instruction
stringlengths 49
63
⌀ | input
stringlengths 0
69
| output
stringlengths 221
18.7k
|
|---|---|---|
Provide detailed information about CVE-2021-0073.
|
CVE ID: CVE-2021-0073
Date Updated: 2024-08-03T15:25:01.834Z
Date Published: 2021-06-09T19:07:22
Description:
Insufficient control flow management in Intel(R) DSA before version 20.11.50.9 may allow an authenticated user to potentially enable escalation of privilege via local access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00510.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-27416.
|
CVE ID: CVE-2020-27416
Date Updated: 2024-08-04T16:18:43.457Z
Date Published: 2021-12-08T18:36:50
Description:
Mahavitaran android application 7.50 and prior are affected by account takeover due to improper OTP validation, allows remote attackers to control a users account.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://play.google.com/store/apps/details?id=com.msedcl.app&hl=en&gl=US
- https://cvewalkthrough.com/cve-2021-41716-mahavitaran-android-application-account-take-over-via-otp-fixation/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-3542.
|
CVE ID: CVE-2017-3542
Date Updated: 2024-08-05T14:30:58.102Z
Date Published: 2017-04-24T19:00:00
Description:
Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Server). Supported versions that are affected are 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebCenter Sites. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1038291
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.securityfocus.com/bid/97760
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-20659.
|
CVE ID: CVE-2018-20659
Date Updated: 2024-08-05T12:05:17.684Z
Date Published: 2019-01-02T17:00:00
Description:
An issue was discovered in Bento4 1.5.1-627. The AP4_StcoAtom class in Core/Ap4StcoAtom.cpp has an attempted excessive memory allocation when called from AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp, as demonstrated by mp42hls.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/axiomatic-systems/Bento4/issues/350
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-2130.
|
CVE ID: CVE-2023-2130
Date Updated: 2024-08-02T06:12:20.407Z
Date Published: 2023-04-17T20:00:06.747Z
Description:
A vulnerability classified as critical has been found in SourceCodester Purchase Order Management System 1.0. Affected is an unknown function of the file /admin/suppliers/view_details.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226206 is the identifier assigned to this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.226206
- https://vuldb.com/?ctiid.226206
- https://github.com/zitozito1/bug_report/blob/main/SQLi.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-5325.
|
CVE ID: CVE-2010-5325
Date Updated: 2024-08-07T04:17:10.191Z
Date Published: 2016-04-15T14:00:00
Description:
Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1218297
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://bzr.linuxfoundation.org/loggerhead/openprinting/foomatic-4.0/foomatic-filters/annotate/head:/ChangeLog
- https://bugs.linuxfoundation.org/show_bug.cgi?id=515
- http://rhn.redhat.com/errata/RHSA-2016-0491.html
- http://www.openwall.com/lists/oss-security/2016/02/15/1
- http://www.openwall.com/lists/oss-security/2016/02/15/7
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-1189.
|
CVE ID: CVE-2011-1189
Date Updated: 2024-08-06T22:21:33.457Z
Date Published: 2011-03-11T01:00:00
Description:
Google Chrome before 10.0.648.127 does not properly perform box layout, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale node."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14370
- http://www.securityfocus.com/bid/46785
- http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65953
- http://code.google.com/p/chromium/issues/detail?id=70027
- http://www.vupen.com/english/advisories/2011/0628
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-3846.
|
CVE ID: CVE-2019-3846
Date Updated: 2024-08-04T19:19:18.683Z
Date Published: 2019-06-03T18:25:57
Description:
A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://seclists.org/oss-sec/2019/q2/133
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3846
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
- https://www.debian.org/security/2019/dsa-4465
- https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
- https://seclists.org/bugtraq/2019/Jun/26
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
- https://security.netapp.com/advisory/ntap-20190710-0002/
- https://seclists.org/bugtraq/2019/Jul/33
- http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://usn.ubuntu.com/4093-1/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4095-2/
- https://usn.ubuntu.com/4095-1/
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- https://usn.ubuntu.com/4117-1/
- https://usn.ubuntu.com/4118-1/
- https://access.redhat.com/errata/RHSA-2019:2703
- https://access.redhat.com/errata/RHSA-2019:2741
- https://access.redhat.com/errata/RHSA-2019:3076
- https://access.redhat.com/errata/RHSA-2019:3055
- https://access.redhat.com/errata/RHSA-2019:3089
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- https://access.redhat.com/errata/RHSA-2020:0174
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-23012.
|
CVE ID: CVE-2023-23012
Date Updated: 2024-08-02T10:28:40.872Z
Date Published: 2023-01-20T00:00:00
Description:
Cross Site Scripting (XSS) vulnerability in craigrodway classroombookings 2.6.4 allows attackers to execute arbitrary code or other unspecified impacts via the input bgcol in file Weeks.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gist.github.com/enferas/bd8ec37999c216eceabd6b80d5a95f94
- https://github.com/craigrodway/classroombookings/issues/52
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2009-1903.
|
CVE ID: CVE-2009-1903
Date Updated: 2024-08-07T05:27:54.904Z
Date Published: 2009-06-03T16:33:00
Description:
The PDF XSS protection feature in ModSecurity before 2.5.8 allows remote attackers to cause a denial of service (Apache httpd crash) via a request for a PDF file that does not use the GET method.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00487.html
- http://www.osvdb.org/52552
- http://security.gentoo.org/glsa/glsa-200907-02.xml
- http://secunia.com/advisories/34256
- http://secunia.com/advisories/35687
- http://secunia.com/advisories/34311
- https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00529.html
- http://sourceforge.net/project/shownotes.php?release_id=667538
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49211
- http://www.vupen.com/english/advisories/2009/0703
- http://www.securityfocus.com/bid/34096
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-29903.
|
CVE ID: CVE-2021-29903
Date Updated: 2024-09-16T23:00:34.408Z
Date Published: 2021-10-06T17:10:44.242107Z
Description:
IBM Sterling B2B Integrator Standard Edition 5.2.6.0 through 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 207506.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/6495919
- https://exchange.xforce.ibmcloud.com/vulnerabilities/207506
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-32316.
|
CVE ID: CVE-2023-32316
Date Updated: 2024-08-02T15:10:24.975Z
Date Published: 2023-05-26T22:36:29.633Z
Description:
CloudExplorer Lite is an open source cloud management tool. In affected versions users can add themselves to any organization in CloudExplorer Lite. This is due to a missing permission check on the user profile. It is recommended to upgrade the version to v1.1.0. There are no known workarounds for this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/security/advisories/GHSA-cp3j-437h-4vwj
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2008-0086.
|
CVE ID: CVE-2008-0086
Date Updated: 2024-08-07T07:32:23.907Z
Date Published: 2008-07-08T23:00:00
Description:
Buffer overflow in the convert function in Microsoft SQL Server 2000 SP4, 2000 Desktop Engine (MSDE 2000) SP4, and 2000 Desktop Engine (WMSDE) allows remote authenticated users to execute arbitrary code via a crafted SQL expression.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id?1020441
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14052
- http://secunia.com/advisories/30970
- http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
- http://www.vupen.com/english/advisories/2008/2022/references
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040
- http://www.securityfocus.com/archive/1/494082/100/0/threaded
- http://www.vmware.com/security/advisories/VMSA-2011-0003.html
- http://www.us-cert.gov/cas/techalerts/TA08-190A.html
- http://www.securityfocus.com/archive/1/516397/100/0/threaded
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-6936.
|
CVE ID: CVE-2018-6936
Date Updated: 2024-08-05T06:17:17.283Z
Date Published: 2018-02-21T22:00:00
Description:
Cross Site Scripting (XSS) exists on the D-Link DIR-600M C1 3.01 via the SSID or the name of a user account.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/44219/
- https://0day4u.wordpress.com/2018/02/21/d-link-dir-600m-wireless-stored-xss/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-19599.
|
CVE ID: CVE-2018-19599
Date Updated: 2024-08-05T11:37:11.532Z
Date Published: 2020-03-02T19:45:40
Description:
Monstra CMS 1.6 allows XSS via an uploaded SVG document to the admin/index.php?id=filesmanager&path=uploads/ URI. NOTE: this is a discontinued product.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/security-provensec/CVE-2018-19599/blob/master/monstra-dev_svg.pdf
- https://github.com/monstra-cms/monstra/issues/467
- https://anh.im/image/lG1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-3176.
|
CVE ID: CVE-2021-3176
Date Updated: 2024-08-03T16:45:51.316Z
Date Published: 2021-01-29T06:29:19
Description:
The chat window of the Mitel BusinessCTI Enterprise (MBC-E) Client for Windows before 6.4.15 and 7.x before 7.1.2 could allow an attacker to gain access to user information by sending certain code, due to improper input validation of http links. A successful exploit could allow an attacker to view user information and application data.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.mitel.com/support/security-advisories
- https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0001
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-3065.
|
CVE ID: CVE-2010-3065
Date Updated: 2024-08-07T02:55:46.863Z
Date Published: 2010-08-20T19:00:00
Description:
The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://php-security.org/2010/05/31/mops-2010-060-php-session-serializer-session-data-injection-vulnerability/index.html
- http://www.debian.org/security/2010/dsa-2089
- http://www.redhat.com/support/errata/RHSA-2010-0919.html
- http://secunia.com/advisories/42410
- http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
- http://www.vupen.com/english/advisories/2010/3081
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-38883.
|
CVE ID: CVE-2024-38883
Date Updated: 2024-08-07T15:29:18.126968
Date Published: 2024-08-02T00:00:00
Description:
An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a remote attacker to perform a Drop Encryption Level attack due to the selection of a less-secure algorithm during negotiation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://caterease.com
- http://horizon.com
- https://vuldb.com/?id.273367
- https://packetstormsecurity.com/files/179892/Caterease-Software-SQL-Injection-Command-Injection-Bypass.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-23863.
|
CVE ID: CVE-2024-23863
Date Updated: 2024-08-01T23:13:08.223Z
Date Published: 2024-01-26T09:06:53.297Z
Description:
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/taxstructuredisplay.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-9028.
|
CVE ID: CVE-2019-9028
Date Updated: 2024-08-04T21:38:45.561Z
Date Published: 2019-02-23T12:00:00
Description:
An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is a stack-based buffer over-read in the function InflateDimensions() in inflate.c when called from ReadNextCell in mat5.c.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/tbeu/matio/issues/103
- https://github.com/TeamSeri0us/pocs/tree/master/matio
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-11201.
|
CVE ID: CVE-2020-11201
Date Updated: 2024-08-04T11:28:13.600Z
Date Published: 2020-11-12T10:00:56
Description:
Arbitrary access to DSP memory due to improper check in loaded library for data received from CPU side' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA845, SDM640, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/
- https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
- https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-28639.
|
CVE ID: CVE-2022-28639
Date Updated: 2024-08-03T05:56:16.403Z
Date Published: 2022-09-20T20:06:05
Description:
A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-4750.
|
CVE ID: CVE-2024-4750
Date Updated: 2024-08-01T20:47:41.684Z
Date Published: 2024-06-04T06:00:02.993Z
Description:
The buddyboss-platform WordPress plugin before 2.6.0 contains an IDOR vulnerability that allows a user to like a private post by manipulating the ID included in the request
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/ffbe4034-842b-43b0-97d1-208811376dea/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-5701.
|
CVE ID: CVE-2017-5701
Date Updated: 2024-09-17T03:02:24.375Z
Date Published: 2017-10-11T00:00:00Z
Description:
Insecure platform configuration in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows an attacker with physical presence to run arbitrary code via unauthorized firmware modification during BIOS Recovery.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00084&languageid=en-fr
- http://www.securityfocus.com/bid/101257
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-11687.
|
CVE ID: CVE-2019-11687
Date Updated: 2024-08-04T23:03:32.415Z
Date Published: 2019-05-02T21:07:15
Description:
An issue was discovered in the DICOM Part 10 File Format in the NEMA DICOM Standard 1995 through 2019b. The preamble of a DICOM file that complies with this specification can contain the header for an executable file, such as Portable Executable (PE) malware. This space is left unspecified so that dual-purpose files can be created. (For example, dual-purpose TIFF/DICOM files are used in digital whole slide imaging for applications in medicine.) To exploit this vulnerability, someone must execute a maliciously crafted file that is encoded in the DICOM Part 10 File Format. PE/DICOM files are executable even with the .dcm file extension. Anti-malware configurations at healthcare facilities often ignore medical imagery. Also, anti-malware tools and business processes could violate regulatory frameworks (such as HIPAA) when processing suspicious DICOM files.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://labs.cylera.com/2019.04.16/pe-dicom-medical-malware
- https://github.com/d00rt/pedicom/blob/master/doc/Attacking_Digital_Imaging_and_Communication_in_Medicine_%28DICOM%29_file_format_standard_-_Markel_Picado_Ortiz_%28d00rt%29.pdf
- https://github.com/d00rt/pedicom
- http://www.securityfocus.com/bid/108730
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-4418.
|
CVE ID: CVE-2018-4418
Date Updated: 2024-08-05T05:11:22.777Z
Date Published: 2019-04-03T17:43:18
Description:
A validation issue was addressed with improved input sanitization. This issue affected versions prior to macOS Mojave 10.14.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/kb/HT209193
- https://support.apple.com/kb/HT209139
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-40538.
|
CVE ID: CVE-2022-40538
Date Updated: 2024-08-03T12:21:46.267Z
Date Published: 2023-06-06T07:39:05.416Z
Description:
Transient DOS due to reachable assertion in modem while processing sib with incorrect values from network.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-4489.
|
CVE ID: CVE-2022-4489
Date Updated: 2024-08-03T01:41:45.022Z
Date Published: 2023-02-06T19:59:48.440Z
Description:
The HUSKY WordPress plugin before 1.3.2 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/067573f2-b1e6-49a9-8c5b-f91e3b9d722f
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-8206.
|
CVE ID: CVE-2019-8206
Date Updated: 2024-08-04T21:10:33.515Z
Date Published: 2019-10-17T20:24:16
Description:
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/acrobat/apsb19-49.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-15451.
|
CVE ID: CVE-2018-15451
Date Updated: 2024-09-17T01:26:12.751Z
Date Published: 2018-11-08T20:00:00Z
Description:
A vulnerability in the web-based management interface of Cisco Prime Service Catalog could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/105857
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-psc-xss
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-28350.
|
CVE ID: CVE-2022-28350
Date Updated: 2024-08-03T05:56:14.915Z
Date Published: 2022-05-19T01:04:14
Description:
Arm Mali GPU Kernel Driver allows improper GPU operations in Valhall r29p0 through r36p0 before r37p0 to reach a use-after-free situation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://developer.arm.com/support/arm-security-updates
- https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-5198.
|
CVE ID: CVE-2015-5198
Date Updated: 2024-08-06T06:41:08.471Z
Date Published: 2015-09-08T15:00:00
Description:
libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to gain privileges via unspecified vectors, related to the VDPAU_DRIVER_PATH environment variable.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167469.html
- http://www.securityfocus.com/bid/76636
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170637.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165546.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1253824
- http://www.ubuntu.com/usn/USN-2729-1
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00012.html
- http://lists.x.org/archives/xorg-announce/2015-August/002630.html
- http://www.debian.org/security/2015/dsa-3355
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-11109.
|
CVE ID: CVE-2019-11109
Date Updated: 2024-08-04T22:48:08.655Z
Date Published: 2019-12-18T21:09:56
Description:
Logic issue in the subsystem for Intel(R) SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html
- https://support.f5.com/csp/article/K54164678?utm_source=f5support&%3Butm_medium=RSS
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-20252.
|
CVE ID: CVE-2019-20252
Date Updated: 2022-09-29T16:51:49
Date Published: 2020-01-02T20:33:06
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-4563.
|
CVE ID: CVE-2013-4563
Date Updated: 2024-08-06T16:45:15.247Z
Date Published: 2013-11-19T15:00:00
Description:
The udp6_ufo_fragment function in net/ipv6/udp_offload.c in the Linux kernel through 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly perform a certain size comparison before inserting a fragment header, which allows remote attackers to cause a denial of service (panic) via a large IPv6 UDP packet, as demonstrated by use of the Token Bucket Filter (TBF) queueing discipline.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.ubuntu.com/usn/USN-2113-1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0e033e04c2678dbbe74a46b23fffb7bb918c288e
- http://www.ubuntu.com/usn/USN-2117-1
- https://github.com/torvalds/linux/commit/0e033e04c2678dbbe74a46b23fffb7bb918c288e
- https://bugzilla.redhat.com/show_bug.cgi?id=1030015
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html
- http://www.openwall.com/lists/oss-security/2013/11/13/9
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-2077.
|
CVE ID: CVE-2012-2077
Date Updated: 2024-08-06T19:17:27.814Z
Date Published: 2012-08-14T23:00:00
Description:
Cross-site request forgery (CSRF) vulnerability in the ShareThis module 7.x-2.x before 7.x-2.3 for Drupal allows remote attackers to hijack the authentication of users with administer sharethis permissions via unknown vectors "outside of the Form API."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://drupalcode.org/project/sharethis.git/commit/11f247a
- http://secunia.com/advisories/48598
- http://www.openwall.com/lists/oss-security/2012/04/07/1
- http://www.osvdb.org/80681
- http://www.securityfocus.com/bid/52778
- http://drupal.org/node/1506448
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74518
- http://drupal.org/node/1504746
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-21978.
|
CVE ID: CVE-2021-21978
Date Updated: 2024-08-03T18:30:23.441Z
Date Published: 2021-03-03T17:44:25
Description:
VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.vmware.com/security/advisories/VMSA-2021-0003.html
- http://packetstormsecurity.com/files/161879/VMware-View-Planner-4.6-Remote-Code-Execution.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-8639.
|
CVE ID: CVE-2020-8639
Date Updated: 2024-08-04T10:03:46.367Z
Date Published: 2020-04-03T18:36:44
Description:
An unrestricted file upload vulnerability in keywordsImport.php in TestLink 1.9.20 allows remote attackers to execute arbitrary code by uploading a file with an executable extension. This allows an authenticated attacker to upload a malicious file (containing PHP code to execute operating system commands) to a publicly accessible directory of the application.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://ackcent.com/blog/testlink-1.9.20-unrestricted-file-upload-and-sql-injection/
- https://github.com/TestLinkOpenSourceTRMS/testlink-code/commit/57d81ae350d569c5c95087997fe051c49e14516d
- http://packetstormsecurity.com/files/161401/TestLink-1.9.20-Shell-Upload.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-6822.
|
CVE ID: CVE-2013-6822
Date Updated: 2024-08-06T17:46:23.872Z
Date Published: 2013-11-19T19:00:00
Description:
GRMGApp in SAP NetWeaver allows remote attackers to have unspecified impact and attack vectors, related to an XML External Entity (XXE) issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://scn.sap.com/docs/DOC-8218
- https://erpscan.io/advisories/dsecrg-13-002-sap-grmgapp-xxe-and-authentication-bypass/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-0401.
|
CVE ID: CVE-2024-0401
Date Updated: 2024-08-01T18:04:49.502Z
Date Published: 2024-05-20T16:55:18.891Z
Description:
ASUS routers supporting custom OpenVPN profiles are vulnerable to a code execution vulnerability. An authenticated and remote attacker can execute arbitrary operating system commands by uploading a crafted OVPN profile. Known affected routers include ASUS ExpertWiFi, ASUS RT-AX55, ASUS RT-AX58U, ASUS RT-AC67U, ASUS RT-AC68R, ASUS RT-AC68U, ASUS RT-AX86, ASUS RT-AC86U, ASUS RT-AX88U, and ASUS RT-AX3000.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vulncheck.com/advisories/asus-ovpn-rce
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-0586.
|
CVE ID: CVE-2014-0586
Date Updated: 2024-08-06T09:20:19.868Z
Date Published: 2014-11-11T23:00:00
Description:
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, and CVE-2014-0590.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://helpx.adobe.com/security/products/flash-player/apsb14-24.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-21351.
|
CVE ID: CVE-2024-21351
Date Updated: 2024-08-01T22:20:40.468Z
Date Published: 2024-02-13T18:02:12.076Z
Description:
Windows SmartScreen Security Feature Bypass Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21351
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-5080.
|
CVE ID: CVE-2011-5080
Date Updated: 2024-09-17T04:20:40.511Z
Date Published: 2012-02-14T17:00:00Z
Description:
Cross-site scripting (XSS) vulnerability in lib/class.tx_jftcaforms_tceFunc.php in the Additional TCA Forms (jftcaforms) extension before 0.2.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/
- http://forge.typo3.org/projects/extension-jftcaforms/repository/diff?rev=51637&rev_to=51568
- http://www.securityfocus.com/bid/51854
- http://osvdb.org/78800
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-2654.
|
CVE ID: CVE-2011-2654
Date Updated: 2024-08-06T23:08:23.750Z
Date Published: 2011-09-06T15:00:00
Description:
The RPC implementation in the server in Novell Cloud Manager 1.1.2 before Patch 3 does not properly initialize objects, which allows remote attackers to execute arbitrary code by making RPC calls that leverage incorrect privileges associated with a partially initialized session.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://download.novell.com/Download?buildid=NSONlV5PqMo~
- http://www.securityfocus.com/bid/49432
- http://www.securitytracker.com/id?1026006
- http://zerodayinitiative.com/advisories/ZDI-11-278/
- http://secunia.com/advisories/45845
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-32392.
|
CVE ID: CVE-2024-32392
Date Updated: 2024-08-02T02:06:44.226Z
Date Published: 2024-04-19T00:00:00
Description:
Cross Site Scripting vulnerability in CmSimple v.5.15 allows a remote attacker to execute arbitrary code via the functions.php component.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/Hebing123/cve/issues/33
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-25715.
|
CVE ID: CVE-2022-25715
Date Updated: 2024-08-03T04:49:42.787Z
Date Published: 2023-01-06T04:42:11.906Z
Description:
Memory corruption in display driver due to incorrect type casting while accessing the fence structure fields
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-24148.
|
CVE ID: CVE-2022-24148
Date Updated: 2024-08-03T04:07:01.551Z
Date Published: 2022-02-04T01:33:20
Description:
Tenda AX3 v16.03.12.10_CN was discovered to contain a command injection vulnerability in the function mDMZSetCfg. This vulnerability allows attackers to execute arbitrary commands via the dmzIp parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/pjqwudi/my_vuln/blob/main/Tenda/vuln_14/14.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-3949.
|
CVE ID: CVE-2019-3949
Date Updated: 2024-08-04T19:26:27.676Z
Date Published: 2019-07-09T17:18:31
Description:
Arlo Basestation firmware 1.12.0.1_27940 and prior firmware contain a networking misconfiguration that allows access to restricted network interfaces. This could allow an attacker to upload or download arbitrary files and possibly execute malicious code on the device.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.arlo.com/000062274/Security-Advisory-for-Networking-Misconfiguration-and-Insufficient-UART-Protection-Mechanisms
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-8367.
|
CVE ID: CVE-2024-8367
Date Updated: 2024-09-03T14:06:34.449Z
Date Published: 2024-09-01T04:00:05.840Z
Description:
A vulnerability was found in HM Courts & Tribunals Service Probate Back Office up to c1afe0cdb2b2766d9e24872c4e827f8b82a6cd31. It has been classified as problematic. Affected is an unknown function of the file src/main/java/uk/gov/hmcts/probate/service/NotificationService.java of the component Markdown Handler. The manipulation leads to injection. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as d90230d7cf575e5b0852d56660104c8bd2503c34. It is recommended to apply a patch to fix this issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.276270
- https://vuldb.com/?ctiid.276270
- https://tools.hmcts.net/jira/browse/DTSPB-4180
- https://github.com/hmcts/probate-back-office/pull/2614
- https://github.com/hmcts/probate-back-office/commit/d90230d7cf575e5b0852d56660104c8bd2503c34
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-2415.
|
CVE ID: CVE-2011-2415
Date Updated: 2024-08-06T23:00:33.847Z
Date Published: 2011-08-10T22:00:00
Description:
Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2414.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html
- http://secunia.com/advisories/48308
- http://www.us-cert.gov/cas/techalerts/TA11-222A.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16070
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13940
- http://www.adobe.com/support/security/bulletins/apsb11-21.html
- http://www.securityfocus.com/bid/49077
- http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html
- http://www.redhat.com/support/errata/RHSA-2011-1144.html
- http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-3906.
|
CVE ID: CVE-2021-3906
Date Updated: 2024-08-03T17:09:09.761Z
Date Published: 2021-10-27T21:20:10
Description:
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.dev/bounties/f115bdf5-c06b-4627-a6fa-ba6904a43ba3
- https://github.com/bookstackapp/bookstack/commit/64937ab826b56d086af9ecea532510d37520ebc8
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-34064.
|
CVE ID: CVE-2023-34064
Date Updated: 2024-08-02T16:01:53.919Z
Date Published: 2023-12-12T19:50:51.210Z
Description:
Workspace ONE Launcher contains a Privilege Escalation Vulnerability. A malicious actor with physical access to Workspace ONE Launcher could utilize the Edge Panel feature to bypass setup to gain access to sensitive information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.vmware.com/security/advisories/VMSA-2023-0027.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-30766.
|
CVE ID: CVE-2023-30766
Date Updated: 2024-08-02T14:37:14.935Z
Date Published: 2023-06-13T00:00:00
Description:
Hidden functionality issue exists in KB-AHR series and KB-IRIP series. If this vulnerability is exploited, an arbitrary OS command may be executed on the product or the device settings may be altered. Affected products and versions are as follows: KB-AHR04D versions prior to 91110.1.101106.78, KB-AHR08D versions prior to 91210.1.101106.78, KB-AHR16D versions prior to 91310.1.101106.78, KB-IRIP04A versions prior to 95110.1.100290.78A, KB-IRIP08A versions prior to 95210.1.100290.78A, and KB-IRIP16A versions prior to 95310.1.100290.78A.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.kbdevice.com/news/%e3%83%ac%e3%82%b3%e3%83%bc%e3%83%80%e3%83%bc%e3%81%ae%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e6%94%bb%e6%92%83%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e3%82%a2%e3%83%83%e3%83%97%e3%83%87/
- https://jvn.jp/en/vu/JVNVU90812349/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-41653.
|
CVE ID: CVE-2021-41653
Date Updated: 2024-08-04T03:15:29.120Z
Date Published: 2021-11-13T14:18:52
Description:
The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://tp-link.com
- https://www.tp-link.com/us/press/security-advisory/
- https://k4m1ll0.com/cve-2021-41653.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-3454.
|
CVE ID: CVE-2010-3454
Date Updated: 2024-08-07T03:11:44.108Z
Date Published: 2011-01-28T21:13:00
Description:
Multiple off-by-one errors in the WW8DopTypography::ReadFromMem function in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted typography information in a Microsoft Word .DOC file that triggers an out-of-bounds write.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/40775
- http://www.securityfocus.com/bid/46031
- http://www.debian.org/security/2011/dsa-2151
- http://secunia.com/advisories/60799
- http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
- https://bugzilla.redhat.com/show_bug.cgi?id=640954
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://osvdb.org/70715
- http://secunia.com/advisories/43118
- http://secunia.com/advisories/43065
- http://www.vupen.com/english/advisories/2011/0230
- http://www.securitytracker.com/id?1025002
- http://www.openoffice.org/security/cves/CVE-2010-3453_CVE-2010-3454.html
- http://www.vupen.com/english/advisories/2011/0232
- http://www.redhat.com/support/errata/RHSA-2011-0182.html
- http://ubuntu.com/usn/usn-1056-1
- http://www.redhat.com/support/errata/RHSA-2011-0181.html
- http://www.vupen.com/english/advisories/2011/0279
- http://secunia.com/advisories/43105
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:027
- http://www.vsecurity.com/resources/advisory/20110126-1
- http://www.cs.brown.edu/people/drosenbe/research.html
- http://secunia.com/advisories/42999
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-7867.
|
CVE ID: CVE-2019-7867
Date Updated: 2024-08-04T21:02:19.250Z
Date Published: 2019-08-02T21:15:50
Description:
A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with access to manage orders and order status.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-45538.
|
CVE ID: CVE-2021-45538
Date Updated: 2024-08-04T04:39:21.518Z
Date Published: 2021-12-26T00:54:22
Description:
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.netgear.com/000064088/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0074
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-26340.
|
CVE ID: CVE-2021-26340
Date Updated: 2024-09-16T16:29:03.775Z
Date Published: 2021-12-10T21:55:10.021622Z
Description:
A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-32230.
|
CVE ID: CVE-2023-32230
Date Updated: 2024-08-02T15:10:24.221Z
Date Published: 2023-12-18T12:58:08.690Z
Description:
An improper handling of a malformed API request to an API server in Bosch BT software products can allow an unauthenticated attacker to cause a Denial of Service (DoS) situation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://psirt.bosch.com/security-advisories/BOSCH-SA-092656-BT.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-5423.
|
CVE ID: CVE-2013-5423
Date Updated: 2024-08-06T17:06:52.475Z
Date Published: 2014-07-07T10:00:00
Description:
IBM Flex System Manager (FSM) 1.1 through 1.3 before 1.3.2.0 allows remote attackers to enumerate user accounts via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/68370
- http://www-01.ibm.com/support/docview.wss?uid=swg1IT00278
- http://secunia.com/advisories/58948
- https://exchange.xforce.ibmcloud.com/vulnerabilities/87485
- http://www.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095891
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-23603.
|
CVE ID: CVE-2023-23603
Date Updated: 2024-08-02T10:35:33.580Z
Date Published: 2023-06-02T00:00:00
Description:
Regular expressions used to filter out forbidden properties and values from style directives in calls to <code>console.log</code> weren't accounting for external URLs. Data could then be potentially exfiltrated from the browser. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.mozilla.org/security/advisories/mfsa2023-02/
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-03/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1800832
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-24772.
|
CVE ID: CVE-2024-24772
Date Updated: 2024-08-01T23:28:11.938Z
Date Published: 2024-02-28T11:26:45.745Z
Description:
A guest user could exploit a chart data REST API and send arbitrary SQL statements that on error could leak information from the underlying analytics database.This issue affects Apache Superset: before 3.0.4, from 3.1.0 before 3.1.1.
Users are recommended to upgrade to version 3.1.1 or 3.0.4, which fixes the issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5
- http://www.openwall.com/lists/oss-security/2024/02/28/5
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-41619.
|
CVE ID: CVE-2023-41619
Date Updated: 2024-08-27T15:41:09.807Z
Date Published: 2024-01-16T00:00:00
Description:
Emlog Pro v2.1.14 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/article.php?action=write.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/emlog/emlog
- https://github.com/GhostBalladw/wuhaozhe-s-CVE/blob/main/CVE-2023-41619
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-36304.
|
CVE ID: CVE-2024-36304
Date Updated: 2024-08-02T03:37:04.674Z
Date Published: 2024-06-10T21:21:04.492Z
Description:
A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://success.trendmicro.com/dcx/s/solution/000298063
- https://www.zerodayinitiative.com/advisories/ZDI-24-571/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-41072.
|
CVE ID: CVE-2021-41072
Date Updated: 2024-08-04T02:59:31.057Z
Date Published: 2021-09-14T00:00:00
Description:
squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd
- https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405
- https://www.debian.org/security/2021/dsa-4987
- https://lists.debian.org/debian-lts-announce/2021/10/msg00017.html
- https://security.gentoo.org/glsa/202305-29
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-46477.
|
CVE ID: CVE-2021-46477
Date Updated: 2024-08-04T05:10:35.313Z
Date Published: 2022-01-25T00:24:01
Description:
Jsish v3.5.0 was discovered to contain a heap buffer overflow via RegExp_constructor in src/jsiRegexp.c. This vulnerability can lead to a Denial of Service (DoS).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/pcmacdon/jsish/issues/63
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-6452.
|
CVE ID: CVE-2019-6452
Date Updated: 2024-08-04T20:23:20.852Z
Date Published: 2019-06-06T18:06:26
Description:
Kyocera Command Center RX TASKalfa4501i and TASKalfa5052ci allows remote attackers to abuse the Test button in the machine address book to obtain a cleartext FTP or SMB password.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.nccst.nat.gov.tw
- https://github.com/cvereveal/CVEs/tree/master/CVE-2019-6452
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-44879.
|
CVE ID: CVE-2021-44879
Date Updated: 2024-08-04T04:32:13.259Z
Date Published: 2022-02-13T00:00:00
Description:
In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
- https://bugzilla.kernel.org/show_bug.cgi?id=215231
- https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao%40kernel.org/T/
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9056d6489f5a41cfbb67f719d2c0ce61ead72d9f
- https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
- https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-27056.
|
CVE ID: CVE-2024-27056
Date Updated: 2024-08-02T00:21:05.952Z
Date Published: 2024-05-01T12:54:56.461Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mvm: ensure offloading TID queue exists
The resume code path assumes that the TX queue for the offloading TID
has been configured. At resume time it then tries to sync the write
pointer as it may have been updated by the firmware.
In the unusual event that no packets have been send on TID 0, the queue
will not have been allocated and this causes a crash. Fix this by
ensuring the queue exist at suspend time.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/ed35a509390ef4011ea2226da5dd6f62b73873b5
- https://git.kernel.org/stable/c/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-8642.
|
CVE ID: CVE-2019-8642
Date Updated: 2024-08-04T21:24:29.585Z
Date Published: 2020-10-27T19:38:49
Description:
An issue existed in the handling of S-MIME certificates. This issue was addressed with improved validation of S-MIME certificates. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. Processing a maliciously crafted mail message may lead to S/MIME signature spoofing.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT209600
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-5299.
|
CVE ID: CVE-2011-5299
Date Updated: 2024-09-16T17:07:39.247Z
Date Published: 2015-01-01T11:00:00Z
Description:
Multiple cross-site scripting (XSS) vulnerabilities in poMMo Aardvark PR16.1 allow remote attackers to inject arbitrary web script or HTML via (1) the referer parameter to index.php, (2) the site_name parameter to admin/setup/config/general.php, (3) the group_name parameter to admin/subscribers/subscribers_groups.php, or (4) the field_name parameter to admin/setup/setup_fields.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.htbridge.com/advisory/HTB22976
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-25575.
|
CVE ID: CVE-2022-25575
Date Updated: 2024-08-03T04:42:50.001Z
Date Published: 2022-03-24T21:32:44
Description:
Multiple cross-site scripting (XSS) vulnerabilities in Parking Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via crafted payloads injected into the user name, password, and verification code text boxes.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/gou-web/Parking-management-systemXSS-/blob/main/README.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-22000.
|
CVE ID: CVE-2022-22000
Date Updated: 2024-08-03T03:00:54.671Z
Date Published: 2022-02-09T16:36:51
Description:
Windows Common Log File System Driver Elevation of Privilege Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22000
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-4507.
|
CVE ID: CVE-2017-4507
Date Updated: 2018-03-16T13:57:01
Date Published: 2018-03-16T14:04:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-12908.
|
CVE ID: CVE-2017-12908
Date Updated: 2024-08-05T18:51:07.354Z
Date Published: 2017-08-17T20:00:00
Description:
SQL injection vulnerability in takeconfirm.php in NexusPHP 1.5 allows remote attackers to execute arbitrary SQL commands via the conusr parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lu4n.com/cve/8.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-5280.
|
CVE ID: CVE-2011-5280
Date Updated: 2024-09-17T04:14:28.124Z
Date Published: 2014-06-02T15:00:00Z
Description:
Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2013/04/28/3
- http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7
- http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-1206.
|
CVE ID: CVE-2012-1206
Date Updated: 2024-08-06T18:53:36.420Z
Date Published: 2012-02-20T19:00:00
Description:
Multiple integer overflows in Hancom Office 2010 SE 8.5.5 allow remote attackers to execute arbitrary code via large dimension values in a (1) JPG image to the ImportGR in the JPG image filter module (HncJpeg10.flt) or (2) PNG image to the PNG image filter module (HncPng10.flt), which triggers a heap-based buffer overflow.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73026
- http://www.hancom.co.kr/notice.noticeView.do?targetRow=1¬ice_seqno=100
- http://secunia.com/advisories/47386
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73025
- http://osvdb.org/78906
- http://www.securityfocus.com/bid/51892
- http://osvdb.org/78907
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-8648.
|
CVE ID: CVE-2019-8648
Date Updated: 2024-08-04T21:24:29.520Z
Date Published: 2019-12-18T17:33:20
Description:
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3. A remote attacker may be able to cause arbitrary code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/HT210353
- https://support.apple.com/HT210346
- https://support.apple.com/HT210348
- https://support.apple.com/HT210351
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-39549.
|
CVE ID: CVE-2021-39549
Date Updated: 2024-08-04T02:06:42.607Z
Date Published: 2021-09-20T15:26:58
Description:
An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function file::WavFile::WavFile() located in wav_file.c. It allows an attacker to cause Denial of Service.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/sahaRatul/sela/issues/27
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-4219.
|
CVE ID: CVE-2017-4219
Date Updated: 2018-03-16T13:57:01
Date Published: 2018-03-16T14:04:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-27797.
|
CVE ID: CVE-2020-27797
Date Updated: 2024-08-04T16:25:43.623Z
Date Published: 2022-08-25T19:37:18
Description:
An invalid memory address reference was discovered in the elf_lookup function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/upx/upx/issues/390
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-26473.
|
CVE ID: CVE-2022-26473
Date Updated: 2024-08-03T05:03:32.776Z
Date Published: 2022-10-07T00:00:00
Description:
In vdec fmt, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07342197; Issue ID: ALPS07342197.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://corp.mediatek.com/product-security-bulletin/October-2022
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-16277.
|
CVE ID: CVE-2017-16277
Date Updated: 2024-08-05T20:20:05.579Z
Date Published: 2023-01-11T21:39:45.701Z
Description:
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd sn_grp, at 0x9d017658, the value for the `gcmd` key is copied using `strcpy` to the buffer at `$sp+0x270`.This buffer is 16 bytes large, sending anything longer will cause a buffer overflow.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-6739.
|
CVE ID: CVE-2014-6739
Date Updated: 2024-08-06T12:24:35.645Z
Date Published: 2014-09-27T01:00:00
Description:
The Well-Being Connect Mobile (aka com.healthways.wellbeinggo) application 2.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/915401
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-24296.
|
CVE ID: CVE-2021-24296
Date Updated: 2024-08-03T19:28:23.433Z
Date Published: 2021-05-24T10:58:04
Description:
The WP Customer Reviews WordPress plugin before 3.5.6 did not sanitise some of its settings, allowing high privilege users such as administrators to set XSS payloads in them which will then be triggered in pages where reviews are enabled
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/c450f54a-3372-49b2-8ad8-68d5cc0dd49e
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-13294.
|
CVE ID: CVE-2020-13294
Date Updated: 2024-08-04T12:11:19.494Z
Date Published: 2020-08-10T13:30:12
Description:
In GitLab before 13.0.12, 13.1.6 and 13.2.3, access grants were not revoked when a user revoked access to an application.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13294.json
- https://gitlab.com/gitlab-org/gitlab/-/issues/26147
- https://hackerone.com/reports/469728
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-2512.
|
CVE ID: CVE-2010-2512
Date Updated: 2024-09-16T20:57:35.443Z
Date Published: 2010-06-28T20:00:00Z
Description:
SQL injection vulnerability in customprofile.php in 2daybiz Matrimonial Script allows remote attackers to execute arbitrary SQL commands via the id parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/41109
- http://www.osvdb.org/65712
- http://secunia.com/advisories/40338
- http://www.exploit-db.com/exploits/14008
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-2159.
|
CVE ID: CVE-2018-2159
Date Updated: 2019-01-22T17:57:02
Date Published: 2019-01-22T20:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-20912.
|
CVE ID: CVE-2022-20912
Date Updated: 2024-09-17T00:46:23.479Z
Date Published: 2022-07-21T04:06:09.642744Z
Description:
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-rce-overflow-ygHByAK
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-45622.
|
CVE ID: CVE-2023-45622
Date Updated: 2024-08-12T14:39:21.446Z
Date Published: 2023-11-14T22:55:20.319Z
Description:
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the BLE daemon service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-5317.
|
CVE ID: CVE-2011-5317
Date Updated: 2024-09-16T18:54:28.199Z
Date Published: 2015-01-01T11:00:00Z
Description:
Cross-site scripting (XSS) vulnerability in editText.php in WonderCMS before 0.4 allows remote attackers to inject arbitrary web script or HTML via the content parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.htbridge.com/advisory/HTB22759
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-10849.
|
CVE ID: CVE-2019-10849
Date Updated: 2024-08-04T22:32:02.130Z
Date Published: 2019-05-23T19:05:01
Description:
Computrols CBAS 18.0.0 allows unprotected Subversion (SVN) directory / source code disclosure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://applied-risk.com/labs/advisories
- https://applied-risk.com/index.php/download_file/view/196/165
- http://packetstormsecurity.com/files/155248/Computrols-CBAS-Web-19.0.0-Information-Disclosure.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-7424.
|
CVE ID: CVE-2013-7424
Date Updated: 2024-08-06T18:09:16.606Z
Date Published: 2015-08-26T19:00:00
Description:
The getaddrinfo function in glibc before 2.15, when compiled with libidn and the AI_IDN flag is used, allows context-dependent attackers to cause a denial of service (invalid free) and possibly execute arbitrary code via unspecified vectors, as demonstrated by an internationalized domain name to ping6.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1186614
- http://www.openwall.com/lists/oss-security/2015/01/29/21
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=2e96f1c7
- http://rhn.redhat.com/errata/RHSA-2015-1627.html
- https://bugzilla.redhat.com/show_bug.cgi?id=981942
- https://sourceware.org/bugzilla/show_bug.cgi?id=18011
- http://www.securityfocus.com/bid/72710
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-3293.
|
CVE ID: CVE-2012-3293
Date Updated: 2024-08-06T19:57:50.520Z
Date Published: 2012-08-21T10:00:00
Description:
Cross-site scripting (XSS) vulnerability in the Administrative Console in IBM WebSphere Application Server (WAS) 6.1.x before 6.1.0.45, 7.0.x before 7.0.0.25, 8.0.x before 8.0.0.4, and 8.5.x before 8.5.0.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving FRAME elements, related to a cross-frame scripting (XFS) issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/77179
- http://www-01.ibm.com/support/docview.wss?uid=swg21606096
- http://www.securityfocus.com/bid/55149
- http://www-01.ibm.com/support/docview.wss?uid=swg1PM60839
- http://www-01.ibm.com/support/docview.wss?uid=swg27022958
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-11480.
|
CVE ID: CVE-2019-11480
Date Updated: 2024-09-16T20:46:41.386Z
Date Published: 2020-04-14T02:10:13.554325Z
Description:
The pc-kernel snap build process hardcoded the --allow-insecure-repositories and --allow-unauthenticated apt options when creating the build chroot environment. This could allow an attacker who is able to perform a MITM attack between the build environment and the Ubuntu archive to install a malicious package within the build chroot. This issue affects pc-kernel versions prior to and including 2019-07-16
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11480
- https://bugs.launchpad.net/bugs/1836041
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-29257.
|
CVE ID: CVE-2023-29257
Date Updated: 2024-08-02T14:00:16.066Z
Date Published: 2023-04-26T12:56:10.502Z
Description:
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to remote code execution as a database administrator of one database may execute code or read/write files from another database within the same instance. IBM X-Force ID: 252011.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/6985691
- https://exchange.xforce.ibmcloud.com/vulnerabilities/252011
- https://security.netapp.com/advisory/ntap-20230511-0010/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-2361.
|
CVE ID: CVE-2021-2361
Date Updated: 2024-09-26T14:02:12.983Z
Date Published: 2021-07-20T22:43:38
Description:
Vulnerability in the Oracle Advanced Inbound Telephony product of Oracle E-Business Suite (component: SDK client integration). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Advanced Inbound Telephony. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Advanced Inbound Telephony accessible data as well as unauthorized access to critical data or complete access to all Oracle Advanced Inbound Telephony accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpujul2021.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-0501.
|
CVE ID: CVE-2015-0501
Date Updated: 2024-08-06T04:10:10.963Z
Date Published: 2015-04-16T16:00:00
Description:
Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.gentoo.org/glsa/201507-19
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
- http://www.debian.org/security/2015/dsa-3229
- http://www.securitytracker.com/id/1032121
- http://www.debian.org/security/2015/dsa-3311
- http://rhn.redhat.com/errata/RHSA-2015-1647.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://www.ubuntu.com/usn/USN-2575-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:227
- https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/
- http://rhn.redhat.com/errata/RHSA-2015-1629.html
- http://rhn.redhat.com/errata/RHSA-2015-1665.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-4449.
|
CVE ID: CVE-2022-4449
Date Updated: 2024-08-03T01:41:44.457Z
Date Published: 2023-01-16T15:37:41.047Z
Description:
The Page scroll to id WordPress plugin before 1.7.6 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/a4895f8d-5a4c-49cb-b144-b761ed82923d
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2008-1713.
|
CVE ID: CVE-2008-1713
Date Updated: 2024-08-07T08:32:01.092Z
Date Published: 2008-04-09T21:00:00
Description:
MailServer.exe in NoticeWare Email Server 4.6.1.0 allows remote attackers to cause a denial of service (application crash) via a long string to IMAP port (143/tcp).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/29629
- http://www.securityfocus.com/bid/28559
- https://www.exploit-db.com/exploits/5341
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41581
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.