instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2021-0073.
CVE ID: CVE-2021-0073 Date Updated: 2024-08-03T15:25:01.834Z Date Published: 2021-06-09T19:07:22 Description: Insufficient control flow management in Intel(R) DSA before version 20.11.50.9 may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00510.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27416.
CVE ID: CVE-2020-27416 Date Updated: 2024-08-04T16:18:43.457Z Date Published: 2021-12-08T18:36:50 Description: Mahavitaran android application 7.50 and prior are affected by account takeover due to improper OTP validation, allows remote attackers to control a users account. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://play.google.com/store/apps/details?id=com.msedcl.app&hl=en&gl=US - https://cvewalkthrough.com/cve-2021-41716-mahavitaran-android-application-account-take-over-via-otp-fixation/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-3542.
CVE ID: CVE-2017-3542 Date Updated: 2024-08-05T14:30:58.102Z Date Published: 2017-04-24T19:00:00 Description: Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Server). Supported versions that are affected are 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebCenter Sites. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1038291 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html - http://www.securityfocus.com/bid/97760 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20659.
CVE ID: CVE-2018-20659 Date Updated: 2024-08-05T12:05:17.684Z Date Published: 2019-01-02T17:00:00 Description: An issue was discovered in Bento4 1.5.1-627. The AP4_StcoAtom class in Core/Ap4StcoAtom.cpp has an attempted excessive memory allocation when called from AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp, as demonstrated by mp42hls. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/axiomatic-systems/Bento4/issues/350 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2130.
CVE ID: CVE-2023-2130 Date Updated: 2024-08-02T06:12:20.407Z Date Published: 2023-04-17T20:00:06.747Z Description: A vulnerability classified as critical has been found in SourceCodester Purchase Order Management System 1.0. Affected is an unknown function of the file /admin/suppliers/view_details.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226206 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.226206 - https://vuldb.com/?ctiid.226206 - https://github.com/zitozito1/bug_report/blob/main/SQLi.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-5325.
CVE ID: CVE-2010-5325 Date Updated: 2024-08-07T04:17:10.191Z Date Published: 2016-04-15T14:00:00 Description: Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1218297 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - http://bzr.linuxfoundation.org/loggerhead/openprinting/foomatic-4.0/foomatic-filters/annotate/head:/ChangeLog - https://bugs.linuxfoundation.org/show_bug.cgi?id=515 - http://rhn.redhat.com/errata/RHSA-2016-0491.html - http://www.openwall.com/lists/oss-security/2016/02/15/1 - http://www.openwall.com/lists/oss-security/2016/02/15/7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1189.
CVE ID: CVE-2011-1189 Date Updated: 2024-08-06T22:21:33.457Z Date Published: 2011-03-11T01:00:00 Description: Google Chrome before 10.0.648.127 does not properly perform box layout, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale node." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14370 - http://www.securityfocus.com/bid/46785 - http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/65953 - http://code.google.com/p/chromium/issues/detail?id=70027 - http://www.vupen.com/english/advisories/2011/0628 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-3846.
CVE ID: CVE-2019-3846 Date Updated: 2024-08-04T19:19:18.683Z Date Published: 2019-06-03T18:25:57 Description: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://seclists.org/oss-sec/2019/q2/133 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3846 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/ - https://www.debian.org/security/2019/dsa-4465 - https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html - https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html - http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html - http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html - https://seclists.org/bugtraq/2019/Jun/26 - http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html - https://security.netapp.com/advisory/ntap-20190710-0002/ - https://seclists.org/bugtraq/2019/Jul/33 - http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html - https://usn.ubuntu.com/4093-1/ - https://usn.ubuntu.com/4094-1/ - https://usn.ubuntu.com/4095-2/ - https://usn.ubuntu.com/4095-1/ - http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html - https://usn.ubuntu.com/4117-1/ - https://usn.ubuntu.com/4118-1/ - https://access.redhat.com/errata/RHSA-2019:2703 - https://access.redhat.com/errata/RHSA-2019:2741 - https://access.redhat.com/errata/RHSA-2019:3076 - https://access.redhat.com/errata/RHSA-2019:3055 - https://access.redhat.com/errata/RHSA-2019:3089 - http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html - https://access.redhat.com/errata/RHSA-2020:0174 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23012.
CVE ID: CVE-2023-23012 Date Updated: 2024-08-02T10:28:40.872Z Date Published: 2023-01-20T00:00:00 Description: Cross Site Scripting (XSS) vulnerability in craigrodway classroombookings 2.6.4 allows attackers to execute arbitrary code or other unspecified impacts via the input bgcol in file Weeks.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/enferas/bd8ec37999c216eceabd6b80d5a95f94 - https://github.com/craigrodway/classroombookings/issues/52 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1903.
CVE ID: CVE-2009-1903 Date Updated: 2024-08-07T05:27:54.904Z Date Published: 2009-06-03T16:33:00 Description: The PDF XSS protection feature in ModSecurity before 2.5.8 allows remote attackers to cause a denial of service (Apache httpd crash) via a request for a PDF file that does not use the GET method. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00487.html - http://www.osvdb.org/52552 - http://security.gentoo.org/glsa/glsa-200907-02.xml - http://secunia.com/advisories/34256 - http://secunia.com/advisories/35687 - http://secunia.com/advisories/34311 - https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00529.html - http://sourceforge.net/project/shownotes.php?release_id=667538 - https://exchange.xforce.ibmcloud.com/vulnerabilities/49211 - http://www.vupen.com/english/advisories/2009/0703 - http://www.securityfocus.com/bid/34096 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29903.
CVE ID: CVE-2021-29903 Date Updated: 2024-09-16T23:00:34.408Z Date Published: 2021-10-06T17:10:44.242107Z Description: IBM Sterling B2B Integrator Standard Edition 5.2.6.0 through 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 207506. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6495919 - https://exchange.xforce.ibmcloud.com/vulnerabilities/207506 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32316.
CVE ID: CVE-2023-32316 Date Updated: 2024-08-02T15:10:24.975Z Date Published: 2023-05-26T22:36:29.633Z Description: CloudExplorer Lite is an open source cloud management tool. In affected versions users can add themselves to any organization in CloudExplorer Lite. This is due to a missing permission check on the user profile. It is recommended to upgrade the version to v1.1.0. There are no known workarounds for this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/security/advisories/GHSA-cp3j-437h-4vwj No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0086.
CVE ID: CVE-2008-0086 Date Updated: 2024-08-07T07:32:23.907Z Date Published: 2008-07-08T23:00:00 Description: Buffer overflow in the convert function in Microsoft SQL Server 2000 SP4, 2000 Desktop Engine (MSDE 2000) SP4, and 2000 Desktop Engine (WMSDE) allows remote authenticated users to execute arbitrary code via a crafted SQL expression. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id?1020441 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14052 - http://secunia.com/advisories/30970 - http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html - http://www.vupen.com/english/advisories/2008/2022/references - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 - http://www.securityfocus.com/archive/1/494082/100/0/threaded - http://www.vmware.com/security/advisories/VMSA-2011-0003.html - http://www.us-cert.gov/cas/techalerts/TA08-190A.html - http://www.securityfocus.com/archive/1/516397/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6936.
CVE ID: CVE-2018-6936 Date Updated: 2024-08-05T06:17:17.283Z Date Published: 2018-02-21T22:00:00 Description: Cross Site Scripting (XSS) exists on the D-Link DIR-600M C1 3.01 via the SSID or the name of a user account. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/44219/ - https://0day4u.wordpress.com/2018/02/21/d-link-dir-600m-wireless-stored-xss/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-19599.
CVE ID: CVE-2018-19599 Date Updated: 2024-08-05T11:37:11.532Z Date Published: 2020-03-02T19:45:40 Description: Monstra CMS 1.6 allows XSS via an uploaded SVG document to the admin/index.php?id=filesmanager&path=uploads/ URI. NOTE: this is a discontinued product. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/security-provensec/CVE-2018-19599/blob/master/monstra-dev_svg.pdf - https://github.com/monstra-cms/monstra/issues/467 - https://anh.im/image/lG1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-3176.
CVE ID: CVE-2021-3176 Date Updated: 2024-08-03T16:45:51.316Z Date Published: 2021-01-29T06:29:19 Description: The chat window of the Mitel BusinessCTI Enterprise (MBC-E) Client for Windows before 6.4.15 and 7.x before 7.1.2 could allow an attacker to gain access to user information by sending certain code, due to improper input validation of http links. A successful exploit could allow an attacker to view user information and application data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mitel.com/support/security-advisories - https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0001 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3065.
CVE ID: CVE-2010-3065 Date Updated: 2024-08-07T02:55:46.863Z Date Published: 2010-08-20T19:00:00 Description: The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://php-security.org/2010/05/31/mops-2010-060-php-session-serializer-session-data-injection-vulnerability/index.html - http://www.debian.org/security/2010/dsa-2089 - http://www.redhat.com/support/errata/RHSA-2010-0919.html - http://secunia.com/advisories/42410 - http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html - http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html - http://www.vupen.com/english/advisories/2010/3081 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38883.
CVE ID: CVE-2024-38883 Date Updated: 2024-08-07T15:29:18.126968 Date Published: 2024-08-02T00:00:00 Description: An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a remote attacker to perform a Drop Encryption Level attack due to the selection of a less-secure algorithm during negotiation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://caterease.com - http://horizon.com - https://vuldb.com/?id.273367 - https://packetstormsecurity.com/files/179892/Caterease-Software-SQL-Injection-Command-Injection-Bypass.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23863.
CVE ID: CVE-2024-23863 Date Updated: 2024-08-01T23:13:08.223Z Date Published: 2024-01-26T09:06:53.297Z Description: A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/taxstructuredisplay.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9028.
CVE ID: CVE-2019-9028 Date Updated: 2024-08-04T21:38:45.561Z Date Published: 2019-02-23T12:00:00 Description: An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is a stack-based buffer over-read in the function InflateDimensions() in inflate.c when called from ReadNextCell in mat5.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tbeu/matio/issues/103 - https://github.com/TeamSeri0us/pocs/tree/master/matio No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11201.
CVE ID: CVE-2020-11201 Date Updated: 2024-08-04T11:28:13.600Z Date Published: 2020-11-12T10:00:56 Description: Arbitrary access to DSP memory due to improper check in loaded library for data received from CPU side' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA845, SDM640, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/ - https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin - https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28639.
CVE ID: CVE-2022-28639 Date Updated: 2024-08-03T05:56:16.403Z Date Published: 2022-09-20T20:06:05 Description: A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4750.
CVE ID: CVE-2024-4750 Date Updated: 2024-08-01T20:47:41.684Z Date Published: 2024-06-04T06:00:02.993Z Description: The buddyboss-platform WordPress plugin before 2.6.0 contains an IDOR vulnerability that allows a user to like a private post by manipulating the ID included in the request No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/ffbe4034-842b-43b0-97d1-208811376dea/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5701.
CVE ID: CVE-2017-5701 Date Updated: 2024-09-17T03:02:24.375Z Date Published: 2017-10-11T00:00:00Z Description: Insecure platform configuration in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows an attacker with physical presence to run arbitrary code via unauthorized firmware modification during BIOS Recovery. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084&languageid=en-fr - http://www.securityfocus.com/bid/101257 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11687.
CVE ID: CVE-2019-11687 Date Updated: 2024-08-04T23:03:32.415Z Date Published: 2019-05-02T21:07:15 Description: An issue was discovered in the DICOM Part 10 File Format in the NEMA DICOM Standard 1995 through 2019b. The preamble of a DICOM file that complies with this specification can contain the header for an executable file, such as Portable Executable (PE) malware. This space is left unspecified so that dual-purpose files can be created. (For example, dual-purpose TIFF/DICOM files are used in digital whole slide imaging for applications in medicine.) To exploit this vulnerability, someone must execute a maliciously crafted file that is encoded in the DICOM Part 10 File Format. PE/DICOM files are executable even with the .dcm file extension. Anti-malware configurations at healthcare facilities often ignore medical imagery. Also, anti-malware tools and business processes could violate regulatory frameworks (such as HIPAA) when processing suspicious DICOM files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://labs.cylera.com/2019.04.16/pe-dicom-medical-malware - https://github.com/d00rt/pedicom/blob/master/doc/Attacking_Digital_Imaging_and_Communication_in_Medicine_%28DICOM%29_file_format_standard_-_Markel_Picado_Ortiz_%28d00rt%29.pdf - https://github.com/d00rt/pedicom - http://www.securityfocus.com/bid/108730 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4418.
CVE ID: CVE-2018-4418 Date Updated: 2024-08-05T05:11:22.777Z Date Published: 2019-04-03T17:43:18 Description: A validation issue was addressed with improved input sanitization. This issue affected versions prior to macOS Mojave 10.14. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/kb/HT209193 - https://support.apple.com/kb/HT209139 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40538.
CVE ID: CVE-2022-40538 Date Updated: 2024-08-03T12:21:46.267Z Date Published: 2023-06-06T07:39:05.416Z Description: Transient DOS due to reachable assertion in modem while processing sib with incorrect values from network. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4489.
CVE ID: CVE-2022-4489 Date Updated: 2024-08-03T01:41:45.022Z Date Published: 2023-02-06T19:59:48.440Z Description: The HUSKY WordPress plugin before 1.3.2 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/067573f2-b1e6-49a9-8c5b-f91e3b9d722f No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8206.
CVE ID: CVE-2019-8206 Date Updated: 2024-08-04T21:10:33.515Z Date Published: 2019-10-17T20:24:16 Description: Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-49.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15451.
CVE ID: CVE-2018-15451 Date Updated: 2024-09-17T01:26:12.751Z Date Published: 2018-11-08T20:00:00Z Description: A vulnerability in the web-based management interface of Cisco Prime Service Catalog could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/105857 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-psc-xss No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28350.
CVE ID: CVE-2022-28350 Date Updated: 2024-08-03T05:56:14.915Z Date Published: 2022-05-19T01:04:14 Description: Arm Mali GPU Kernel Driver allows improper GPU operations in Valhall r29p0 through r36p0 before r37p0 to reach a use-after-free situation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://developer.arm.com/support/arm-security-updates - https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5198.
CVE ID: CVE-2015-5198 Date Updated: 2024-08-06T06:41:08.471Z Date Published: 2015-09-08T15:00:00 Description: libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to gain privileges via unspecified vectors, related to the VDPAU_DRIVER_PATH environment variable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167469.html - http://www.securityfocus.com/bid/76636 - http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170637.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165546.html - https://bugzilla.redhat.com/show_bug.cgi?id=1253824 - http://www.ubuntu.com/usn/USN-2729-1 - http://lists.opensuse.org/opensuse-updates/2015-09/msg00012.html - http://lists.x.org/archives/xorg-announce/2015-August/002630.html - http://www.debian.org/security/2015/dsa-3355 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11109.
CVE ID: CVE-2019-11109 Date Updated: 2024-08-04T22:48:08.655Z Date Published: 2019-12-18T21:09:56 Description: Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html - https://support.f5.com/csp/article/K54164678?utm_source=f5support&amp%3Butm_medium=RSS No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20252.
CVE ID: CVE-2019-20252 Date Updated: 2022-09-29T16:51:49 Date Published: 2020-01-02T20:33:06 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4563.
CVE ID: CVE-2013-4563 Date Updated: 2024-08-06T16:45:15.247Z Date Published: 2013-11-19T15:00:00 Description: The udp6_ufo_fragment function in net/ipv6/udp_offload.c in the Linux kernel through 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly perform a certain size comparison before inserting a fragment header, which allows remote attackers to cause a denial of service (panic) via a large IPv6 UDP packet, as demonstrated by use of the Token Bucket Filter (TBF) queueing discipline. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ubuntu.com/usn/USN-2113-1 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0e033e04c2678dbbe74a46b23fffb7bb918c288e - http://www.ubuntu.com/usn/USN-2117-1 - https://github.com/torvalds/linux/commit/0e033e04c2678dbbe74a46b23fffb7bb918c288e - https://bugzilla.redhat.com/show_bug.cgi?id=1030015 - http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html - http://www.openwall.com/lists/oss-security/2013/11/13/9 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2077.
CVE ID: CVE-2012-2077 Date Updated: 2024-08-06T19:17:27.814Z Date Published: 2012-08-14T23:00:00 Description: Cross-site request forgery (CSRF) vulnerability in the ShareThis module 7.x-2.x before 7.x-2.3 for Drupal allows remote attackers to hijack the authentication of users with administer sharethis permissions via unknown vectors "outside of the Form API." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://drupalcode.org/project/sharethis.git/commit/11f247a - http://secunia.com/advisories/48598 - http://www.openwall.com/lists/oss-security/2012/04/07/1 - http://www.osvdb.org/80681 - http://www.securityfocus.com/bid/52778 - http://drupal.org/node/1506448 - https://exchange.xforce.ibmcloud.com/vulnerabilities/74518 - http://drupal.org/node/1504746 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21978.
CVE ID: CVE-2021-21978 Date Updated: 2024-08-03T18:30:23.441Z Date Published: 2021-03-03T17:44:25 Description: VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vmware.com/security/advisories/VMSA-2021-0003.html - http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8639.
CVE ID: CVE-2020-8639 Date Updated: 2024-08-04T10:03:46.367Z Date Published: 2020-04-03T18:36:44 Description: An unrestricted file upload vulnerability in keywordsImport.php in TestLink 1.9.20 allows remote attackers to execute arbitrary code by uploading a file with an executable extension. This allows an authenticated attacker to upload a malicious file (containing PHP code to execute operating system commands) to a publicly accessible directory of the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ackcent.com/blog/testlink-1.9.20-unrestricted-file-upload-and-sql-injection/ - https://github.com/TestLinkOpenSourceTRMS/testlink-code/commit/57d81ae350d569c5c95087997fe051c49e14516d - http://packetstormsecurity.com/files/161401/TestLink-1.9.20-Shell-Upload.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6822.
CVE ID: CVE-2013-6822 Date Updated: 2024-08-06T17:46:23.872Z Date Published: 2013-11-19T19:00:00 Description: GRMGApp in SAP NetWeaver allows remote attackers to have unspecified impact and attack vectors, related to an XML External Entity (XXE) issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://scn.sap.com/docs/DOC-8218 - https://erpscan.io/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0401.
CVE ID: CVE-2024-0401 Date Updated: 2024-08-01T18:04:49.502Z Date Published: 2024-05-20T16:55:18.891Z Description: ASUS routers supporting custom OpenVPN profiles are vulnerable to a code execution vulnerability. An authenticated and remote attacker can execute arbitrary operating system commands by uploading a crafted OVPN profile. Known affected routers include ASUS ExpertWiFi, ASUS RT-AX55, ASUS RT-AX58U, ASUS RT-AC67U, ASUS RT-AC68R, ASUS RT-AC68U, ASUS RT-AX86, ASUS RT-AC86U, ASUS RT-AX88U, and ASUS RT-AX3000. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vulncheck.com/advisories/asus-ovpn-rce No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0586.
CVE ID: CVE-2014-0586 Date Updated: 2024-08-06T09:20:19.868Z Date Published: 2014-11-11T23:00:00 Description: Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, and CVE-2014-0590. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://helpx.adobe.com/security/products/flash-player/apsb14-24.html - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21351.
CVE ID: CVE-2024-21351 Date Updated: 2024-08-01T22:20:40.468Z Date Published: 2024-02-13T18:02:12.076Z Description: Windows SmartScreen Security Feature Bypass Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21351 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-5080.
CVE ID: CVE-2011-5080 Date Updated: 2024-09-17T04:20:40.511Z Date Published: 2012-02-14T17:00:00Z Description: Cross-site scripting (XSS) vulnerability in lib/class.tx_jftcaforms_tceFunc.php in the Additional TCA Forms (jftcaforms) extension before 0.2.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/ - http://forge.typo3.org/projects/extension-jftcaforms/repository/diff?rev=51637&rev_to=51568 - http://www.securityfocus.com/bid/51854 - http://osvdb.org/78800 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2654.
CVE ID: CVE-2011-2654 Date Updated: 2024-08-06T23:08:23.750Z Date Published: 2011-09-06T15:00:00 Description: The RPC implementation in the server in Novell Cloud Manager 1.1.2 before Patch 3 does not properly initialize objects, which allows remote attackers to execute arbitrary code by making RPC calls that leverage incorrect privileges associated with a partially initialized session. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://download.novell.com/Download?buildid=NSONlV5PqMo~ - http://www.securityfocus.com/bid/49432 - http://www.securitytracker.com/id?1026006 - http://zerodayinitiative.com/advisories/ZDI-11-278/ - http://secunia.com/advisories/45845 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-32392.
CVE ID: CVE-2024-32392 Date Updated: 2024-08-02T02:06:44.226Z Date Published: 2024-04-19T00:00:00 Description: Cross Site Scripting vulnerability in CmSimple v.5.15 allows a remote attacker to execute arbitrary code via the functions.php component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Hebing123/cve/issues/33 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25715.
CVE ID: CVE-2022-25715 Date Updated: 2024-08-03T04:49:42.787Z Date Published: 2023-01-06T04:42:11.906Z Description: Memory corruption in display driver due to incorrect type casting while accessing the fence structure fields No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24148.
CVE ID: CVE-2022-24148 Date Updated: 2024-08-03T04:07:01.551Z Date Published: 2022-02-04T01:33:20 Description: Tenda AX3 v16.03.12.10_CN was discovered to contain a command injection vulnerability in the function mDMZSetCfg. This vulnerability allows attackers to execute arbitrary commands via the dmzIp parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/pjqwudi/my_vuln/blob/main/Tenda/vuln_14/14.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-3949.
CVE ID: CVE-2019-3949 Date Updated: 2024-08-04T19:26:27.676Z Date Published: 2019-07-09T17:18:31 Description: Arlo Basestation firmware 1.12.0.1_27940 and prior firmware contain a networking misconfiguration that allows access to restricted network interfaces. This could allow an attacker to upload or download arbitrary files and possibly execute malicious code on the device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.arlo.com/000062274/Security-Advisory-for-Networking-Misconfiguration-and-Insufficient-UART-Protection-Mechanisms No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-8367.
CVE ID: CVE-2024-8367 Date Updated: 2024-09-03T14:06:34.449Z Date Published: 2024-09-01T04:00:05.840Z Description: A vulnerability was found in HM Courts & Tribunals Service Probate Back Office up to c1afe0cdb2b2766d9e24872c4e827f8b82a6cd31. It has been classified as problematic. Affected is an unknown function of the file src/main/java/uk/gov/hmcts/probate/service/NotificationService.java of the component Markdown Handler. The manipulation leads to injection. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as d90230d7cf575e5b0852d56660104c8bd2503c34. It is recommended to apply a patch to fix this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.276270 - https://vuldb.com/?ctiid.276270 - https://tools.hmcts.net/jira/browse/DTSPB-4180 - https://github.com/hmcts/probate-back-office/pull/2614 - https://github.com/hmcts/probate-back-office/commit/d90230d7cf575e5b0852d56660104c8bd2503c34 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2415.
CVE ID: CVE-2011-2415 Date Updated: 2024-08-06T23:00:33.847Z Date Published: 2011-08-10T22:00:00 Description: Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2414. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html - http://secunia.com/advisories/48308 - http://www.us-cert.gov/cas/techalerts/TA11-222A.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16070 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13940 - http://www.adobe.com/support/security/bulletins/apsb11-21.html - http://www.securityfocus.com/bid/49077 - http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html - http://www.redhat.com/support/errata/RHSA-2011-1144.html - http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-3906.
CVE ID: CVE-2021-3906 Date Updated: 2024-08-03T17:09:09.761Z Date Published: 2021-10-27T21:20:10 Description: bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/f115bdf5-c06b-4627-a6fa-ba6904a43ba3 - https://github.com/bookstackapp/bookstack/commit/64937ab826b56d086af9ecea532510d37520ebc8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34064.
CVE ID: CVE-2023-34064 Date Updated: 2024-08-02T16:01:53.919Z Date Published: 2023-12-12T19:50:51.210Z Description: Workspace ONE Launcher contains a Privilege Escalation Vulnerability. A malicious actor with physical access to Workspace ONE Launcher could utilize the Edge Panel feature to bypass setup to gain access to sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vmware.com/security/advisories/VMSA-2023-0027.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30766.
CVE ID: CVE-2023-30766 Date Updated: 2024-08-02T14:37:14.935Z Date Published: 2023-06-13T00:00:00 Description: Hidden functionality issue exists in KB-AHR series and KB-IRIP series. If this vulnerability is exploited, an arbitrary OS command may be executed on the product or the device settings may be altered. Affected products and versions are as follows: KB-AHR04D versions prior to 91110.1.101106.78, KB-AHR08D versions prior to 91210.1.101106.78, KB-AHR16D versions prior to 91310.1.101106.78, KB-IRIP04A versions prior to 95110.1.100290.78A, KB-IRIP08A versions prior to 95210.1.100290.78A, and KB-IRIP16A versions prior to 95310.1.100290.78A. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.kbdevice.com/news/%e3%83%ac%e3%82%b3%e3%83%bc%e3%83%80%e3%83%bc%e3%81%ae%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e6%94%bb%e6%92%83%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e3%82%a2%e3%83%83%e3%83%97%e3%83%87/ - https://jvn.jp/en/vu/JVNVU90812349/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41653.
CVE ID: CVE-2021-41653 Date Updated: 2024-08-04T03:15:29.120Z Date Published: 2021-11-13T14:18:52 Description: The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tp-link.com - https://www.tp-link.com/us/press/security-advisory/ - https://k4m1ll0.com/cve-2021-41653.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3454.
CVE ID: CVE-2010-3454 Date Updated: 2024-08-07T03:11:44.108Z Date Published: 2011-01-28T21:13:00 Description: Multiple off-by-one errors in the WW8DopTypography::ReadFromMem function in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted typography information in a Microsoft Word .DOC file that triggers an out-of-bounds write. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/40775 - http://www.securityfocus.com/bid/46031 - http://www.debian.org/security/2011/dsa-2151 - http://secunia.com/advisories/60799 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html - https://bugzilla.redhat.com/show_bug.cgi?id=640954 - http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml - http://osvdb.org/70715 - http://secunia.com/advisories/43118 - http://secunia.com/advisories/43065 - http://www.vupen.com/english/advisories/2011/0230 - http://www.securitytracker.com/id?1025002 - http://www.openoffice.org/security/cves/CVE-2010-3453_CVE-2010-3454.html - http://www.vupen.com/english/advisories/2011/0232 - http://www.redhat.com/support/errata/RHSA-2011-0182.html - http://ubuntu.com/usn/usn-1056-1 - http://www.redhat.com/support/errata/RHSA-2011-0181.html - http://www.vupen.com/english/advisories/2011/0279 - http://secunia.com/advisories/43105 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:027 - http://www.vsecurity.com/resources/advisory/20110126-1 - http://www.cs.brown.edu/people/drosenbe/research.html - http://secunia.com/advisories/42999 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7867.
CVE ID: CVE-2019-7867 Date Updated: 2024-08-04T21:02:19.250Z Date Published: 2019-08-02T21:15:50 Description: A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with access to manage orders and order status. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-45538.
CVE ID: CVE-2021-45538 Date Updated: 2024-08-04T04:39:21.518Z Date Published: 2021-12-26T00:54:22 Description: Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000064088/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0074 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26340.
CVE ID: CVE-2021-26340 Date Updated: 2024-09-16T16:29:03.775Z Date Published: 2021-12-10T21:55:10.021622Z Description: A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32230.
CVE ID: CVE-2023-32230 Date Updated: 2024-08-02T15:10:24.221Z Date Published: 2023-12-18T12:58:08.690Z Description: An improper handling of a malformed API request to an API server in Bosch BT software products can allow an unauthenticated attacker to cause a Denial of Service (DoS) situation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5423.
CVE ID: CVE-2013-5423 Date Updated: 2024-08-06T17:06:52.475Z Date Published: 2014-07-07T10:00:00 Description: IBM Flex System Manager (FSM) 1.1 through 1.3 before 1.3.2.0 allows remote attackers to enumerate user accounts via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/68370 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT00278 - http://secunia.com/advisories/58948 - https://exchange.xforce.ibmcloud.com/vulnerabilities/87485 - http://www.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095891 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23603.
CVE ID: CVE-2023-23603 Date Updated: 2024-08-02T10:35:33.580Z Date Published: 2023-06-02T00:00:00 Description: Regular expressions used to filter out forbidden properties and values from style directives in calls to <code>console.log</code> weren't accounting for external URLs. Data could then be potentially exfiltrated from the browser. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2023-02/ - https://www.mozilla.org/security/advisories/mfsa2023-01/ - https://www.mozilla.org/security/advisories/mfsa2023-03/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1800832 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24772.
CVE ID: CVE-2024-24772 Date Updated: 2024-08-01T23:28:11.938Z Date Published: 2024-02-28T11:26:45.745Z Description: A guest user could exploit a chart data REST API and send arbitrary SQL statements that on error could leak information from the underlying analytics database.This issue affects Apache Superset: before 3.0.4, from 3.1.0 before 3.1.1. Users are recommended to upgrade to version 3.1.1 or 3.0.4, which fixes the issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5 - http://www.openwall.com/lists/oss-security/2024/02/28/5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41619.
CVE ID: CVE-2023-41619 Date Updated: 2024-08-27T15:41:09.807Z Date Published: 2024-01-16T00:00:00 Description: Emlog Pro v2.1.14 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/article.php?action=write. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/emlog/emlog - https://github.com/GhostBalladw/wuhaozhe-s-CVE/blob/main/CVE-2023-41619 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36304.
CVE ID: CVE-2024-36304 Date Updated: 2024-08-02T03:37:04.674Z Date Published: 2024-06-10T21:21:04.492Z Description: A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://success.trendmicro.com/dcx/s/solution/000298063 - https://www.zerodayinitiative.com/advisories/ZDI-24-571/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41072.
CVE ID: CVE-2021-41072 Date Updated: 2024-08-04T02:59:31.057Z Date Published: 2021-09-14T00:00:00 Description: squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd - https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405 - https://www.debian.org/security/2021/dsa-4987 - https://lists.debian.org/debian-lts-announce/2021/10/msg00017.html - https://security.gentoo.org/glsa/202305-29 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46477.
CVE ID: CVE-2021-46477 Date Updated: 2024-08-04T05:10:35.313Z Date Published: 2022-01-25T00:24:01 Description: Jsish v3.5.0 was discovered to contain a heap buffer overflow via RegExp_constructor in src/jsiRegexp.c. This vulnerability can lead to a Denial of Service (DoS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/pcmacdon/jsish/issues/63 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6452.
CVE ID: CVE-2019-6452 Date Updated: 2024-08-04T20:23:20.852Z Date Published: 2019-06-06T18:06:26 Description: Kyocera Command Center RX TASKalfa4501i and TASKalfa5052ci allows remote attackers to abuse the Test button in the machine address book to obtain a cleartext FTP or SMB password. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.nccst.nat.gov.tw - https://github.com/cvereveal/CVEs/tree/master/CVE-2019-6452 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-44879.
CVE ID: CVE-2021-44879 Date Updated: 2024-08-04T04:32:13.259Z Date Published: 2022-02-13T00:00:00 Description: In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 - https://bugzilla.kernel.org/show_bug.cgi?id=215231 - https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao%40kernel.org/T/ - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f - https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html - https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27056.
CVE ID: CVE-2024-27056 Date Updated: 2024-08-02T00:21:05.952Z Date Published: 2024-05-01T12:54:56.461Z Description: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: ensure offloading TID queue exists The resume code path assumes that the TX queue for the offloading TID has been configured. At resume time it then tries to sync the write pointer as it may have been updated by the firmware. In the unusual event that no packets have been send on TID 0, the queue will not have been allocated and this causes a crash. Fix this by ensuring the queue exist at suspend time. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/ed35a509390ef4011ea2226da5dd6f62b73873b5 - https://git.kernel.org/stable/c/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8642.
CVE ID: CVE-2019-8642 Date Updated: 2024-08-04T21:24:29.585Z Date Published: 2020-10-27T19:38:49 Description: An issue existed in the handling of S-MIME certificates. This issue was addressed with improved validation of S-MIME certificates. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. Processing a maliciously crafted mail message may lead to S/MIME signature spoofing. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT209600 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-5299.
CVE ID: CVE-2011-5299 Date Updated: 2024-09-16T17:07:39.247Z Date Published: 2015-01-01T11:00:00Z Description: Multiple cross-site scripting (XSS) vulnerabilities in poMMo Aardvark PR16.1 allow remote attackers to inject arbitrary web script or HTML via (1) the referer parameter to index.php, (2) the site_name parameter to admin/setup/config/general.php, (3) the group_name parameter to admin/subscribers/subscribers_groups.php, or (4) the field_name parameter to admin/setup/setup_fields.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.htbridge.com/advisory/HTB22976 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25575.
CVE ID: CVE-2022-25575 Date Updated: 2024-08-03T04:42:50.001Z Date Published: 2022-03-24T21:32:44 Description: Multiple cross-site scripting (XSS) vulnerabilities in Parking Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via crafted payloads injected into the user name, password, and verification code text boxes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/gou-web/Parking-management-systemXSS-/blob/main/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22000.
CVE ID: CVE-2022-22000 Date Updated: 2024-08-03T03:00:54.671Z Date Published: 2022-02-09T16:36:51 Description: Windows Common Log File System Driver Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22000 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4507.
CVE ID: CVE-2017-4507 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-12908.
CVE ID: CVE-2017-12908 Date Updated: 2024-08-05T18:51:07.354Z Date Published: 2017-08-17T20:00:00 Description: SQL injection vulnerability in takeconfirm.php in NexusPHP 1.5 allows remote attackers to execute arbitrary SQL commands via the conusr parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lu4n.com/cve/8.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-5280.
CVE ID: CVE-2011-5280 Date Updated: 2024-09-17T04:14:28.124Z Date Published: 2014-06-02T15:00:00Z Description: Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2013/04/28/3 - http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7 - http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1206.
CVE ID: CVE-2012-1206 Date Updated: 2024-08-06T18:53:36.420Z Date Published: 2012-02-20T19:00:00 Description: Multiple integer overflows in Hancom Office 2010 SE 8.5.5 allow remote attackers to execute arbitrary code via large dimension values in a (1) JPG image to the ImportGR in the JPG image filter module (HncJpeg10.flt) or (2) PNG image to the PNG image filter module (HncPng10.flt), which triggers a heap-based buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/73026 - http://www.hancom.co.kr/notice.noticeView.do?targetRow=1&notice_seqno=100 - http://secunia.com/advisories/47386 - https://exchange.xforce.ibmcloud.com/vulnerabilities/73025 - http://osvdb.org/78906 - http://www.securityfocus.com/bid/51892 - http://osvdb.org/78907 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8648.
CVE ID: CVE-2019-8648 Date Updated: 2024-08-04T21:24:29.520Z Date Published: 2019-12-18T17:33:20 Description: A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3. A remote attacker may be able to cause arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT210353 - https://support.apple.com/HT210346 - https://support.apple.com/HT210348 - https://support.apple.com/HT210351 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39549.
CVE ID: CVE-2021-39549 Date Updated: 2024-08-04T02:06:42.607Z Date Published: 2021-09-20T15:26:58 Description: An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function file::WavFile::WavFile() located in wav_file.c. It allows an attacker to cause Denial of Service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/sahaRatul/sela/issues/27 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4219.
CVE ID: CVE-2017-4219 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27797.
CVE ID: CVE-2020-27797 Date Updated: 2024-08-04T16:25:43.623Z Date Published: 2022-08-25T19:37:18 Description: An invalid memory address reference was discovered in the elf_lookup function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/upx/upx/issues/390 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26473.
CVE ID: CVE-2022-26473 Date Updated: 2024-08-03T05:03:32.776Z Date Published: 2022-10-07T00:00:00 Description: In vdec fmt, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07342197; Issue ID: ALPS07342197. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/October-2022 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16277.
CVE ID: CVE-2017-16277 Date Updated: 2024-08-05T20:20:05.579Z Date Published: 2023-01-11T21:39:45.701Z Description: Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd sn_grp, at 0x9d017658, the value for the `gcmd` key is copied using `strcpy` to the buffer at `$sp+0x270`.This buffer is 16 bytes large, sending anything longer will cause a buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6739.
CVE ID: CVE-2014-6739 Date Updated: 2024-08-06T12:24:35.645Z Date Published: 2014-09-27T01:00:00 Description: The Well-Being Connect Mobile (aka com.healthways.wellbeinggo) application 2.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/915401 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24296.
CVE ID: CVE-2021-24296 Date Updated: 2024-08-03T19:28:23.433Z Date Published: 2021-05-24T10:58:04 Description: The WP Customer Reviews WordPress plugin before 3.5.6 did not sanitise some of its settings, allowing high privilege users such as administrators to set XSS payloads in them which will then be triggered in pages where reviews are enabled No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/c450f54a-3372-49b2-8ad8-68d5cc0dd49e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13294.
CVE ID: CVE-2020-13294 Date Updated: 2024-08-04T12:11:19.494Z Date Published: 2020-08-10T13:30:12 Description: In GitLab before 13.0.12, 13.1.6 and 13.2.3, access grants were not revoked when a user revoked access to an application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13294.json - https://gitlab.com/gitlab-org/gitlab/-/issues/26147 - https://hackerone.com/reports/469728 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2512.
CVE ID: CVE-2010-2512 Date Updated: 2024-09-16T20:57:35.443Z Date Published: 2010-06-28T20:00:00Z Description: SQL injection vulnerability in customprofile.php in 2daybiz Matrimonial Script allows remote attackers to execute arbitrary SQL commands via the id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/41109 - http://www.osvdb.org/65712 - http://secunia.com/advisories/40338 - http://www.exploit-db.com/exploits/14008 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2159.
CVE ID: CVE-2018-2159 Date Updated: 2019-01-22T17:57:02 Date Published: 2019-01-22T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20912.
CVE ID: CVE-2022-20912 Date Updated: 2024-09-17T00:46:23.479Z Date Published: 2022-07-21T04:06:09.642744Z Description: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-45622.
CVE ID: CVE-2023-45622 Date Updated: 2024-08-12T14:39:21.446Z Date Published: 2023-11-14T22:55:20.319Z Description: Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the BLE daemon service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-5317.
CVE ID: CVE-2011-5317 Date Updated: 2024-09-16T18:54:28.199Z Date Published: 2015-01-01T11:00:00Z Description: Cross-site scripting (XSS) vulnerability in editText.php in WonderCMS before 0.4 allows remote attackers to inject arbitrary web script or HTML via the content parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.htbridge.com/advisory/HTB22759 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10849.
CVE ID: CVE-2019-10849 Date Updated: 2024-08-04T22:32:02.130Z Date Published: 2019-05-23T19:05:01 Description: Computrols CBAS 18.0.0 allows unprotected Subversion (SVN) directory / source code disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://applied-risk.com/labs/advisories - https://applied-risk.com/index.php/download_file/view/196/165 - http://packetstormsecurity.com/files/155248/Computrols-CBAS-Web-19.0.0-Information-Disclosure.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-7424.
CVE ID: CVE-2013-7424 Date Updated: 2024-08-06T18:09:16.606Z Date Published: 2015-08-26T19:00:00 Description: The getaddrinfo function in glibc before 2.15, when compiled with libidn and the AI_IDN flag is used, allows context-dependent attackers to cause a denial of service (invalid free) and possibly execute arbitrary code via unspecified vectors, as demonstrated by an internationalized domain name to ping6. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1186614 - http://www.openwall.com/lists/oss-security/2015/01/29/21 - https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=2e96f1c7 - http://rhn.redhat.com/errata/RHSA-2015-1627.html - https://bugzilla.redhat.com/show_bug.cgi?id=981942 - https://sourceware.org/bugzilla/show_bug.cgi?id=18011 - http://www.securityfocus.com/bid/72710 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3293.
CVE ID: CVE-2012-3293 Date Updated: 2024-08-06T19:57:50.520Z Date Published: 2012-08-21T10:00:00 Description: Cross-site scripting (XSS) vulnerability in the Administrative Console in IBM WebSphere Application Server (WAS) 6.1.x before 6.1.0.45, 7.0.x before 7.0.0.25, 8.0.x before 8.0.0.4, and 8.5.x before 8.5.0.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving FRAME elements, related to a cross-frame scripting (XFS) issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/77179 - http://www-01.ibm.com/support/docview.wss?uid=swg21606096 - http://www.securityfocus.com/bid/55149 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM60839 - http://www-01.ibm.com/support/docview.wss?uid=swg27022958 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11480.
CVE ID: CVE-2019-11480 Date Updated: 2024-09-16T20:46:41.386Z Date Published: 2020-04-14T02:10:13.554325Z Description: The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. This could allow an attacker who is able to perform a MITM attack between the build environment and the Ubuntu archive to install a malicious package within the build chroot. This issue affects pc-kernel versions prior to and including 2019-07-16 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11480 - https://bugs.launchpad.net/bugs/1836041 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-29257.
CVE ID: CVE-2023-29257 Date Updated: 2024-08-02T14:00:16.066Z Date Published: 2023-04-26T12:56:10.502Z Description: IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to remote code execution as a database administrator of one database may execute code or read/write files from another database within the same instance. IBM X-Force ID: 252011. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6985691 - https://exchange.xforce.ibmcloud.com/vulnerabilities/252011 - https://security.netapp.com/advisory/ntap-20230511-0010/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-2361.
CVE ID: CVE-2021-2361 Date Updated: 2024-09-26T14:02:12.983Z Date Published: 2021-07-20T22:43:38 Description: Vulnerability in the Oracle Advanced Inbound Telephony product of Oracle E-Business Suite (component: SDK client integration). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Advanced Inbound Telephony. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Advanced Inbound Telephony accessible data as well as unauthorized access to critical data or complete access to all Oracle Advanced Inbound Telephony accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujul2021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0501.
CVE ID: CVE-2015-0501 Date Updated: 2024-08-06T04:10:10.963Z Date Published: 2015-04-16T16:00:00 Description: Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201507-19 - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 - http://www.debian.org/security/2015/dsa-3229 - http://www.securitytracker.com/id/1032121 - http://www.debian.org/security/2015/dsa-3311 - http://rhn.redhat.com/errata/RHSA-2015-1647.html - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html - http://rhn.redhat.com/errata/RHSA-2015-1628.html - http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html - http://www.ubuntu.com/usn/USN-2575-1 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:227 - https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/ - http://rhn.redhat.com/errata/RHSA-2015-1629.html - http://rhn.redhat.com/errata/RHSA-2015-1665.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4449.
CVE ID: CVE-2022-4449 Date Updated: 2024-08-03T01:41:44.457Z Date Published: 2023-01-16T15:37:41.047Z Description: The Page scroll to id WordPress plugin before 1.7.6 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/a4895f8d-5a4c-49cb-b144-b761ed82923d No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1713.
CVE ID: CVE-2008-1713 Date Updated: 2024-08-07T08:32:01.092Z Date Published: 2008-04-09T21:00:00 Description: MailServer.exe in NoticeWare Email Server 4.6.1.0 allows remote attackers to cause a denial of service (application crash) via a long string to IMAP port (143/tcp). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/29629 - http://www.securityfocus.com/bid/28559 - https://www.exploit-db.com/exploits/5341 - https://exchange.xforce.ibmcloud.com/vulnerabilities/41581 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.