instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2015-1624.
CVE ID: CVE-2015-1624 Date Updated: 2024-08-06T04:47:17.328Z Date Published: 2015-03-11T10:00:00 Description: Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018 - http://www.securitytracker.com/id/1031888 - http://www.securityfocus.com/bid/72929 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2791.
CVE ID: CVE-2016-2791 Date Updated: 2024-08-05T23:32:21.192Z Date Published: 2016-03-13T18:00:00 Description: The graphite2::GlyphCache::glyph function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html - http://www.securityfocus.com/bid/84222 - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00068.html - http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html - http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html - http://www.ubuntu.com/usn/USN-2917-1 - http://www.ubuntu.com/usn/USN-2927-1 - http://www.debian.org/security/2016/dsa-3520 - http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html - http://www.debian.org/security/2016/dsa-3510 - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html - http://www.mozilla.org/security/announce/2016/mfsa2016-37.html - http://www.securitytracker.com/id/1035215 - http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html - https://security.gentoo.org/glsa/201605-06 - http://www.debian.org/security/2016/dsa-3515 - http://www.ubuntu.com/usn/USN-2934-1 - https://bugzilla.mozilla.org/show_bug.cgi?id=1243473 - https://security.gentoo.org/glsa/201701-63 - http://www.ubuntu.com/usn/USN-2917-2 - http://www.ubuntu.com/usn/USN-2917-3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2369.
CVE ID: CVE-2023-2369 Date Updated: 2024-08-02T06:19:14.824Z Date Published: 2023-04-28T13:00:04.508Z Description: A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/manage_restriction.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227645 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.227645 - https://vuldb.com/?ctiid.227645 - https://github.com/f0llow/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-3.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2159.
CVE ID: CVE-2010-2159 Date Updated: 2024-08-07T02:25:06.529Z Date Published: 2010-06-07T20:00:00 Description: Dameng DM Database Server allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors related to the SP_DEL_BAK_EXPIRED procedure in wdm_dll.dll, which triggers memory corruption. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/59081 - http://www.securityfocus.com/archive/1/511559/100/0/threaded - http://www.securityfocus.com/bid/40460 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-7382.
CVE ID: CVE-2013-7382 Date Updated: 2024-09-16T17:58:35.704Z Date Published: 2014-05-17T19:00:00Z Description: VICIDIAL dialer (aka Asterisk GUI client) 2.8-403a, 2.7, 2.7RC1, and earlier has a hardcoded password of donotedit for the (1) VDAD and (2) VDCL users, which makes it easier for remote attackers to obtain access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://adamcaudill.com/2013/10/23/vicidial-multiple-vulnerabilities/ - http://www.openwall.com/lists/oss-security/2013/10/23/10 - http://www.openwall.com/lists/oss-security/2013/10/25/1 - http://www.exploit-db.com/exploits/29513 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49272.
CVE ID: CVE-2023-49272 Date Updated: 2024-08-02T21:53:44.990Z Date Published: 2023-12-20T19:25:08.511Z Description: Hotel Management v1.0 is vulnerable to multiple authenticated Reflected Cross-Site Scripting vulnerabilities. The 'children' parameter of the reservation.php resource is copied into the HTML document as plain text between tags. Any input is echoed unmodified in the application's response. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fluidattacks.com/advisories/lang/ - https://www.kashipara.com/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5350.
CVE ID: CVE-2023-5350 Date Updated: 2024-09-19T20:17:01.376Z Date Published: 2023-10-03T11:45:41.765Z Description: SQL Injection in GitHub repository salesagility/suitecrm prior to 7.14.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/c56563cb-b74e-4174-a09a-cd07689d6736 - https://github.com/salesagility/suitecrm/commit/c43eaa311fb010b7928983e6afc6f9075c3996aa No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24925.
CVE ID: CVE-2021-24925 Date Updated: 2024-08-03T19:49:14.007Z Date Published: 2021-12-13T10:41:20 Description: The Modern Events Calendar Lite WordPress plugin before 6.1.5 does not sanitise and escape the current_month_divider parameter of its mec_list_load_more AJAX call (available to both unauthenticated and authenticated users) before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/82233588-6033-462d-b886-a8ef5ee9adb0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23742.
CVE ID: CVE-2024-23742 Date Updated: 2024-08-01T23:13:07.365Z Date Published: 2024-01-28T00:00:00 Description: An issue in Loom on macOS version 0.196.1 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. NOTE: the vendor disputes this because it requires local access to a victim's machine. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/V3x0r/CVE-2024-23742 - https://www.electronjs.org/blog/statement-run-as-node-cves No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-8875.
CVE ID: CVE-2024-8875 Date Updated: 2024-09-16T18:10:33.173Z Date Published: 2024-09-15T21:31:03.787Z Description: A vulnerability classified as critical was found in vedees wcms up to 0.3.2. Affected by this vulnerability is an unknown functionality of the file /wex/finder.php. The manipulation of the argument p leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.277507 - https://vuldb.com/?ctiid.277507 - https://vuldb.com/?submit.404206 - https://github.com/acmglz/bug2_report/blob/main/wcms%20has%20arbitrary%20file%20deletion.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34699.
CVE ID: CVE-2024-34699 Date Updated: 2024-08-02T02:59:21.655Z Date Published: 2024-05-13T19:01:19.774Z Description: GZ::CTF is a capture the flag platform. Prior to 0.20.1, unprivileged user can perform cross-site scripting attacks on other users by constructing malicious team names. This problem has been fixed in `v0.20.1`. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/GZTimeWalker/GZCTF/security/advisories/GHSA-p6rq-5x3x-rmhh - https://github.com/GZTimeWalker/GZCTF/commit/31e775b65cddf82a567d68dcdc78c1739b746346 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-34317.
CVE ID: CVE-2021-34317 Date Updated: 2024-08-04T00:05:52.638Z Date Published: 2021-07-13T11:03:34 Description: A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The BMP_loader.dll library in affected applications lacks proper validation of user-supplied data when parsing PCX files. This could result in an out of bounds write past the fixed-length heap-based buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13402) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-483182.pdf - https://www.zerodayinitiative.com/advisories/ZDI-21-853/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1986.
CVE ID: CVE-2012-1986 Date Updated: 2024-08-06T19:17:27.701Z Date Published: 2012-05-29T20:00:00 Description: Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with an authorized SSL key and certain permissions on the puppet master to read arbitrary files via a symlink attack in conjunction with a crafted REST request for a file in a filebucket. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://ubuntu.com/usn/usn-1419-1 - http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079227.html - http://puppetlabs.com/security/cve/cve-2012-1986/ - https://hermes.opensuse.org/messages/14523305 - https://exchange.xforce.ibmcloud.com/vulnerabilities/74794 - http://secunia.com/advisories/48743 - http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.15 - http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079289.html - http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080003.html - http://projects.puppetlabs.com/issues/13511 - http://secunia.com/advisories/49136 - http://www.securityfocus.com/bid/52975 - http://secunia.com/advisories/48748 - http://www.debian.org/security/2012/dsa-2451 - https://hermes.opensuse.org/messages/15087408 - http://secunia.com/advisories/48789 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-2184.
CVE ID: CVE-2021-2184 Date Updated: 2024-09-26T15:30:29.235Z Date Published: 2021-04-22T21:53:48 Description: Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Shopping Cart). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-35246.
CVE ID: CVE-2024-35246 Date Updated: 2024-08-02T03:07:46.901Z Date Published: 2024-06-20T22:11:40.479Z Description: An attacker may be able to cause a denial-of-service condition by sending many packets repeatedly. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/news-events/ics-advisories/icsa-24-172-03 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-13109.
CVE ID: CVE-2017-13109 Date Updated: 2019-03-05T19:57:01 Date Published: 2019-03-05T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-30613.
CVE ID: CVE-2024-30613 Date Updated: 2024-08-02T01:39:00.913Z Date Published: 2024-03-29T00:00:00 Description: Tenda AC15 v15.03.05.18 has a stack overflow vulnerability in the time parameter from the setSmartPowerManagement function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/setSmartPowerManagement.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5417.
CVE ID: CVE-2012-5417 Date Updated: 2024-08-06T21:05:47.226Z Date Published: 2012-11-02T01:00:00 Description: Cisco Prime Data Center Network Manager (DCNM) before 6.1(1) does not properly restrict access to certain JBoss MainDeployer functionality, which allows remote attackers to execute arbitrary commands via JBoss Application Server Remote Method Invocation (RMI) services, aka Bug ID CSCtz44924. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/56348 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121031-dcnm - http://www.securitytracker.com/id?1027712 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8219.
CVE ID: CVE-2016-8219 Date Updated: 2024-08-06T02:13:21.853Z Date Published: 2017-06-13T06:00:00 Description: An issue was discovered in Cloud Foundry Foundation cf-release versions prior to 250 and CAPI-release versions prior to 1.12.0. A user with the SpaceAuditor role is over-privileged with the ability to restage applications. This could cause application downtime if the restage fails. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cloudfoundry.org/cve-2016-8219/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24877.
CVE ID: CVE-2022-24877 Date Updated: 2024-08-03T04:29:00.196Z Date Published: 2022-05-06T01:10:09 Description: Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to expose sensitive data from the controller’s pod filesystem and possibly privilege escalation in multi-tenancy deployments. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/fluxcd/flux2/security/advisories/GHSA-j77r-2fxf-5jrw No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16391.
CVE ID: CVE-2019-16391 Date Updated: 2024-08-05T01:17:39.480Z Date Published: 2019-09-17T20:49:04 Description: SPIP before 3.1.11 and 3.2 before 3.2.5 allows authenticated visitors to modify any published content and execute other modifications in the database. This is related to ecrire/inc/meta.php and ecrire/inc/securiser_action.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-2-5-et-SPIP-3-1-11.html - https://git.spip.net/SPIP/spip/commit/187952ce85e73b52c2753f2d54fc2c44807b8f79 - https://git.spip.net/SPIP/spip/commit/3cbc758400323ab006c00ea78eacdb8f76aa5f66 - https://seclists.org/bugtraq/2019/Sep/40 - https://www.debian.org/security/2019/dsa-4532 - https://blog.spip.net/Mise-a-jour-CRITIQUE-de-securite-Sortie-de-SPIP-3-2-5-et-SPIP-3-1-11.html?lang=fr - https://lists.debian.org/debian-lts-announce/2019/10/msg00038.html - https://usn.ubuntu.com/4536-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1938.
CVE ID: CVE-2015-1938 Date Updated: 2024-08-06T05:02:41.822Z Date Published: 2015-06-30T15:00:00 Description: The server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12 allows remote attackers to execute arbitrary commands via unspecified vectors, a different vulnerability than CVE-2015-1986. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1032773 - http://www.securityfocus.com/bid/75444 - http://www-01.ibm.com/support/docview.wss?uid=swg21959398 - http://www.zerodayinitiative.com/advisories/ZDI-15-272 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2618.
CVE ID: CVE-2024-2618 Date Updated: 2024-08-01T19:18:47.922Z Date Published: 2024-05-24T04:29:58.098Z Description: The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the size attribute in all versions up to, and including, 1.6.26 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/a780ce1b-0758-42ef-88e7-ff8d921eca6e?source=cve - https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.26/inc/widgets-manager/widgets/class-page-title.php#L494 - https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.26/inc/widgets-manager/widgets/class-site-title.php#L478 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27440.
CVE ID: CVE-2023-27440 Date Updated: 2024-08-06T18:39:24.963Z Date Published: 2024-03-26T19:57:00.379Z Description: Unrestricted Upload of File with Dangerous Type vulnerability in OnTheGoSystems Types.This issue affects Types: from n/a through 3.4.17. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/types/wordpress-toolset-types-plugin-3-4-17-authenticated-arbitrary-file-upload-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2420.
CVE ID: CVE-2023-2420 Date Updated: 2024-08-02T06:19:15.105Z Date Published: 2023-04-29T01:31:03.540Z Description: A vulnerability was found in MLECMS 3.0. It has been rated as critical. This issue affects the function get_url in the library /upload/inc/lib/admin of the file upload\inc\include\common.func.php. The manipulation of the argument $_SERVER['REQUEST_URI'] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227717 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.227717 - https://vuldb.com/?ctiid.227717 - https://github.com/VG00000/elecms/blob/main/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-47479.
CVE ID: CVE-2022-47479 Date Updated: 2024-08-03T14:55:08.222Z Date Published: 2023-03-07T01:31:42.438Z Description: In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.unisoc.com/en_us/secy/announcementDetail/1632612109718192129 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15030.
CVE ID: CVE-2017-15030 Date Updated: 2024-08-05T19:42:22.389Z Date Published: 2019-05-23T14:57:58 Description: Open-Xchange GmbH OX App Suite 7.8.4 and earlier is affected by: Cross Site Scripting (XSS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://ox.com - http://open-xchange.com - https://documentation.open-xchange.com/7.8.3/release-notes/release-notes.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1858.
CVE ID: CVE-2011-1858 Date Updated: 2024-08-06T22:45:58.649Z Date Published: 2011-06-14T17:00:00 Description: Unspecified vulnerability in HP Service Manager 7.02, 7.11, 9.20, and 9.21 and Service Center 6.2.8 allows local users to bypass intended access restrictions via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/44836 - http://securityreason.com/securityalert/8273 - https://exchange.xforce.ibmcloud.com/vulnerabilities/67909 - http://www.securitytracker.com/id?1025611 - http://marc.info/?l=bugtraq&m=130755929821099&w=2 - http://marc.info/?l=bugtraq&m=130755929821099&w=2 - http://www.securityfocus.com/bid/48168 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0586.
CVE ID: CVE-2018-0586 Date Updated: 2024-08-05T03:28:11.235Z Date Published: 2018-05-14T13:00:00 Description: Directory traversal vulnerability in the shortcodes function of Ultimate Member plugin prior to version 2.0.4 for WordPress allows remote authenticated attackers to read arbitrary files via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jvn.jp/en/jp/JVN28804532/index.html - https://wordpress.org/plugins/ultimate-member/#developers - https://wpvulndb.com/vulnerabilities/9608 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7737.
CVE ID: CVE-2014-7737 Date Updated: 2024-08-06T12:56:12.320Z Date Published: 2014-10-21T10:00:00 Description: The FMAC : Federation Culinaire (aka com.fmac) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/895337 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20189.
CVE ID: CVE-2021-20189 Date Updated: 2021-01-15T15:00:56 Date Published: 2021-01-15T15:00:56 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0997.
CVE ID: CVE-2020-0997 Date Updated: 2024-08-04T06:18:03.627Z Date Published: 2020-09-11T17:08:34 Description: <p>A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of the Windows Camera Codec Pack. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how the Windows Camera Codec Pack handles objects in memory.</p> No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0997 - https://www.zerodayinitiative.com/advisories/ZDI-20-1175/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5815.
CVE ID: CVE-2024-5815 Date Updated: 2024-08-01T21:25:02.739Z Date Published: 2024-07-16T21:26:57.404Z Description: A Cross-Site Request Forgery vulnerability in GitHub Enterprise Server allowed write operations on a victim-owned repository by exploiting incorrect request types. A mitigating factor is that the attacker would have to be a trusted GitHub Enterprise Server user, and the victim would have to visit a tag in the attacker's fork of their own repository. vulnerability affected all versions of GitHub Enterprise Server prior 3.14 and was fixed in version 3.13.1, 3.12.6, 3.11.12, 3.10.14, and 3.9.17. This vulnerability was reported via the GitHub Bug Bounty program. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.9.17 - https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.10.14 - https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.11.12 - https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.12.6 - https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10672.
CVE ID: CVE-2017-10672 Date Updated: 2024-08-05T17:41:55.518Z Date Published: 2017-06-29T08:00:00 Description: Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.debian.org/security/2017/dsa-4042 - https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html - https://rt.cpan.org/Public/Bug/Display.html?id=122246 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38625.
CVE ID: CVE-2021-38625 Date Updated: 2024-08-04T01:44:23.497Z Date Published: 2021-09-15T11:23:49 Description: Windows Kernel Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38625 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-48458.
CVE ID: CVE-2022-48458 Date Updated: 2024-09-05T19:31:04.148Z Date Published: 2023-11-01T09:08:16.873Z Description: In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1719615756246777857 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0654.
CVE ID: CVE-2011-0654 Date Updated: 2024-08-06T21:58:26.079Z Date Published: 2011-02-16T00:00:00 Description: Integer underflow in the BowserWriteErrorLogEntry function in the Common Internet File System (CIFS) browser service in Mrxsmb.sys or bowser.sys in Active Directory in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via a malformed BROWSER ELECTION message, leading to a heap-based buffer overflow, aka "Browser Pool Corruption Vulnerability." NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://blogs.technet.com/b/mmpc/archive/2011/02/16/my-sweet-valentine-the-cifs-browser-protocol-heap-corruption-vulnerability.aspx - http://www.us-cert.gov/cas/techalerts/TA11-102A.html - http://www.kb.cert.org/vuls/id/323172 - http://www.exploit-db.com/exploits/16166 - http://www.vupen.com/english/advisories/2011/0394 - http://blogs.technet.com/b/srd/archive/2011/02/16/notes-on-exploitability-of-the-recent-windows-browser-protocol-issue.aspx - http://www.securitytracker.com/id?1025328 - http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0284.html - http://www.securityfocus.com/bid/46360 - http://www.vupen.com/english/advisories/2011/0938 - http://secunia.com/advisories/43299 - https://exchange.xforce.ibmcloud.com/vulnerabilities/65376 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-019 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12637 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2860.
CVE ID: CVE-2012-2860 Date Updated: 2024-08-06T19:50:05.335Z Date Published: 2012-08-06T15:00:00 Description: The date-picker implementation in Google Chrome before 21.0.1180.57 on Mac OS X and Linux, and before 21.0.1180.60 on Windows and Chrome Frame, allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15709 - http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html - http://code.google.com/p/chromium/issues/detail?id=137671 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4294.
CVE ID: CVE-2012-4294 Date Updated: 2024-08-06T20:35:08.988Z Date Published: 2012-08-16T10:00:00 Description: Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/55035 - http://secunia.com/advisories/54425 - http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-erf.c?r1=44377&r2=44376&pathrev=44377 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15673 - https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3 - http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml - http://secunia.com/advisories/51363 - http://anonsvn.wireshark.org/viewvc?view=revision&revision=44377 - http://www.wireshark.org/security/wnpa-sec-2012-16.html - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7563 - http://secunia.com/advisories/50276 - https://hermes.opensuse.org/messages/15514562 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3151.
CVE ID: CVE-2009-3151 Date Updated: 2024-08-07T06:14:56.385Z Date Published: 2009-09-10T18:00:00 Description: Directory traversal vulnerability in actions/downloadFile.php in Ultrize TimeSheet 1.2.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/9307 - https://exchange.xforce.ibmcloud.com/vulnerabilities/52166 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27913.
CVE ID: CVE-2023-27913 Date Updated: 2024-08-02T12:23:30.411Z Date Published: 2023-04-14T00:00:00 Description: A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 can be used to cause an Integer Overflow. A malicious actor can leverage this vulnerability to cause a crash or read sensitive data, or execute arbitrary code in the context of the current process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0005 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8981.
CVE ID: CVE-2019-8981 Date Updated: 2024-08-04T21:31:37.713Z Date Published: 2019-03-26T01:21:21 Description: tls1.c in Cameron Hamilton-Rich axTLS before 2.1.5 has a Buffer Overflow via a crafted sequence of TLS packets because the need_bytes value is mismanaged. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://axtls.sourceforge.net - https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/advisories-504842 - https://www.telekom.com/resource/blob/566546/276aaa2eab781729f2544d62edecf002/dl-190322-remote-buffer-overflow-in-a-axtls-data.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16514.
CVE ID: CVE-2019-16514 Date Updated: 2024-08-05T01:17:40.108Z Date Published: 2020-01-23T17:21:38 Description: An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) 19.3.25270.7185. The server allows remote code execution. Administrative users could upload an unsigned extension ZIP file containing executable code that is subsequently executed by the server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://know.bishopfox.com/advisories - https://know.bishopfox.com/advisories/connectwise-control - https://blog.huntresslabs.com/validating-the-bishop-fox-findings-in-connectwise-control-9155eec36a34 - https://www.crn.com/news/managed-services/connectwise-control-msp-security-vulnerabilities-are-severe-bishop-fox - https://www.crn.com/slide-shows/managed-services/connectwise-control-attack-chain-exploit-20-questions-for-security-researcher-bishop-fox No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0895.
CVE ID: CVE-2011-0895 Date Updated: 2024-08-06T22:05:54.605Z Date Published: 2011-04-06T17:00:00 Description: Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.0x and 8.1x allows remote authenticated users to obtain sensitive information via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/44032 - http://www.securityfocus.com/bid/47162 - http://securityreason.com/securityalert/8186 - http://marc.info/?l=bugtraq&m=130201751130787&w=2 - http://marc.info/?l=bugtraq&m=130201751130787&w=2 - http://www.securitytracker.com/id?1025288 - http://www.vupen.com/english/advisories/2011/0871 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4150.
CVE ID: CVE-2016-4150 Date Updated: 2024-08-06T00:17:31.235Z Date Published: 2016-06-16T14:00:00 Description: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1036117 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083 - http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html - https://access.redhat.com/errata/RHSA-2016:1238 - http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html - http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html - https://helpx.adobe.com/security/products/flash-player/apsb16-18.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0941.
CVE ID: CVE-2015-0941 Date Updated: 2024-08-06T04:26:11.550Z Date Published: 2015-03-22T01:00:00 Description: The Inetc plugin for Nullsoft Scriptable Install System (NSIS), as used in CERT/CC Failure Observation Engine (FOE) and other products, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and possibly execute arbitrary code by sending a crafted certificate in a download session for Windows executable files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/894897 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2069.
CVE ID: CVE-2013-2069 Date Updated: 2024-08-06T15:27:39.171Z Date Published: 2013-05-29T00:00:00 Description: Red Hat livecd-tools before 13.4.4, 17.x before 17.17, 18.x before 18.16, and 19.x before 19.3, when a rootpw directive is not set in a Kickstart file, sets the root user password to empty, which allows local users to gain privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://aws.amazon.com/security/security-bulletins/red-hat-and-other-third-party-public-amis-security-concern/ - http://www.securityfocus.com/bid/60119 - https://exchange.xforce.ibmcloud.com/vulnerabilities/84488 - http://www.openwall.com/lists/oss-security/2013/05/23/2 - https://bugzilla.redhat.com/show_bug.cgi?id=964299 - http://rhn.redhat.com/errata/RHSA-2013-0849.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1266.
CVE ID: CVE-2008-1266 Date Updated: 2024-08-07T08:17:34.561Z Date Published: 2008-03-10T17:00:00 Description: Multiple buffer overflows in the web interface on the D-Link DI-524 router allow remote attackers to cause a denial of service (device crash) or possibly have unspecified other impact via (1) a long username or (2) an HTTP header with a large name and an empty value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/489009/100/0/threaded - http://www.gnucitizen.org/projects/router-hacking-challenge/ - http://www.securityfocus.com/bid/28439 - http://secunia.com/advisories/29366 - https://exchange.xforce.ibmcloud.com/vulnerabilities/41125 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49797.
CVE ID: CVE-2023-49797 Date Updated: 2024-08-02T22:01:26.027Z Date Published: 2023-12-09T00:42:46.182Z Description: PyInstaller bundles a Python application and all its dependencies into a single package. A PyInstaller built application, elevated as a privileged process, may be tricked by an unprivileged attacker into deleting files the unprivileged user does not otherwise have access to. A user is affected if **all** the following are satisfied: 1. The user runs an application containing either `matplotlib` or `win32com`. 2. The application is ran as administrator (or at least a user with higher privileges than the attacker). 3. The user's temporary directory is not locked to that specific user (most likely due to `TMP`/`TEMP` environment variables pointing to an unprotected, arbitrary, non default location). Either: A. The attacker is able to very carefully time the replacement of a temporary file with a symlink. This switch must occur exactly between `shutil.rmtree()`'s builtin symlink check and the deletion itself B: The application was built with Python 3.7.x or earlier which has no protection against Directory Junctions links. The vulnerability has been addressed in PR #7827 which corresponds to `pyinstaller >= 5.13.1`. Users are advised to upgrade. There are no known workarounds for this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/pyinstaller/pyinstaller/security/advisories/GHSA-9w2p-rh8c-v9g5 - https://github.com/pyinstaller/pyinstaller/pull/7827 - https://github.com/python/cpython/blob/0fb18b02c8ad56299d6a2910be0bab8ad601ef24/Lib/shutil.py#L623 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ISRWT34FAF23PUOLVZ7RVWBZMWPDR5U7/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2K2XIQLEMZIKUQUOWNDYWTEWYQTKMAN7/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19888.
CVE ID: CVE-2019-19888 Date Updated: 2024-08-05T02:32:09.288Z Date Published: 2019-12-18T18:40:33 Description: jfif_decode in jfif.c in ffjpeg through 2019-08-21 has a divide-by-zero error. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/rockcarry/ffjpeg/issues/13 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18185.
CVE ID: CVE-2017-18185 Date Updated: 2024-08-05T21:13:49.098Z Date Published: 2018-02-13T19:00:00 Description: An issue was discovered in QPDF before 7.0.0. There is a large heap-based out-of-bounds read in the Pl_Buffer::write function in Pl_Buffer.cc. It is caused by an integer overflow in the PNG filter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/qpdf/qpdf/commit/ec7d74a386c0b2f38990079c3b0d2a2b30be0e71 - https://usn.ubuntu.com/3638-1/ - https://github.com/qpdf/qpdf/issues/150 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7661.
CVE ID: CVE-2015-7661 Date Updated: 2024-08-06T07:58:59.949Z Date Published: 2015-11-11T11:00:00 Description: Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 allows attackers to execute arbitrary code via a crafted getBounds call, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1034111 - http://rhn.redhat.com/errata/RHSA-2015-2024.html - https://helpx.adobe.com/security/products/flash-player/apsb15-28.html - http://lists.opensuse.org/opensuse-updates/2015-11/msg00071.html - https://security.gentoo.org/glsa/201511-02 - http://www.zerodayinitiative.com/advisories/ZDI-15-564 - http://www.securityfocus.com/bid/77533 - http://rhn.redhat.com/errata/RHSA-2015-2023.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4513.
CVE ID: CVE-2022-4513 Date Updated: 2024-08-03T01:41:45.558Z Date Published: 2022-12-15T00:00:00 Description: A vulnerability, which was classified as problematic, has been found in European Environment Agency eionet.contreg. This issue affects some unknown processing. The manipulation of the argument searchTag/resourceUri leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2022-06-27T0948 is able to address this issue. The name of the patch is a120c2153e263e62c4db34a06ab96a9f1c6bccb6. It is recommended to upgrade the affected component. The identifier VDB-215885 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/eea/eionet.contreg/commit/a120c2153e263e62c4db34a06ab96a9f1c6bccb6 - https://github.com/eea/eionet.contreg/releases/tag/2022-06-27T0948 - https://vuldb.com/?id.215885 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2013-0631
CVE-CVE-2013-0631 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1190: Exploit Public-Facing Application. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2013 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2019-13635.
CVE ID: CVE-2019-13635 Date Updated: 2024-08-04T23:57:39.541Z Date Published: 2019-07-30T12:20:44 Description: The WP Fastest Cache plugin through 0.8.9.5 for WordPress allows wpFastestCache.php and inc/cache.php Directory Traversal. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/wp-fastest-cache/#developers - https://plugins.trac.wordpress.org/changeset/2124619 - https://plugins.trac.wordpress.org/changeset/2124614 - https://seclists.org/bugtraq/2019/Jul/53 - http://packetstormsecurity.com/files/153821/WordPress-WP-Fastest-Cache-0.8.9.5-Directory-Traversal.html - https://wpvulndb.com/vulnerabilities/9507 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4012.
CVE ID: CVE-2019-4012 Date Updated: 2024-09-16T16:38:18.575Z Date Published: 2019-04-15T14:55:26.514969Z Description: IBM BigFix WebUI Profile Management 6 and Software Distribution 23 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 155886. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=ibm10875490 - https://exchange.xforce.ibmcloud.com/vulnerabilities/155886 - http://www.securityfocus.com/bid/108038 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28193.
CVE ID: CVE-2024-28193 Date Updated: 2024-08-13T16:26:18.228Z Date Published: 2024-03-13T20:19:10.239Z Description: your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify version <1.8.0 allows users to create a public token in the settings, which can be used to provide guest-level access to the information of that specific user in YourSpotify. The /me API endpoint discloses Spotify API access and refresh tokens to guest users. Attackers with access to a public token for guest access to YourSpotify can therefore obtain access to Spotify API tokens of YourSpotify users. As a consequence, attackers may extract profile information, information about listening habits, playlists and other information from the corresponding Spotify profile. In addition, the attacker can pause and resume playback in the Spotify app at will. This issue has been resolved in version 1.8.0. Users are advised to upgrade. There are no known workarounds for this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-3782-758f-mj85 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11881.
CVE ID: CVE-2020-11881 Date Updated: 2024-08-04T11:42:00.638Z Date Published: 2020-09-14T20:06:38 Description: An array index error in MikroTik RouterOS 6.41.3 through 6.46.5, and 7.x through 7.0 Beta5, allows an unauthenticated remote attacker to crash the SMB server via modified setup-request packets, aka SUP-12964. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mikrotik.com - https://github.com/botlabsDev/CVE-2020-11881 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11988.
CVE ID: CVE-2018-11988 Date Updated: 2024-08-05T08:24:03.583Z Date Published: 2018-12-20T15:00:00 Description: In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Un-trusted pointer de-reference issue by accessing a variable which is already freed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.codeaurora.org/security-bulletin/2018/12/03/december-2018-code-aurora-security-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0924.
CVE ID: CVE-2008-0924 Date Updated: 2024-08-07T08:01:40.073Z Date Published: 2008-03-28T18:00:00 Description: Stack-based buffer overflow in the DoLBURPRequest function in libnldap in ndsd in Novell eDirectory 8.7.3.9 and earlier, and 8.8.1 and earlier in the 8.8.x series, allows remote attackers to cause a denial of service (daemon crash or CPU consumption) or execute arbitrary code via a long delRequest LDAP Extended Request message, probably involving a long Distinguished Name (DN) field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id?1019692 - http://www.vupen.com/english/advisories/2008/0987/references - http://www.zerodayinitiative.com/advisories/ZDI-08-013/ - http://secunia.com/advisories/29476 - http://www.securityfocus.com/bid/28434 - http://www.securityfocus.com/archive/1/490117/100/0/threaded - https://secure-support.novell.com/KanisaPlatform/Publishing/411/3382120_f.SAL_Public.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5010.
CVE ID: CVE-2013-5010 Date Updated: 2024-08-06T16:59:41.208Z Date Published: 2014-01-10T16:00:00 Description: The Application/Device Control (ADC) component in the client in Symantec Endpoint Protection (SEP) 11.x before 11.0.7.4 and 12.x before 12.1.2 RU2 and Endpoint Protection Small Business Edition 12.x before 12.1.2 RU2 does not properly handle custom polices, which allows local users to bypass intended policy restrictions and access files or directories via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/64129 - http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140109_00 - https://exchange.xforce.ibmcloud.com/vulnerabilities/90225 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-0745.
CVE ID: CVE-2022-0745 Date Updated: 2024-08-02T23:40:03.530Z Date Published: 2022-06-13T12:41:30 Description: The Like Button Rating WordPress plugin before 2.6.45 allows any logged-in user, such as subscriber, to send arbitrary e-mails to any recipient, with any subject and body No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/180f8e87-1463-43bb-a901-80031127723a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30147.
CVE ID: CVE-2021-30147 Date Updated: 2024-08-03T22:24:59.603Z Date Published: 2021-04-07T02:02:53 Description: DMA Softlab Radius Manager 4.4.0 allows CSRF with impacts such as adding new manager accounts via admin.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://dmasoftlab.com/ - https://github.com/1d8/publications/tree/main/cve-2021-30147 - http://packetstormsecurity.com/files/162136/DMA-Radius-Manager-4.4.0-Cross-Site-Request-Forgery.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3807.
CVE ID: CVE-2009-3807 Date Updated: 2024-08-07T06:38:30.529Z Date Published: 2009-10-27T16:00:00 Description: Stack-based buffer overflow in MixVibes 7.043 Pro allows remote attackers to cause a denial of service (crash) via a long string in a .vib file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/51715 - http://www.exploit-db.com/exploits/9147 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-3789.
CVE ID: CVE-2019-3789 Date Updated: 2024-09-17T04:14:31.804Z Date Published: 2019-04-24T15:21:10.443296Z Description: Cloud Foundry Routing Release, all versions prior to 0.188.0, contains a vulnerability that can hijack the traffic to route services hosted outside the platform. A user with space developer permissions can create a private domain that shadows the external domain of the route service, and map that route to an app. When the gorouter receives traffic destined for the external route service, this traffic will instead be directed to the internal app using the shadow route. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cloudfoundry.org/blog/cve-2019-3789 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3999.
CVE ID: CVE-2011-3999 Date Updated: 2024-09-17T01:47:04.570Z Date Published: 2011-11-09T20:00:00Z Description: Cross-site scripting (XSS) vulnerability in the RSS/Atom feed-reader implementation in Iwate Portal Bar allows remote attackers to inject arbitrary web script or HTML via a crafted feed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jvndb.jvn.jp/jvndb/JVNDB-2011-000098 - http://jvn.jp/en/jp/JVN33861625/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34349.
CVE ID: CVE-2024-34349 Date Updated: 2024-08-02T02:51:11.424Z Date Published: 2024-05-10T15:29:39.791Z Description: Sylius is an open source eCommerce platform. Prior to 1.12.16 and 1.13.1, there is a possibility to execute javascript code in the Admin panel. In order to perform an XSS attack input a script into Name field in which of the resources: Taxons, Products, Product Options or Product Variants. The code will be executed while using an autocomplete field with one of the listed entities in the Admin Panel. Also for the taxons in the category tree on the product form.The issue is fixed in versions: 1.12.16, 1.13.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Sylius/Sylius/security/advisories/GHSA-v2f9-rv6w-vw8r - https://github.com/Sylius/Sylius/commit/ba4b66da5af88cdb1bba6174de8bdf42f4853e12 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1740.
CVE ID: CVE-2018-1740 Date Updated: 2024-09-17T02:42:36.171Z Date Published: 2018-12-13T16:00:00Z Description: IBM Security Access Manager Appliance 9.0.1.0, 9.0.2.0, 9.0.3.0, 9.0.4.0, and 9.0.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148419. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=ibm10787785 - https://exchange.xforce.ibmcloud.com/vulnerabilities/148419 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6156.
CVE ID: CVE-2012-6156 Date Updated: 2020-11-05T22:05:53 Date Published: 2020-11-05T22:05:53 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3021.
CVE ID: CVE-2014-3021 Date Updated: 2024-08-06T10:28:46.384Z Date Published: 2014-10-19T01:00:00 Description: IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.35, 8.0 before 8.0.0.10, and 8.5 before 8.5.5.4 does not properly handle HTTP headers, which allows remote attackers to obtain sensitive cookie and authentication data via an unspecified HTTP method. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg1PI08268 - http://www-01.ibm.com/support/docview.wss?uid=swg21684612 - https://exchange.xforce.ibmcloud.com/vulnerabilities/93059 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12971.
CVE ID: CVE-2018-12971 Date Updated: 2024-08-05T08:52:49.227Z Date Published: 2018-06-29T05:00:00 Description: EasyCMS 1.3 has CSRF via the index.php?s=/admin/user/delAll URI to delete users. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/teameasy/EasyCMS/issues/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3075.
CVE ID: CVE-2012-3075 Date Updated: 2024-09-16T21:07:46.101Z Date Published: 2012-07-12T10:00:00Z Description: The administrative web interface on Cisco TelePresence Immersive Endpoint Devices before 1.7.4 allows remote authenticated users to execute arbitrary commands via a malformed request on TCP port 443, aka Bug ID CSCtn99724. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4963.
CVE ID: CVE-2015-4963 Date Updated: 2024-08-06T06:32:31.377Z Date Published: 2015-11-08T22:00:00 Description: IBM Security Access Manager for Web 7.x before 7.0.0.16 and 8.x before 8.0.1.3 mishandles WebSEAL HTTPTransformation requests, which allows remote attackers to read or write to arbitrary files via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1034103 - http://www-01.ibm.com/support/docview.wss?uid=swg21964828 - http://www-01.ibm.com/support/docview.wss?uid=swg1IV71196 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-29043.
CVE ID: CVE-2023-29043 Date Updated: 2024-08-02T14:00:15.511Z Date Published: 2023-11-02T13:01:28.171Z Description: Presentations may contain references to images, which are user-controlled, and could include malicious script code that is being processed when editing a document. Script code embedded in malicious documents could be executed in the context of the user editing the document when performing certain actions, like copying content. The relevant attribute does now get encoded to avoid the possibility of executing script code. No publicly available exploits are known. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6243_7.10.6_2023-08-01.pdf - https://documentation.open-xchange.com/appsuite/security/advisories/csaf/2023/oxas-adv-2023-0004.json No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20434.
CVE ID: CVE-2021-20434 Date Updated: 2024-09-17T01:15:41.927Z Date Published: 2021-09-23T17:10:30.776946Z Description: IBM Security Verify Bridge 1.0.5.0 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 196346. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6491651 - https://exchange.xforce.ibmcloud.com/vulnerabilities/196346 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1845.
CVE ID: CVE-2018-1845 Date Updated: 2024-09-17T04:04:05.975Z Date Published: 2019-06-17T15:10:22.700624Z Description: IBM InfoSphere Information Server 11.3, 11.5, and 11.7 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 150905. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/docview.wss?uid=ibm10738917 - https://exchange.xforce.ibmcloud.com/vulnerabilities/150905 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2110.
CVE ID: CVE-2016-2110 Date Updated: 2024-08-05T23:17:50.577Z Date Published: 2016-04-25T00:00:00 Description: The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012 - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html - http://rhn.redhat.com/errata/RHSA-2016-0612.html - http://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html - http://www.ubuntu.com/usn/USN-2950-1 - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html - http://rhn.redhat.com/errata/RHSA-2016-0613.html - http://badlock.org/ - http://rhn.redhat.com/errata/RHSA-2016-0621.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html - http://www.ubuntu.com/usn/USN-2950-5 - https://www.samba.org/samba/history/samba-4.2.10.html - http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html - http://rhn.redhat.com/errata/RHSA-2016-0624.html - http://rhn.redhat.com/errata/RHSA-2016-0618.html - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html - https://www.samba.org/samba/latest_news.html#4.4.2 - http://www.securitytracker.com/id/1035533 - http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html - http://rhn.redhat.com/errata/RHSA-2016-0614.html - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html - http://rhn.redhat.com/errata/RHSA-2016-0620.html - http://rhn.redhat.com/errata/RHSA-2016-0611.html - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html - https://bto.bluecoat.com/security-advisory/sa122 - http://www.ubuntu.com/usn/USN-2950-3 - http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html - https://www.samba.org/samba/security/CVE-2016-2110.html - http://rhn.redhat.com/errata/RHSA-2016-0619.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964 - https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821 - https://security.gentoo.org/glsa/201612-47 - http://www.debian.org/security/2016/dsa-3548 - http://rhn.redhat.com/errata/RHSA-2016-0623.html - http://www.ubuntu.com/usn/USN-2950-2 - http://rhn.redhat.com/errata/RHSA-2016-0625.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399 - http://www.ubuntu.com/usn/USN-2950-4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-1216.
CVE ID: CVE-2021-1216 Date Updated: 2024-09-17T01:55:46.337Z Date Published: 2021-01-13T21:16:39.075598Z Description: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11552.
CVE ID: CVE-2017-11552 Date Updated: 2024-08-05T18:12:40.342Z Date Published: 2017-08-01T13:00:00 Description: mpg321.c in mpg321 0.3.2-1 does not properly manage memory for use with libmad 0.15.1b, which allows remote attackers to cause a denial of service (memory corruption seen in a crash in the mad_decoder_run function in decoder.c in libmad) via a crafted MP3 file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870406 - http://seclists.org/fulldisclosure/2017/Jul/94 - https://www.exploit-db.com/exploits/42409/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-36909.
CVE ID: CVE-2021-36909 Date Updated: 2024-09-16T20:21:59.621Z Date Published: 2021-11-18T14:41:05.970990Z Description: Authenticated Database Reset vulnerability in WordPress WP Reset PRO Premium plugin (versions <= 5.98) allows any authenticated user to wipe the entire database regardless of their authorization. It leads to a complete website reset and takeover. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpreset.com/changelog/ - https://patchstack.com/database/vulnerability/wp-reset/wordpress-wp-reset-pro-premium-plugin-5-98-authenticated-database-reset-vulnerability - https://patchstack.com/wp-reset-pro-critical-vulnerability-fixed/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-42434.
CVE ID: CVE-2024-42434 Date Updated: 2024-08-15T13:36:48.396Z Date Published: 2024-08-14T16:39:38.167Z Description: Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zoom.com/en/trust/security-bulletin/zsb-24030 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4329.
CVE ID: CVE-2010-4329 Date Updated: 2024-08-07T03:43:14.744Z Date Published: 2010-12-02T16:00:00 Description: Cross-site scripting (XSS) vulnerability in the PMA_linkOrButton function in libraries/common.lib.php in the database (db) search script in phpMyAdmin 2.11.x before 2.11.11.1 and 3.x before 3.3.8.1 allows remote attackers to inject arbitrary web script or HTML via a crafted request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.phpmyadmin.net/home_page/security/PMASA-2010-8.php - http://www.mandriva.com/security/advisories?name=MDVSA-2010:244 - http://www.vupen.com/english/advisories/2011/0001 - http://www.securityfocus.com/bid/45100 - http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051956.html - http://www.debian.org/security/2010/dsa-2139 - http://secunia.com/advisories/42477 - http://www.vupen.com/english/advisories/2010/3082 - http://lists.fedoraproject.org/pipermail/package-announce/2010-December/051942.html - http://www.osvdb.org/69516 - http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commitdiff%3Bh=e1f4901ffc400b6d2df15eac0ba5015fe48a27c4 - http://www.vupen.com/english/advisories/2010/3087 - http://www.vupen.com/english/advisories/2010/3158 - http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commitdiff%3Bh=4341818d73d454451f024950a4ce0141608ac7f8 - http://secunia.com/advisories/42725 - http://secunia.com/advisories/42408 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-22360.
CVE ID: CVE-2023-22360 Date Updated: 2024-08-02T10:07:06.586Z Date Published: 2023-02-13T00:00:00 Description: Use-after free vulnerability exists in Screen Creator Advance 2 Ver.0.1.1.4 Build01 and earlier due to lack of error handling process even when an error was detected. Having a user of Screen Creator Advance 2 to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.electronics.jtekt.co.jp/en/topics/202302035233/ - https://www.electronics.jtekt.co.jp/jp/topics/2023020313454/ - https://jvn.jp/en/vu/JVNVU98917488/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1017.
CVE ID: CVE-2020-1017 Date Updated: 2024-08-04T06:25:00.770Z Date Published: 2020-04-15T15:13:26 Description: An elevation of privilege vulnerability exists in the way the Windows Push Notification Service handles objects in memory, aka 'Windows Push Notification Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0940, CVE-2020-1001, CVE-2020-1006. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1017 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-7680.
CVE ID: CVE-2024-7680 Date Updated: 2024-08-12T12:34:32.203Z Date Published: 2024-08-11T22:00:07.007Z Description: A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file /incedit.php?id=4. The manipulation of the argument id/inccat/desc/date/amount leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.274137 - https://vuldb.com/?ctiid.274137 - https://vuldb.com/?submit.389047 - https://github.com/chenzg22/cve/issues/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4879.
CVE ID: CVE-2022-4879 Date Updated: 2024-08-03T01:55:46.021Z Date Published: 2023-01-06T10:36:20.105Z Description: A vulnerability was found in Forged Alliance Forever up to 3746. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Vote Handler. The manipulation leads to improper authorization. Upgrading to version 3747 is able to address this issue. The patch is named 6880971bd3d73d942384aff62d53058c206ce644. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217555. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.217555 - https://vuldb.com/?ctiid.217555 - https://github.com/FAForever/fa/pull/4398 - https://github.com/FAForever/fa/commit/6880971bd3d73d942384aff62d53058c206ce644 - https://github.com/FAForever/fa/releases/tag/3747 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-37252.
CVE ID: CVE-2024-37252 Date Updated: 2024-08-02T03:50:55.555Z Date Published: 2024-06-26T10:13:48.219Z Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Icegram Email Subscribers & Newsletters allows SQL Injection.This issue affects Email Subscribers & Newsletters: from n/a through 5.7.25. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/email-subscribers/wordpress-email-subscribers-by-icegram-express-plugin-5-7-25-sql-injection-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0185.
CVE ID: CVE-2023-0185 Date Updated: 2024-08-02T05:02:43.798Z Date Published: 2023-04-01T04:38:58.626Z Description: NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where sign conversion issuescasting an unsigned primitive to signed may lead to denial of service or information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nvidia.custhelp.com/app/answers/detail/a_id/5452 - https://security.gentoo.org/glsa/202310-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-27961.
CVE ID: CVE-2022-27961 Date Updated: 2024-08-03T05:41:11.132Z Date Published: 2022-04-10T21:01:40 Description: A cross-site scripting (XSS) vulnerability at /ofcms/company-c-47 in OFCMS v1.1.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Comment text box. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitee.com/oufu/ofcms/issues/I4Z8QU No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1109.
CVE ID: CVE-2015-1109 Date Updated: 2024-08-06T04:33:20.274Z Date Published: 2015-04-10T14:00:00 Description: NetworkExtension in Apple iOS before 8.3 stores credentials in VPN configuration logs, which makes it easier for physically proximate attackers to obtain sensitive information by reading a log file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html - http://www.securitytracker.com/id/1032050 - http://www.securityfocus.com/bid/73978 - https://support.apple.com/HT204661 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2577.
CVE ID: CVE-2010-2577 Date Updated: 2024-09-16T16:17:59.729Z Date Published: 2010-08-16T17:00:00Z Description: Multiple SQL injection vulnerabilities in Pligg before 1.1.1 allow remote attackers to execute arbitrary SQL commands via the title parameter to (1) storyrss.php or (2) story.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.osvdb.org/67068 - http://www.securityfocus.com/bid/42408 - http://www.osvdb.org/67067 - http://secunia.com/advisories/40931 - http://www.pligg.com/blog/991/pligg-cms-1-1-1-release/ - http://secunia.com/secunia_research/2010-111/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7206.
CVE ID: CVE-2020-7206 Date Updated: 2024-08-04T09:25:48.459Z Date Published: 2020-07-17T21:16:11 Description: HP nagios plugin for iLO (nagios-plugins-hpilo v1.50 and earlier) has a php code injection vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/HewlettPackard/nagios-plugins-hpilo/commit/7617b2736a95c7f354198f092febe37e7005c677 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-30571.
CVE ID: CVE-2024-30571 Date Updated: 2024-08-16T15:37:06.649Z Date Published: 2024-04-03T00:00:00 Description: An information leak in the BRS_top.html component of Netgear R6850 v1.1.0.88 allows attackers to obtain sensitive information without any authentication required. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.netgear.com/about/security/ - https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Info%20Leak%20in%20Netgear-R6850%EF%BC%88BRS_top.html%EF%BC%89.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1064.
CVE ID: CVE-2013-1064 Date Updated: 2024-09-16T20:46:51.368Z Date Published: 2013-10-03T21:00:00Z Description: apt-xapian-index before 0.45ubuntu2.1, 0.44ubuntu7.1, and 0.44ubuntu5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.net/ubuntu/+source/apt-xapian-index/0.44ubuntu5.1 - https://launchpad.net/ubuntu/+source/apt-xapian-index/0.44ubuntu7.1 - https://launchpad.net/ubuntu/+source/apt-xapian-index/0.45ubuntu2.1 - http://www.ubuntu.com/usn/USN-1955-1 - http://secunia.com/advisories/54914 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-5782.
CVE ID: CVE-2020-5782 Date Updated: 2024-08-04T08:39:25.914Z Date Published: 2020-09-23T15:33:45 Description: In IgniteNet HeliOS GLinq v2.2.1 r2961, if a user logs in and sets the ‘wan_type’ parameter, the wan interface for the device will become unreachable, which results in a denial of service condition for devices dependent on this connection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2020-55 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6521.
CVE ID: CVE-2018-6521 Date Updated: 2024-08-05T06:10:09.968Z Date Published: 2018-02-02T01:00:00 Description: The sqlauth module in SimpleSAMLphp before 1.15.2 relies on the MySQL utf8 charset, which truncates queries upon encountering four-byte characters. There might be a scenario in which this allows remote attackers to bypass intended access restrictions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://simplesamlphp.org/security/201801-03 - https://lists.debian.org/debian-lts-announce/2018/02/msg00008.html - https://www.debian.org/security/2018/dsa-4127 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-6771.
CVE ID: CVE-2020-6771 Date Updated: 2024-09-16T20:27:14.255Z Date Published: 2021-03-25T15:48:28.648159Z Description: Loading a DLL through an Uncontrolled Search Path Element in Bosch IP Helper up to and including version 1.00.0008 potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same application directory as the portable IP Helper application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://psirt.bosch.com/security-advisories/bosch-sa-835563-bt.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6512.
CVE ID: CVE-2024-6512 Date Updated: 2024-09-25T14:23:13.773Z Date Published: 2024-09-25T13:55:28.818Z Description: Authorization bypass in the PAM access request approval mechanism in Devolutions Server 2024.2.10 and earlier allows authenticated users with permissions to approve their own requests, bypassing intended security restrictions, via the PAM access request approval mechanism. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://devolutions.net/security/advisories/DEVO-2024-0013 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27895.
CVE ID: CVE-2020-27895 Date Updated: 2024-08-04T16:25:43.597Z Date Published: 2020-12-08T20:06:07 Description: An information disclosure issue existed in the transition of program state. This issue was addressed with improved state handling. This issue is fixed in iTunes 12.11 for Windows. A malicious application may be able to access local users Apple IDs. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT211933 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3696.
CVE ID: CVE-2010-3696 Date Updated: 2024-08-07T03:18:52.999Z Date Published: 2010-10-07T20:21:00Z Description: The fr_dhcp_decode function in lib/dhcp.c in FreeRADIUS 2.1.9, in certain non-default builds, does not properly handle the DHCP Relay Agent Information option, which allows remote attackers to cause a denial of service (infinite loop and daemon outage) via a packet that has more than one sub-option. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://github.com/alandekok/freeradius-server/commit/4dc7800b866f889a1247685bbaa6dd4238a56279 - http://secunia.com/advisories/41621 - http://www.openwall.com/lists/oss-security/2010/10/01/3 - http://freeradius.org/press/index.html#2.1.10 - http://www.openwall.com/lists/oss-security/2010/10/01/8 - https://bugs.freeradius.org/bugzilla/show_bug.cgi?id=77 - https://bugzilla.redhat.com/show_bug.cgi?id=639390 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.