/bid/45721 - http://www.redhat.com/support/errata/RHSA-2011-0177.html - https://bugzilla.redhat.com/show_bug.cgi?id=656129 - http://www.vupen.com/english/advisories/2011/0552 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20760.
CVE ID: CVE-2023-20760 Date Updated: 2024-08-02T09:14:40.942Z Date Published: 2023-07-04T01:44:21.130Z Description: In apu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629578; Issue ID: ALPS07629578. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/July-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-7121.
CVE ID: CVE-2008-7121 Date Updated: 2024-09-16T22:40:10.148Z Date Published: 2009-08-28T15:00:00Z Description: Cross-site scripting (XSS) vulnerability in Mr. CGI Guy Hot Links SQL-PHP 3 and earlier allows remote attackers to inject arbitrary web script or HTML via the search bar. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.packetstormsecurity.org/0809-exploits/hotlinks-sql.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-36923.
CVE ID: CVE-2023-36923 Date Updated: 2024-08-02T17:01:10.143Z Date Published: 2023-08-08T00:36:59.717Z Description: SAP SQLA for PowerDesigner 17 bundled with SAP PowerDesigner 16.7 SP06 PL03, allows an attacker with local access to the system, to place a malicious library, that can be executed by the application. An attacker could thereby control the behavior of the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://me.sap.com/notes/3341599 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4842.
CVE ID: CVE-2015-4842 Date Updated: 2024-08-06T06:25:21.939Z Date Published: 2015-10-21T23:00:00 Description: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JAXP. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html - http://www.ubuntu.com/usn/USN-2784-1 - http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html - http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html - http://rhn.redhat.com/errata/RHSA-2015-2507.html - http://rhn.redhat.com/errata/RHSA-2015-1928.html - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html - https://access.redhat.com/errata/RHSA-2016:1430 - http://rhn.redhat.com/errata/RHSA-2015-2506.html - http://www.securityfocus.com/bid/77154 - http://rhn.redhat.com/errata/RHSA-2015-2509.html - http://www.securitytracker.com/id/1033884 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html - http://rhn.redhat.com/errata/RHSA-2015-1919.html - https://security.gentoo.org/glsa/201603-11 - http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html - http://rhn.redhat.com/errata/RHSA-2015-1920.html - https://security.gentoo.org/glsa/201603-14 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html - http://rhn.redhat.com/errata/RHSA-2015-1927.html - http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html - http://rhn.redhat.com/errata/RHSA-2015-1921.html - http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html - http://www.debian.org/security/2015/dsa-3381 - http://rhn.redhat.com/errata/RHSA-2015-1926.html - http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html - http://rhn.redhat.com/errata/RHSA-2015-2508.html - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html - http://www.ubuntu.com/usn/USN-2827-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36226.
CVE ID: CVE-2022-36226 Date Updated: 2024-08-03T10:00:04.327Z Date Published: 2022-08-25T23:37:21 Description: SiteServerCMS 5.X has a Remote-download-Getshell-vulnerability via /SiteServer/Ajax/ajaxOtherService.aspx. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/we1h0/SiteServer-CMS-Remote-download-Getshell - https://www.slpyue.com No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18680.
CVE ID: CVE-2017-18680 Date Updated: 2024-08-05T21:28:56.079Z Date Published: 2020-04-07T14:28:37 Description: An issue was discovered on Samsung mobile devices with L(5.0/5.1) and M(6.0) (tablets) software. The lockscreen interface allows Add User actions, leading to an unintended ability to access user data in external storage. The Samsung ID is SVE-2016-7797 (March 2017). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4141.
CVE ID: CVE-2014-4141 Date Updated: 2024-08-06T11:04:28.611Z Date Published: 2014-10-15T10:00:00 Description: Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/40685/ - http://www.securityfocus.com/bid/70342 - http://secunia.com/advisories/60968 - http://www.securitytracker.com/id/1031018 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-056 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0163.
CVE ID: CVE-2016-0163 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8573.
CVE ID: CVE-2015-8573 Date Updated: 2021-01-06T16:15:30 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4270.
CVE ID: CVE-2021-4270 Date Updated: 2024-08-03T17:23:10.169Z Date Published: 2022-12-21T00:00:00 Description: A vulnerability was found in Imprint CMS. It has been classified as problematic. Affected is the function SearchForm of the file ImprintCMS/Models/ViewHelpers.cs. The manipulation of the argument query leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 6140b140ccd02b5e4e7d6ba013ac1225724487f4. It is recommended to apply a patch to fix this issue. VDB-216474 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/peders/Imprint-CMS/commit/6140b140ccd02b5e4e7d6ba013ac1225724487f4 - https://vuldb.com/?id.216474 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28973.
CVE ID: CVE-2024-28973 Date Updated: 2024-08-02T01:03:51.253Z Date Published: 2024-06-26T02:31:10.767Z Description: Dell PowerProtect DD, versions prior to 8.0, LTS 7.13.1.0, LTS 7.10.1.30, LTS 7.7.5.40 contain a Stored Cross-Site Scripting Vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the storage of malicious HTML or JavaScript codes in a trusted application data store. When a high privileged victim user accesses the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1281.
CVE ID: CVE-2009-1281 Date Updated: 2024-09-16T19:14:20.753Z Date Published: 2009-04-09T16:00:00Z Description: Cross-site scripting (XSS) vulnerability in glFusion before 1.1.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/34575 - http://www.securityfocus.com/bid/34377 - http://osvdb.org/53287 - http://www.glfusion.org/article.php/glfusion113 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43574.
CVE ID: CVE-2022-43574 Date Updated: 2024-08-03T13:32:59.579Z Date Published: 2022-11-03T00:00:00 Description: "IBM Robotic Process Automation 21.0.1, 21.0.2, 21.0.3, 21.0.4, and 21.0.5 is vulnerable to incorrect permission assignment which could allow access to application configurations. IBM X-Force ID: 238679." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6831645 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14961.
CVE ID: CVE-2017-14961 Date Updated: 2024-08-05T19:42:22.275Z Date Published: 2017-11-15T16:00:00 Description: In IKARUS anti.virus 2.16.7, the ntguard.sys driver contains an Arbitrary Write vulnerability because of not validating input values from IOCtl 0x8300000c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/144955/IKARUS-AntiVirus-2.16.7-Privilege-Escalation.html - https://theevilbit.blogspot.co.uk/2017/11/turning-cve-2017-14961-ikarus-antivirus.html - https://www.exploit-db.com/exploits/43139/ - https://www.ikarussecurity.com/about-ikarus/security-blog/vulnerability-in-windows-antivirus-products-ik-sa-2017-0002/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-19693.
CVE ID: CVE-2020-19693 Date Updated: 2024-08-04T14:15:28.347Z Date Published: 2023-04-04T00:00:00 Description: An issue found in Espruino Espruino 6ea4c0a allows an attacker to execute arbitrrary code via oldFunc parameter of the jswrap_object.c:jswrap_function_replacewith endpoint. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/espruino/Espruino/issues/1684 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6157.
CVE ID: CVE-2012-6157 Date Updated: 2020-11-05T22:07:58 Date Published: 2020-11-05T22:07:58 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8374.
CVE ID: CVE-2018-8374 Date Updated: 2024-08-05T06:54:35.818Z Date Published: 2018-08-15T17:00:00 Description: A tampering vulnerability exists when Microsoft Exchange Server fails to properly handle profile data, aka "Microsoft Exchange Server Tampering Vulnerability." This affects Microsoft Exchange Server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/104993 - http://www.securitytracker.com/id/1041481 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8374 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-100001.
CVE ID: CVE-2014-100001 Date Updated: 2024-08-06T14:10:54.845Z Date Published: 2015-01-13T11:00:00 Description: Cross-site request forgery (CSRF) vulnerability in the SEO Plugin LiveOptim plugin before 1.1.4-free for WordPress allows remote attackers to hijack the authentication of administrators for requests that change plugin settings via unspecified vectors. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/57990 - https://wordpress.org/plugins/liveoptim/changelog/ - https://exchange.xforce.ibmcloud.com/vulnerabilities/92586 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11177.
CVE ID: CVE-2017-11177 Date Updated: 2024-08-05T17:57:58.043Z Date Published: 2017-11-06T17:00:00 Description: TRITON AP-EMAIL 8.2 before 8.2 IB does not properly restrict file access in an unspecified directory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.forcepoint.com/KBArticle?id=000014490 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2317.
CVE ID: CVE-2024-2317 Date Updated: 2024-08-12T14:56:21.392Z Date Published: 2024-03-08T12:00:07.323Z Description: A vulnerability was found in Bdtask Hospital AutoManager up to 20240227 and classified as problematic. This issue affects some unknown processing of the file /prescription/prescription/delete/ of the component Prescription Page. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256271. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.256271 - https://vuldb.com/?ctiid.256271 - https://drive.google.com/file/d/13-Fxw8fw3VP1PvL0fYvDBVlpTDQHyCkc/view?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-45736.
CVE ID: CVE-2023-45736 Date Updated: 2024-08-02T20:29:31.668Z Date Published: 2024-05-16T20:47:21.713Z Description: Insecure inherited permissions in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01037.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18281.
CVE ID: CVE-2019-18281 Date Updated: 2024-08-05T01:47:14.143Z Date Published: 2019-10-23T14:03:53 Description: An out-of-bounds memory access in the generateDirectionalRuns() function in qtextengine.cpp in Qt qtbase 5.11.x and 5.12.x before 5.12.5 allows attackers to cause a denial of service by crashing an application via a text file containing many directional characters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugreports.qt.io/browse/QTBUG-77819 - https://codereview.qt-project.org/c/qt/qtbase/+/271889 - https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1848784 - https://www.debian.org/security/2019/dsa-4556 - https://seclists.org/bugtraq/2019/Nov/4 - https://usn.ubuntu.com/4275-1/ - https://security.gentoo.org/glsa/202003-60 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41747.
CVE ID: CVE-2021-41747 Date Updated: 2024-08-04T03:15:29.304Z Date Published: 2021-10-22T11:51:35 Description: Cross-Site Scripting (XSS) vulnerability exists in Csdn APP 4.10.0, which can be exploited by attackers to obtain sensitive information such as user cookies. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cnvd.org.cn/flaw/show/CNVD-2021-52394 - https://github.com/purple-WL/Security-vulnerability/blob/main/Csdn%20APP%204.10.0%20XSS No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-0116.
CVE ID: CVE-2012-0116 Date Updated: 2024-08-06T18:16:18.554Z Date Published: 2012-01-18T22:00:00 Description: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ubuntu.com/usn/USN-1397-1 - http://secunia.com/advisories/53372 - http://security.gentoo.org/glsa/glsa-201308-06.xml - http://secunia.com/advisories/48250 - http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 - http://www.debian.org/security/2012/dsa-2429 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6014.
CVE ID: CVE-2019-6014 Date Updated: 2024-08-04T20:09:24.027Z Date Published: 2019-12-26T15:16:50 Description: DBA-1510P firmware 1.70b009 and earlier allows an attacker to execute arbitrary OS commands via Web User Interface. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dlink-jp.com/product/dba-1510p#product_firmware - http://jvn.jp/en/jp/JVN95875796/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5080.
CVE ID: CVE-2008-5080 Date Updated: 2024-08-07T10:40:16.956Z Date Published: 2008-12-03T18:00:00 Description: awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter. NOTE: this issue exists because of an incomplete fix for CVE-2008-3714. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/33002 - https://exchange.xforce.ibmcloud.com/vulnerabilities/47116 - https://bugzilla.redhat.com/show_bug.cgi?id=474396 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21 - http://www.ubuntu.com/usn/usn-686-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11269.
CVE ID: CVE-2018-11269 Date Updated: 2024-08-05T08:01:52.896Z Date Published: 2018-09-20T13:00:00 Description: In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, a potential buffer overflow exists when parsing TFTP options. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins - http://www.securityfocus.com/bid/105838 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-17102.
CVE ID: CVE-2020-17102 Date Updated: 2024-09-10T15:51:24.361Z Date Published: 2020-11-11T06:48:36 Description: WebP Image Extensions Information Disclosure Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17102 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43535.
CVE ID: CVE-2022-43535 Date Updated: 2024-08-03T13:32:59.767Z Date Published: 2023-01-03T19:59:04.515Z Description: A vulnerability in the ClearPass OnGuard Windows agent could allow malicious users on a Windows instance to elevate their user privileges. A successful exploit could allow these users to execute arbitrary code with NT AUTHORITY\SYSTEM level privileges on the Windows instance in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-020.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16832.
CVE ID: CVE-2017-16832 Date Updated: 2024-08-05T20:35:21.083Z Date Published: 2017-11-15T08:00:00 Description: The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sourceware.org/bugzilla/show_bug.cgi?id=22373 - https://security.gentoo.org/glsa/201811-17 - https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0bb6961f18b8e832d88b490d421ca56cea16c45b No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34567.
CVE ID: CVE-2024-34567 Date Updated: 2024-08-02T02:59:21.681Z Date Published: 2024-05-17T06:07:58.164Z Description: Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in GhozyLab, Inc. Popup Builder allows Stored XSS.This issue affects Popup Builder: from n/a through 1.1.29. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/easy-notify-lite/wordpress-easy-notify-lite-plugin-1-1-29-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-45188.
CVE ID: CVE-2024-45188 Date Updated: 2024-08-26T17:43:59.623Z Date Published: 2024-08-23T19:14:59.812Z Description: Mage AI allows remote users with the "Viewer" role to leak arbitrary files from the Mage server due to a path traversal in the "File Content" request No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://research.jfrog.com/vulnerabilities/mage-ai-file-content-request-remote-arbitrary-file-leak-jfsa-2024-001039603/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13164.
CVE ID: CVE-2020-13164 Date Updated: 2024-08-04T12:11:19.165Z Date Published: 2020-05-19T21:26:42 Description: In Wireshark 3.2.0 to 3.2.3, 3.0.0 to 3.0.10, and 2.6.0 to 2.6.16, the NFS dissector could crash. This was addressed in epan/dissectors/packet-nfs.c by preventing excessive recursion, such as for a cycle in the directory graph on a filesystem. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16476 - https://www.wireshark.org/security/wnpa-sec-2020-08.html - https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e6e98eab8e5e0bbc982cfdc808f2469d7cab6c5a - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5UOISPQTRCZGQLKBVXEDL72AEXEHS425/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DNV3EYL4JBWCR22TJO3PH7ADUVS5RWSU/ - https://security.gentoo.org/glsa/202007-13 - http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00026.html - http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00038.html - https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34224.
CVE ID: CVE-2024-34224 Date Updated: 2024-09-03T18:24:43.752Z Date Published: N/A Description: Cross Site Scripting vulnerability in /php-lms/classes/Users.php?f=save in Computer Laboratory Management System using PHP and MySQL 1.0 allow remote attackers to inject arbitrary web script or HTML via the firstname, middlename, lastname parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/dovankha/CVE-2024-34224 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30980.
CVE ID: CVE-2021-30980 Date Updated: 2024-08-03T22:48:14.261Z Date Published: 2021-08-24T18:51:18 Description: A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. An application may be able to execute arbitrary code with kernel privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT212975 - https://support.apple.com/en-us/HT212976 - https://support.apple.com/en-us/HT212978 - https://support.apple.com/en-us/HT212979 - https://support.apple.com/en-us/HT212981 - https://support.apple.com/en-us/HT212980 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2678.
CVE ID: CVE-2018-2678 Date Updated: 2024-10-03T20:33:42.205Z Date Published: 2018-01-18T02:00:00 Description: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2018:0351 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - https://security.netapp.com/advisory/ntap-20180117-0001/ - https://usn.ubuntu.com/3614-1/ - https://www.debian.org/security/2018/dsa-4166 - https://access.redhat.com/errata/RHSA-2018:0095 - https://www.debian.org/security/2018/dsa-4144 - https://access.redhat.com/errata/RHSA-2018:0521 - https://access.redhat.com/errata/RHSA-2018:0352 - https://access.redhat.com/errata/RHSA-2018:0115 - https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html - https://access.redhat.com/errata/RHSA-2018:1812 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us - https://access.redhat.com/errata/RHSA-2018:0099 - https://access.redhat.com/errata/RHSA-2018:1463 - https://access.redhat.com/errata/RHSA-2018:0458 - https://access.redhat.com/errata/RHSA-2018:0349 - http://www.securitytracker.com/id/1040203 - https://usn.ubuntu.com/3613-1/ - http://www.securityfocus.com/bid/102659 - https://access.redhat.com/errata/RHSA-2018:0100 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3399.
CVE ID: CVE-2008-3399 Date Updated: 2024-08-07T09:37:26.850Z Date Published: 2008-07-31T16:00:00 Description: PHP remote file inclusion vulnerability in activities/workflow-activities.php in XRMS CRM 1.99.2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via the include_directory parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/43992 - https://www.exploit-db.com/exploits/6131 - http://www.securityfocus.com/archive/1/494754/100/0/threaded - http://securityreason.com/securityalert/4081 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5133.
CVE ID: CVE-2023-5133 Date Updated: 2024-08-02T07:44:53.851Z Date Published: 2023-10-16T19:39:17.507Z Description: This user-activity-log-pro WordPress plugin before 2.3.4 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to hide the source of malicious traffic. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/36c30e54-75e4-4df1-b01a-60c51c0e76a3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6877.
CVE ID: CVE-2023-6877 Date Updated: 2024-08-02T08:42:08.264Z Date Published: 2024-04-07T01:55:15.228Z Description: The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 4.3.3 due to insufficient input sanitization and output escaping on the Content-Type field of error messages when retrieving an invalid RSS feed. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/7d25e85f-28f7-4cc5-9856-25cc5aaf1418?source=cve - https://plugins.trac.wordpress.org/changeset/3012849/feedzy-rss-feeds No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-37800.
CVE ID: CVE-2023-37800 Date Updated: 2023-07-15T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20186.
CVE ID: CVE-2023-20186 Date Updated: 2024-08-02T09:05:35.528Z Date Published: 2023-09-27T17:22:02.802Z Description: A vulnerability in the Authentication, Authorization, and Accounting (AAA) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to bypass command authorization and copy files to or from the file system of an affected device using the Secure Copy Protocol (SCP). This vulnerability is due to incorrect processing of SCP commands in AAA command authorization checks. An attacker with valid credentials and level 15 privileges could exploit this vulnerability by using SCP to connect to an affected device from an external machine. A successful exploit could allow the attacker to obtain or change the configuration of the affected device and put files on or retrieve files from the affected device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaascp-Tyj4fEJm No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-5116.
CVE ID: CVE-2010-5116 Date Updated: 2020-11-05T21:59:48 Date Published: 2020-11-05T21:59:48 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4241.
CVE ID: CVE-2021-4241 Date Updated: 2024-08-03T17:23:10.235Z Date Published: 2022-11-15T00:00:00 Description: A vulnerability, which was classified as problematic, was found in phpservermon. Affected is the function setUserLoggedIn of the file src/psm/Service/User.php. The manipulation leads to use of predictable algorithm in random number generator. The exploit has been disclosed to the public and may be used. The name of the patch is bb10a5f3c68527c58073258cb12446782d223bc3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213744. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/1-phpservermon/phpservermon/ - https://github.com/phpservermon/phpservermon/commit/bb10a5f3c68527c58073258cb12446782d223bc3 - https://vuldb.com/?id.213744 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46380.
CVE ID: CVE-2021-46380 Date Updated: 2022-05-06T17:30:13 Date Published: 2022-03-04T15:15:12 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26038.
CVE ID: CVE-2021-26038 Date Updated: 2024-09-17T03:38:06.173Z Date Published: 2021-07-07T10:12:47.940008Z Description: An issue was discovered in Joomla! 2.5.0 through 3.9.27. Install action in com_installer lack the required hardcoded ACL checks for superusers. A default system is not affected cause the default ACL for com_installer is limited to super users already. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://developer.joomla.org/security-centre/859-20210704-core-privilege-escalation-through-com-installer.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5136.
CVE ID: CVE-2024-5136 Date Updated: 2024-08-01T21:03:10.643Z Date Published: 2024-05-20T09:00:04.307Z Description: A vulnerability classified as problematic has been found in PHPGurukul Directory Management System 1.0. Affected is an unknown function of the file /admin/search-directory.php.. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265212. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.265212 - https://vuldb.com/?ctiid.265212 - https://vuldb.com/?submit.339122 - https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%201.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-31745.
CVE ID: CVE-2022-31745 Date Updated: 2024-08-03T07:26:01.171Z Date Published: 2022-12-22T00:00:00 Description: If array shift operations are not used, the Garbage Collector may have become confused about valid objects. This vulnerability affects Firefox < 101. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2022-20/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1760944 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-44446.
CVE ID: CVE-2022-44446 Date Updated: 2024-08-03T13:54:03.598Z Date Published: 2023-01-04T00:00:00 Description: In wlan driver, there is a possible missing bounds check. This could lead to local denial of service in wlan services. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2359.
CVE ID: CVE-2014-2359 Date Updated: 2024-08-06T10:14:25.443Z Date Published: 2018-04-06T16:00:00 Description: OleumTech Wireless Sensor Network devices allow remote attackers to obtain sensitive information about sensor nodes or spoof devices by reading cleartext protocol data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/94788 - https://ioactive.com/pdfs/IOActive_Advisory_OleumTech.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2034.
CVE ID: CVE-2018-2034 Date Updated: 2019-01-22T17:57:02 Date Published: 2019-01-22T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11404.
CVE ID: CVE-2017-11404 Date Updated: 2024-09-16T18:04:12.421Z Date Published: 2017-07-18T00:00:00Z Description: In CMS Made Simple (CMSMS) 2.2.2, remote authenticated administrators can upload a .php file via a FileManager action to admin/moduleinterface.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.yuesec.com/img/cccccve/CMSMadeSimple/upl0advul123/images/upload_vulnerability_yuesec.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24435.
CVE ID: CVE-2021-24435 Date Updated: 2024-08-03T19:28:23.965Z Date Published: 2021-09-06T11:09:24 Description: The iframe-font-preview.php file of the titan-framework does not properly escape the font-weight and font-family GET parameters before outputting them back in an href attribute, leading to Reflected Cross-Site Scripting issues No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/a88ffc42-6611-406e-8660-3af24c9cc5e8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16786.
CVE ID: CVE-2019-16786 Date Updated: 2024-08-05T01:24:48.017Z Date Published: 2019-12-20T23:00:20 Description: Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: "Transfer-Encoding: gzip, chunked" would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/ - https://access.redhat.com/errata/RHSA-2020:0720 - https://www.oracle.com/security-alerts/cpuapr2022.html - https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes - https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p - https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3 - https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5108.
CVE ID: CVE-2017-5108 Date Updated: 2024-08-05T14:47:44.357Z Date Published: 2017-10-27T05:00:00 Description: Type confusion in PDFium in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to potentially maliciously modify objects via a crafted PDF file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201709-15 - http://www.debian.org/security/2017/dsa-3926 - https://crbug.com/695830 - https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html - http://www.securityfocus.com/bid/99950 - https://access.redhat.com/errata/RHSA-2017:1833 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0857.
CVE ID: CVE-2010-0857 Date Updated: 2024-08-07T01:06:50.554Z Date Published: 2010-04-13T22:00:00 Description: Unspecified vulnerability in the Oracle Workflow Cartridge component in Oracle E-Business Suite 11.5.10.2 allows remote authenticated users to affect integrity via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.us-cert.gov/cas/techalerts/TA10-103B.html - http://www.securitytracker.com/id?1023859 - http://secunia.com/advisories/39441 - http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5628.
CVE ID: CVE-2015-5628 Date Updated: 2024-08-06T06:59:02.677Z Date Published: 2020-02-05T18:46:01 Description: Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 - http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2866.
CVE ID: CVE-2023-2866 Date Updated: 2024-08-02T06:33:06.094Z Date Published: 2023-06-07T20:12:46.824Z Description: If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/news-events/ics-advisories/icsa-23-150-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11736.
CVE ID: CVE-2019-11736 Date Updated: 2024-08-04T23:03:32.428Z Date Published: 2019-09-27T17:20:38 Description: The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. <br>*Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1551913 - https://bugzilla.mozilla.org/show_bug.cgi?id=1552206 - https://www.mozilla.org/security/advisories/mfsa2019-25/ - https://www.mozilla.org/security/advisories/mfsa2019-26/ - http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html - http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-51487.
CVE ID: CVE-2023-51487 Date Updated: 2024-08-02T22:32:10.193Z Date Published: 2024-03-16T01:03:30.698Z Description: Cross-Site Request Forgery (CSRF) vulnerability in ARI Soft ARI Stream Quiz.This issue affects ARI Stream Quiz: from n/a through 1.2.32. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/ari-stream-quiz/wordpress-ari-stream-quiz-wordpress-quizzes-builder-plugin-1-2-32-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-7843.
CVE ID: CVE-2024-7843 Date Updated: 2024-08-20T16:07:57.564Z Date Published: 2024-08-15T22:31:03.936Z Description: A vulnerability, which was classified as problematic, was found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file /tracking/admin/exportcs.php. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.274746 - https://vuldb.com/?ctiid.274746 - https://vuldb.com/?submit.391563 - https://github.com/Wsstiger/cve/blob/main/Tracer_info2.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16122.
CVE ID: CVE-2020-16122 Date Updated: 2024-09-16T16:13:16.633Z Date Published: 2020-11-07T04:10:19.889638Z Description: PackageKit's apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.launchpad.net/ubuntu/+source/packagekit/+bug/1882098 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-18913.
CVE ID: CVE-2020-18913 Date Updated: 2024-08-04T14:08:30.668Z Date Published: 2021-08-24T19:34:08 Description: EARCLINK ESPCMS-P8 was discovered to contain a SQL injection vulnerability in the espcms_web/Search.php component via the attr_array parameter. This vulnerability allows attackers to access sensitive database information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tusk1.cn/2019/03/21/ESPCMS-P8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5%E4%B8%8E%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.