instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2008-2881.
CVE ID: CVE-2008-2881 Date Updated: 2024-08-07T09:21:33.339Z Date Published: 2008-06-26T17:00:00 Description: Relative Real Estate Systems 3.0 and earlier stores passwords in cleartext in a MySQL database, which allows context-dependent attackers to obtain sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/5924 - http://e-rdc.org/v1/news.php?readmore=101 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1169.
CVE ID: CVE-2013-1169 Date Updated: 2024-09-17T03:48:07.540Z Date Published: 2013-04-11T10:00:00Z Description: Cisco Unified MeetingPlace Web Conferencing Server 7.x before 7.1MR1 Patch 2, 8.0 before 8.0MR1 Patch 2, and 8.5 before 8.5MR3 Patch 1, when the Remember Me option is used, does not properly verify cookies, which allows remote attackers to impersonate users via a crafted login request, aka Bug ID CSCuc64846. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-mp No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27334.
CVE ID: CVE-2024-27334 Date Updated: 2024-08-02T00:34:52.136Z Date Published: 2024-04-01T23:11:54.746Z Description: Kofax Power PDF JPG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21978. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-24-232/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39621.
CVE ID: CVE-2021-39621 Date Updated: 2024-08-04T02:13:37.381Z Date Published: 2022-01-14T19:10:53 Description: In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126319 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2022-01-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4025.
CVE ID: CVE-2018-4025 Date Updated: 2024-08-05T05:04:28.259Z Date Published: 2019-05-13T15:24:37 Description: An exploitable denial-of-service vulnerability exists in the XML_GetRawEncJpg Wi-Fi command of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. A specially crafted packet can cause an invalid memory dereference, resulting in a device reboot. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2018-0697 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26971.
CVE ID: CVE-2022-26971 Date Updated: 2024-08-03T05:18:39.263Z Date Published: 2022-06-01T11:34:37 Description: Barco Control Room Management Suite web application, which is part of TransForm N before 3.14, is exposing a license file upload mechanism. This upload can be executed without authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.barco.com/en/support/transform-n-management-server - https://www.barco.com/en/support/knowledge-base/KB12681 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13848.
CVE ID: CVE-2018-13848 Date Updated: 2024-08-05T09:14:47.323Z Date Published: 2018-07-10T18:00:00 Description: An issue has been found in Bento4 1.5.1-624. It is a SEGV in AP4_StszAtom::GetSampleSize in Core/Ap4StszAtom.cpp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/axiomatic-systems/Bento4/issues/285 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0573.
CVE ID: CVE-2019-0573 Date Updated: 2024-08-04T17:51:26.923Z Date Published: 2019-01-08T21:00:00 Description: An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations, aka "Windows Data Sharing Service Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers. This CVE ID is unique from CVE-2019-0571, CVE-2019-0572, CVE-2019-0574. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0573 - http://www.securityfocus.com/bid/106430 - https://www.exploit-db.com/exploits/46158/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30053.
CVE ID: CVE-2022-30053 Date Updated: 2024-08-03T06:40:47.069Z Date Published: 2022-05-17T19:35:19 Description: In Toll Tax Management System 1.0, the id parameter appears to be vulnerable to SQL injection attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Toll-Tax-Management-System No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3870.
CVE ID: CVE-2016-3870 Date Updated: 2024-08-06T00:10:31.263Z Date Published: 2016-09-11T21:00:00 Description: omx/SimpleSoftOMXComponent.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 does not prevent input-port changes, which allows attackers to gain privileges via a crafted application, aka internal bug 29421804. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://android.googlesource.com/platform/frameworks/av/+/1e9801783770917728b7edbdeff3d0ec09c621ac - http://source.android.com/security/bulletin/2016-09-01.html - http://www.securitytracker.com/id/1036763 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8214.
CVE ID: CVE-2014-8214 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4755.
CVE ID: CVE-2010-4755 Date Updated: 2024-08-07T03:55:34.968Z Date Published: 2011-03-02T19:00:00 Description: The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://cvsweb.netbsd.org/cgi-bin/cvsweb.cgi/src/crypto/dist/ssh/Attic/sftp.c#rev1.21.6.1 - http://securityreason.com/achievement_securityalert/89 - http://securityreason.com/exploitalert/9223 - http://cvsweb.netbsd.org/cgi-bin/cvsweb.cgi/src/crypto/dist/ssh/Attic/sftp-glob.c#rev1.13.12.1 - http://cxib.net/stuff/glob-0day.c - http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2010-008.txt.asc - http://securityreason.com/securityalert/8116 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1445.
CVE ID: CVE-2017-1445 Date Updated: 2024-09-17T04:20:49.787Z Date Published: 2017-08-30T21:00:00Z Description: IBM Emptoris Spend Analysis 9.5.0.0 through 10.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128170. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/99541 - http://www-01.ibm.com/support/docview.wss?uid=swg22005787 - https://exchange.xforce.ibmcloud.com/vulnerabilities/128170 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4838.
CVE ID: CVE-2022-4838 Date Updated: 2024-08-03T01:55:45.769Z Date Published: 2023-02-06T19:59:19.786Z Description: The Clean Login WordPress plugin before 1.13.7 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/9937e369-60e8-451c-8790-1a83a59115fc No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0080.
CVE ID: CVE-2008-0080 Date Updated: 2024-08-07T07:32:23.850Z Date Published: 2008-02-12T22:00:00 Description: Heap-based buffer overflow in the WebDAV Mini-Redirector in Microsoft Windows XP SP2, Server 2003 SP1 and SP2, and Vista allows remote attackers to execute arbitrary code via a crafted WebDAV response. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-007 - http://www.vupen.com/english/advisories/2008/0509/references - http://secunia.com/advisories/28894 - http://marc.info/?l=bugtraq&m=120361015026386&w=2 - http://www.securityfocus.com/bid/27670 - http://marc.info/?l=bugtraq&m=120361015026386&w=2 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5381 - http://www.us-cert.gov/cas/techalerts/TA08-043C.html - http://www.securitytracker.com/id?1019372 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2765.
CVE ID: CVE-2010-2765 Date Updated: 2024-08-07T02:46:48.579Z Date Published: 2010-09-09T18:00:00 Description: Integer overflow in the FRAMESET element implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a large number of values in the cols (aka columns) attribute, leading to a heap-based buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html - http://www.mozilla.org/security/announce/2010/mfsa2010-50.html - http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox - http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047282.html - http://support.avaya.com/css/P8/documents/100110210 - https://bugzilla.mozilla.org/show_bug.cgi?id=576447 - http://support.avaya.com/css/P8/documents/100112690 - http://secunia.com/advisories/42867 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11519 - http://www.vupen.com/english/advisories/2011/0061 - http://www.mandriva.com/security/advisories?name=MDVSA-2010:173 - http://www.vupen.com/english/advisories/2010/2323 - http://www.debian.org/security/2010/dsa-2106 - http://www.securityfocus.com/bid/43095 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1022.
CVE ID: CVE-2011-1022 Date Updated: 2024-08-06T22:14:27.029Z Date Published: 2011-03-22T17:00:00 Description: The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://openwall.com/lists/oss-security/2011/02/25/11 - http://secunia.com/advisories/43758 - http://secunia.com/advisories/44093 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=615987 - http://www.securitytracker.com/id?1025157 - http://www.securityfocus.com/bid/46578 - http://sourceforge.net/projects/libcg/files/libcgroup/v0.37.1/libcgroup-0.37.1.tar.bz2/download - http://secunia.com/advisories/43891 - http://www.debian.org/security/2011/dsa-2193 - http://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html - http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056683.html - http://www.vupen.com/english/advisories/2011/0679 - http://www.vupen.com/english/advisories/2011/0774 - http://sourceforge.net/mailarchive/message.php?msg_id=26598749 - http://openwall.com/lists/oss-security/2011/02/25/14 - https://bugzilla.redhat.com/show_bug.cgi?id=680409 - http://www.redhat.com/support/errata/RHSA-2011-0320.html - http://openwall.com/lists/oss-security/2011/02/25/12 - http://secunia.com/advisories/43611 - http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056734.html - http://openwall.com/lists/oss-security/2011/02/25/6 - http://openwall.com/lists/oss-security/2011/02/25/9 - http://sourceforge.net/mailarchive/message.php?msg_id=27102603 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-36673.
CVE ID: CVE-2023-36673 Date Updated: 2024-08-02T16:52:54.021Z Date Published: 2023-08-09T00:00:00 Description: An issue was discovered in Avira Phantom VPN through 2.23.1 for macOS. The VPN client insecurely configures the operating system such that all IP traffic to the VPN server's IP address is sent in plaintext outside the VPN tunnel, even if this traffic is not generated by the VPN client, while simultaneously using plaintext DNS to look up the VPN server's IP address. This allows an adversary to trick the victim into sending traffic to arbitrary IP addresses in plaintext outside the VPN tunnel. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "ServerIP attack, combined with DNS spoofing, that can leak traffic to an arbitrary IP address" rather than to only Avira Phantom VPN. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.avira.com/en/free-vpn - https://tunnelcrack.mathyvanhoef.com/details.html - https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0015 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2973.
CVE ID: CVE-2022-2973 Date Updated: 2024-09-17T00:31:43.550Z Date Published: 2022-09-23T15:28:44.503300Z Description: MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) uses a NULL pointer in certain situations. which could allow an attacker to crash the server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsa-22-251-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-7342.
CVE ID: CVE-2013-7342 Date Updated: 2024-08-06T18:01:20.435Z Date Published: 2014-03-22T01:00:00 Description: Cross-site scripting (XSS) vulnerability in flowplayer.swf in the Flash fallback feature in Flowplayer HTML5 5.4.1 allows remote attackers to inject arbitrary web script or HTML via the callback parameter, a related issue to CVE-2013-7341. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/flowplayer/flowplayer/issues/381 - https://github.com/flowplayer/flowplayer/commit/017f8c2a0865ab31e01d591adc43d34f2dd60e59 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-125097.
CVE ID: CVE-2014-125097 Date Updated: 2024-08-06T14:10:56.657Z Date Published: 2023-04-10T03:00:07.136Z Description: A vulnerability, which was classified as problematic, was found in BestWebSoft Facebook Like Button up to 2.33. Affected is the function fcbkbttn_settings_page of the file facebook-button-plugin.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.34 is able to address this issue. The patch is identified as b766da8fa100779409a953f0e46c2a2448cbe99c. It is recommended to upgrade the affected component. VDB-225354 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.225354 - https://vuldb.com/?ctiid.225354 - https://github.com/wp-plugins/facebook-button-plugin/commit/b766da8fa100779409a953f0e46c2a2448cbe99c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-21003.
CVE ID: CVE-2018-21003 Date Updated: 2024-08-05T12:19:27.156Z Date Published: 2019-08-27T11:26:17 Description: The buddyforms plugin before 2.2.8 for WordPress has SQL injection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/buddyforms/#developers - https://wpvulndb.com/vulnerabilities/9829 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6991.
CVE ID: CVE-2019-6991 Date Updated: 2024-09-17T02:58:19.058Z Date Published: 2019-01-28T20:00:00Z Description: A classic Stack-based buffer overflow exists in the zmLoadUser() function in zm_user.cpp of the zmu binary in ZoneMinder through 1.32.3, allowing an unauthenticated attacker to execute code via a long username. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ZoneMinder/zoneminder/pull/2482 - https://github.com/ZoneMinder/zoneminder/issues/2478 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7034.
CVE ID: CVE-2015-7034 Date Updated: 2024-08-06T07:36:35.321Z Date Published: 2015-10-18T19:00:00 Description: The Apple iWork application before 2.6 for iOS and Apple Pages before 5.6 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Pages document. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1033821 - http://lists.apple.com/archives/security-announce/2015/Oct/msg00000.html - https://support.apple.com/HT205373 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1986.
CVE ID: CVE-2010-1986 Date Updated: 2024-08-07T02:17:13.284Z Date Published: 2010-05-20T17:00:00 Description: Mozilla Firefox 3.6.3 on Windows XP SP3 allows remote attackers to cause a denial of service (memory consumption and application crash) via JavaScript code that creates multiple arrays containing elements with long string values, and then appends long strings to the content of a P element, related to the gfxWindowsFontGroup::MakeTextRun function in xul.dll, a different vulnerability than CVE-2009-1571. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.osvdb.org/64791 - http://www.exploit-db.com/exploits/12678 - http://www.x90c.org/advisories/firefox_3.6.3_crash_advisory.txt - http://www.securityfocus.com/archive/1/511329/100/0/threaded - https://exchange.xforce.ibmcloud.com/vulnerabilities/58761 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12433 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7215.
CVE ID: CVE-2020-7215 Date Updated: 2024-08-04T09:25:48.421Z Date Published: 2020-01-20T05:32:30 Description: An issue was discovered in Gallagher Command Centre 7.x before 7.90.991(MR5), 8.00 before 8.00.1161(MR5), and 8.10 before 8.10.1134(MR4). External system configuration data (used for third party integrations such as DVR systems) were logged in the Command Centre event trail. Any authenticated operator with the 'view events' privilege could see the full configuration, including cleartext usernames and passwords, under the event details of a Modified DVR System event. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gallagher.com/cve-2020-7215 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2759.
CVE ID: CVE-2015-2759 Date Updated: 2024-08-06T05:24:38.900Z Date Published: 2015-03-27T14:00:00 Description: Multiple cross-site request forgery (CSRF) vulnerabilities in the ePO extension in McAfee Data Loss Prevention Endpoint (DLPe) before 9.3 Patch 4 Hotfix 16 (9.3.416.4) allow remote attackers to hijack the authentication of users for requests that (1) obtain sensitive information or (2) modify the database via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kc.mcafee.com/corporate/index?page=content&id=SB10111 - http://www.securityfocus.com/bid/73403 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-35241.
CVE ID: CVE-2020-35241 Date Updated: 2024-08-04T17:02:07.456Z Date Published: 2020-12-30T14:26:49 Description: FlatPress 1.0.3 is affected by cross-site scripting (XSS) in the Blog Content component. This vulnerability can allow an attacker to inject the XSS payload in Blog content via the admin panel. Each time any user will go to that blog page, the XSS triggers and the attacker can steal the cookie according to the crafted payload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.flatpress.org/download - https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-35241.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5801.
CVE ID: CVE-2012-5801 Date Updated: 2024-09-16T23:31:26.318Z Date Published: 2012-11-04T22:00:00Z Description: The PayPal module in PrestaShop does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to use of the PHP fsockopen function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-9767.
CVE ID: CVE-2017-9767 Date Updated: 2024-08-05T17:18:02.194Z Date Published: 2017-08-18T16:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Quali CloudShell before 8 allow remote authenticated users to inject arbitrary web script or HTML via the (1) Name or (2) Description parameter to RM/Reservation/ReserveNew; the (3) Description parameter to RM/Topology/Update; the (4) Name, (5) Description, (6) ExecutionBatches[0].Name, (7) ExecutionBatches[0].Description, or (8) Labels parameter to SnQ/JobTemplate/Edit; or (9) Alias or (10) Description parameter to RM/AbstractTemplate/AddOrUpdateAbstractTemplate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/42453/ - http://packetstormsecurity.com/files/143746/Quali-CloudShell-7.1.0.6508-Patch-6-Cross-Site-Scripting.html - http://www.securityfocus.com/archive/1/541023/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23344.
CVE ID: CVE-2024-23344 Date Updated: 2024-08-01T22:59:32.183Z Date Published: 2024-02-06T15:58:19.781Z Description: Tuleap is an Open Source Suite to improve management of software developments and collaboration. Some users might get access to restricted information when a process validates the permissions of multiple users (e.g. mail notifications). This issue has been patched in version 15.4.99.140 of Tuleap Community Edition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Enalean/tuleap/security/advisories/GHSA-m3v5-2j5q-x85w - https://github.com/Enalean/tuleap/commit/0329e21d268510bc00fed707406103edabf10e42 - https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=0329e21d268510bc00fed707406103edabf10e42 - https://tuleap.net/plugins/tracker/?aid=35862 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-16766.
CVE ID: CVE-2018-16766 Date Updated: 2024-08-05T10:32:53.994Z Date Published: 2018-09-10T04:00:00 Description: In WAVM through 2018-07-26, a crafted file sent to the WebAssembly Virtual Machine may cause a denial of service (application crash) or possibly have unspecified other impact because Errors::unreachable() is reached. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/AndrewScheidecker/WAVM/issues/96 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20840.
CVE ID: CVE-2019-20840 Date Updated: 2024-08-05T02:53:09.404Z Date Published: 2020-06-17T15:11:10 Description: An issue was discovered in LibVNCServer before 0.9.13. libvncserver/ws_decode.c can lead to a crash because of unaligned accesses in hybiReadAndDecode. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13 - https://github.com/LibVNC/libvncserver/commit/0cf1400c61850065de590d403f6d49e32882fd76 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4F6FUH4EFK4NAP6GT4TQRTBKWIRCZLIY/ - http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html - http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html - http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html - https://usn.ubuntu.com/4434-1/ - https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1451.
CVE ID: CVE-2009-1451 Date Updated: 2024-08-07T05:13:25.564Z Date Published: 2009-04-28T15:00:00 Description: Cross-site scripting (XSS) vulnerability in startpage.php in SMA-DB 0.3.12 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/7936 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1173.
CVE ID: CVE-2019-1173 Date Updated: 2024-08-04T18:06:31.808Z Date Published: 2019-08-14T20:55:03 Description: An elevation of privilege vulnerability exists in the way that the PsmServiceExtHost.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the PsmServiceExtHost.dll properly handles objects in memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1173 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-37282.
CVE ID: CVE-2023-37282 Date Updated: 2024-08-02T17:09:33.967Z Date Published: 2024-01-08T14:47:49.960Z Description: An out-of-bounds write vulnerability exists in the VZT LZMA_Read dmem extraction functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1810 - https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3839.
CVE ID: CVE-2012-3839 Date Updated: 2024-08-06T20:21:04.051Z Date Published: 2012-07-03T22:00:00 Description: Multiple SQL injection vulnerabilities in application/core/MY_Model.php in MyClientBase 0.12 allow remote attackers to execute arbitrary SQL commands via the (1) invoice_number or (2) tags parameter to index.php/invoice_search. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/48961 - https://bitbucket.org/jesseterry/myclientbase/changeset/789099396f05 - http://www.exploit-db.com/exploits/18814 - http://www.securityfocus.com/bid/53311 - http://myclientbase.com/ - https://exchange.xforce.ibmcloud.com/vulnerabilities/75298 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11940.
CVE ID: CVE-2018-11940 Date Updated: 2024-08-05T08:24:03.470Z Date Published: 2019-05-24T16:36:15 Description: Lack of check in length before using memcpy in WLAN function can lead to OOB access in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS605, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24, SXR1130 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.codeaurora.org/security-bulletin/2019/04/01/april-2019-code-aurora-security-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-9185.
CVE ID: CVE-2015-9185 Date Updated: 2024-09-16T19:25:40.189Z Date Published: 2018-04-18T14:00:00Z Description: In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9650, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, and SD 850, in multiple Secure DEMUX functions (e.g., SDMX_open_session, SDMX_close_session, SDMX_set_session_cfg), when parameter validation fails, an error code is written into a response buffer, without checking that response buffer length (rsplen) passed from HLOS is large enough to hold the response. If the buffer is at the end of a non-secure page followed by secured memory page, this can cause a secure memory corruption. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2018-04-01 - http://www.securityfocus.com/bid/103671 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49463.
CVE ID: CVE-2023-49463 Date Updated: 2024-08-02T21:53:45.552Z Date Published: 2023-12-07T00:00:00 Description: libheif v1.17.5 was discovered to contain a segmentation violation via the function find_exif_tag at /libheif/exif.cc. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/strukturag/libheif/issues/1042 - https://github.com/strukturag/libheif No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20464.
CVE ID: CVE-2021-20464 Date Updated: 2024-09-16T20:32:28.158Z Date Published: 2022-04-22T16:30:29.386454Z Description: IBM Cognos Analytics PowerPlay (IBM Cognos Analytics 11.1.7, 11.2.0, and 11.1.7) could be vulnerable to an XML Bomb attack by a malicious authenticated user. IBM X-Force ID: 196813. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6570957 - https://exchange.xforce.ibmcloud.com/vulnerabilities/196813 - https://security.netapp.com/advisory/ntap-20220602-0003/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4982.
CVE ID: CVE-2011-4982 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12021.
CVE ID: CVE-2018-12021 Date Updated: 2024-08-05T08:24:03.626Z Date Published: 2018-07-05T18:00:00 Description: Singularity 2.3.0 through 2.5.1 is affected by an incorrect access control on systems supporting overlay file system. When using the overlay option, a malicious user may access sensitive information by exploiting a few specific Singularity features. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/singularityware/singularity/releases/tag/2.5.2 - http://www.openwall.com/lists/oss-security/2019/05/16/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-21442.
CVE ID: CVE-2022-21442 Date Updated: 2024-09-24T20:11:06.765Z Date Published: 2022-04-19T20:37:29 Description: Vulnerability in Oracle GoldenGate (component: OGG Core Library). The supported version that is affected is Prior to 23.1. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle GoldenGate executes to compromise Oracle GoldenGate. While the vulnerability is in Oracle GoldenGate, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle GoldenGate. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0812.
CVE ID: CVE-2015-0812 Date Updated: 2024-08-06T04:26:10.159Z Date Published: 2015-04-01T10:00:00 Description: Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1031996 - https://bugzilla.mozilla.org/show_bug.cgi?id=1128126 - https://security.gentoo.org/glsa/201512-10 - http://www.mozilla.org/security/announce/2015/mfsa2015-32.html - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - http://www.ubuntu.com/usn/USN-2550-1 - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-22034.
CVE ID: CVE-2020-22034 Date Updated: 2024-08-04T14:51:09.152Z Date Published: 2021-05-27T18:46:40 Description: A heap-based Buffer Overflow vulnerability exists FFmpeg 4.2 at libavfilter/vf_floodfill.c, which might lead to memory corruption and other potential consequences. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://trac.ffmpeg.org/ticket/8236 - https://cwe.mitre.org/data/definitions/122.html - https://www.debian.org/security/2021/dsa-4990 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10189.
CVE ID: CVE-2018-10189 Date Updated: 2024-09-17T00:31:14.792Z Date Published: 2018-04-17T20:00:00Z Description: An issue was discovered in Mautic 1.x and 2.x before 2.13.0. It is possible to systematically emulate tracking cookies per contact due to tracking the contact by their auto-incremented ID. Thus, a third party can manipulate the cookie value with +1 to systematically assume being tracked as each contact in Mautic. It is then possible to retrieve information about the contact through forms that have progressive profiling enabled. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/mautic/mautic/releases/tag/2.13.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10761.
CVE ID: CVE-2017-10761 Date Updated: 2024-08-05T17:50:11.276Z Date Published: 2017-07-05T19:00:00 Description: XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpAllocateHeap+0x0000000000000429." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-10761 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7575.
CVE ID: CVE-2015-7575 Date Updated: 2024-08-06T07:51:28.586Z Date Published: 2016-01-09T02:00:00 Description: Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2016/dsa-3688 - http://www.debian.org/security/2016/dsa-3457 - http://www.debian.org/security/2016/dsa-3491 - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html - http://www.securitytracker.com/id/1036467 - https://security.gentoo.org/glsa/201701-46 - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html - http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - http://www.ubuntu.com/usn/USN-2884-1 - http://www.securityfocus.com/bid/79684 - http://www.debian.org/security/2016/dsa-3465 - https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html - https://access.redhat.com/errata/RHSA-2016:1430 - https://bugzilla.mozilla.org/show_bug.cgi?id=1158489 - http://rhn.redhat.com/errata/RHSA-2016-0049.html - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html - http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html - http://www.debian.org/security/2016/dsa-3437 - http://rhn.redhat.com/errata/RHSA-2016-0053.html - http://www.ubuntu.com/usn/USN-2904-1 - http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html - https://security.netapp.com/advisory/ntap-20160225-0001/ - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html - http://www.debian.org/security/2016/dsa-3436 - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html - http://www.ubuntu.com/usn/USN-2866-1 - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html - http://www.securityfocus.com/bid/91787 - http://www.mozilla.org/security/announce/2015/mfsa2015-150.html - http://rhn.redhat.com/errata/RHSA-2016-0055.html - https://security.gentoo.org/glsa/201801-15 - http://rhn.redhat.com/errata/RHSA-2016-0054.html - http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html - https://security.gentoo.org/glsa/201706-18 - http://www.ubuntu.com/usn/USN-2864-1 - http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html - http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html - http://rhn.redhat.com/errata/RHSA-2016-0056.html - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html - http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html - http://rhn.redhat.com/errata/RHSA-2016-0050.html - http://www.debian.org/security/2016/dsa-3458 - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html - http://www.ubuntu.com/usn/USN-2865-1 - http://www.securitytracker.com/id/1034541 - http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html - http://www.ubuntu.com/usn/USN-2863-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6114.
CVE ID: CVE-2019-6114 Date Updated: 2024-08-04T20:16:23.991Z Date Published: 2019-06-19T15:56:24 Description: An issue was discovered in Corel PaintShop Pro 2019 21.0.0.119. An integer overflow in the jp2 parsing library allows an attacker to overwrite memory and to execute arbitrary code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ereisr00/bagofbugz/tree/master/CorelPaintShop2019 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6560.
CVE ID: CVE-2016-6560 Date Updated: 2024-08-06T01:36:28.157Z Date Published: 2017-03-31T19:00:00 Description: illumos osnet-incorporation bcopy() and bzero() implementations make signed instead of unsigned comparisons allowing a system crash. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.illumos.org/issues/7488 - https://github.com/illumos/illumos-gate/commit/5aaab1a49679c26dbcb6fb6dc25799950d70cc71 - https://www.openindiana.org/2016/11/01/cve-2016-6560-cve-2016-6561-security-issues-in-illumos/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35869.
CVE ID: CVE-2022-35869 Date Updated: 2024-08-03T09:44:22.094Z Date Published: 2022-07-25T18:16:27 Description: This vulnerability allows remote attackers to bypass authentication on affected installations of Inductive Automation Ignition 8.1.15 (b2022030114). Authentication is not required to exploit this vulnerability. The specific flaw exists within com.inductiveautomation.ignition.gateway.web.pages. The issue results from the lack of proper authentication prior to access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-17211. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-22-1016/ - https://support.inductiveautomation.com/hc/en-us/articles/7625759776653-Regarding-Pwn2Own-2022-Vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-20245.
CVE ID: CVE-2020-20245 Date Updated: 2024-08-04T14:15:29.003Z Date Published: 2021-05-18T19:14:14 Description: Mikrotik RouterOs stable 6.46.3 suffers from a memory corruption vulnerability in the log process. An authenticated remote attacker can cause a Denial of Service due to improper memory access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mikrotik.com/ - http://seclists.org/fulldisclosure/2021/May/23 - http://packetstormsecurity.com/files/162533/MikroTik-RouterOS-Memory-Corruption.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14700.
CVE ID: CVE-2019-14700 Date Updated: 2024-08-05T00:26:37.520Z Date Published: 2019-08-06T22:26:35 Description: An issue was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5. There is disclosure of the existence of arbitrary files via Path Traversal in HTTPD. This occurs because the filename specified in the TZ parameter is accessed with a substantial delay if that file exists. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.microdigital.ru/ - http://www.microdigital.co.kr/ - https://pastebin.com/PSyqqs1g No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-3652.
CVE ID: CVE-2017-3652 Date Updated: 2024-08-05T14:39:41.146Z Date Published: 2017-08-08T15:00:00 Description: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2017:2787 - http://www.securityfocus.com/bid/99805 - http://www.securitytracker.com/id/1038928 - http://www.debian.org/security/2017/dsa-3922 - https://access.redhat.com/errata/RHSA-2017:2886 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-29036.
CVE ID: CVE-2024-29036 Date Updated: 2024-08-02T01:03:51.616Z Date Published: 2024-03-20T20:39:01.341Z Description: Saleor Storefront is software for building e-commerce experiences. Prior to commit 579241e75a5eb332ccf26e0bcdd54befa33f4783, when any user authenticates in the storefront, anonymous users are able to access their data. The session is leaked through cache and can be accessed by anyone. Users should upgrade to a version that incorporates commit 579241e75a5eb332ccf26e0bcdd54befa33f4783 or later to receive a patch. A possible workaround is to temporarily disable authentication by changing the usage of `createSaleorAuthClient()`. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/saleor/storefront/security/advisories/GHSA-52cq-c7x7-cqw4 - https://github.com/saleor/saleor-docs/pull/1120 - https://github.com/saleor/auth-sdk/commit/56db13407aa35d00b85ec2df042692edd4aea9da - https://github.com/saleor/storefront/commit/579241e75a5eb332ccf26e0bcdd54befa33f4783 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0103.
CVE ID: CVE-2017-0103 Date Updated: 2024-08-05T12:55:18.318Z Date Published: 2017-03-17T00:00:00 Description: The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows Server 2012 mishandles registry objects in memory, which allows local users to gain privileges via a crafted application, aka "Windows Registry Elevation of Privilege Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/41645/ - http://www.securitytracker.com/id/1038013 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0103 - http://www.securityfocus.com/bid/96623 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2628.
CVE ID: CVE-2008-2628 Date Updated: 2024-08-07T09:05:30.218Z Date Published: 2008-06-10T00:00:00 Description: SQL injection vulnerability in the eQuotes (com_equotes) component 0.9.4 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/42805 - https://www.exploit-db.com/exploits/5723 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7016.
CVE ID: CVE-2017-7016 Date Updated: 2024-08-05T15:49:02.406Z Date Published: 2017-07-20T16:00:00 Description: An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the "afclip" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted audio file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1038951 - http://www.securityfocus.com/bid/99882 - https://support.apple.com/HT207922 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3687.
CVE ID: CVE-2023-3687 Date Updated: 2024-08-02T07:01:57.526Z Date Published: 2023-07-16T13:31:03.418Z Description: A vulnerability was found in Bylancer QuickVCard 2.1. It has been rated as critical. This issue affects some unknown processing of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack may be initiated remotely. The identifier VDB-234233 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.234233 - https://vuldb.com/?ctiid.234233 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15748.
CVE ID: CVE-2019-15748 Date Updated: 2024-08-05T00:56:22.322Z Date Published: 2019-10-07T11:40:15 Description: SITOS six Build v6.2.1 permits unauthorised users to upload and import a SCORM 2004 package by browsing directly to affected pages. An unauthenticated attacker could use the upload and import functionality to import a malicious SCORM package that includes a PHP file, which could execute arbitrary PHP code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.contextis.com/en/resources/advisories/cve-2019-15748 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2833.
CVE ID: CVE-2023-2833 Date Updated: 2024-08-02T06:33:05.515Z Date Published: 2023-06-06T09:33:23.412Z Description: The ReviewX plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.6.13 due to insufficient restriction on the 'rx_set_screen_options' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wp_screen_options[option]' and 'wp_screen_options[value]' parameters during a screen option update. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/70e1d701-2cff-4793-9e4c-5b16a4038e8d?source=cve - https://plugins.trac.wordpress.org/browser/reviewx/tags/1.6.13/includes/rx-functions.php#L972 - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2916148%40reviewx&old=2912114%40reviewx&sfp_email=&sfph_mail=#file472 - https://lana.codes/lanavdb/a889c3ff-5df0-4d7e-951f-0b0406468efa/ - https://www.wordfence.com/blog/2023/05/wpdeveloper-addresses-privilege-escalation-vulnerability-in-reviewx-wordpress-plugin/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5751.
CVE ID: CVE-2018-5751 Date Updated: 2024-08-05T05:40:51.211Z Date Published: 2018-06-15T21:00:00 Description: The backend component in Open-Xchange OX App Suite before 7.6.3-rev36, 7.8.x before 7.8.2-rev39, 7.8.3 before 7.8.3-rev44, and 7.8.4 before 7.8.4-rev22 allows remote authenticated users to obtain sensitive information about external guest users via vectors related to the "groups" and "users" APIs. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/148118/OX-App-Suite-7.8.4-XSS-Privilege-Management-SSRF-Traversal.html - https://www.exploit-db.com/exploits/44881/ - http://seclists.org/fulldisclosure/2018/Jun/23 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-37561.
CVE ID: CVE-2023-37561 Date Updated: 2024-08-02T17:16:30.888Z Date Published: 2023-07-13T01:20:06.348Z Description: Open redirect vulnerability in ELECOM wireless LAN routers and ELECOM wireless LAN repeaters allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL. Affected products and versions are as follows: WRH-300WH-H v2.12 and earlier, WTC-300HWH v1.09 and earlier, WTC-C1167GC-B v1.17 and earlier, and WTC-C1167GC-W v1.17 and earlier. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.elecom.co.jp/news/security/20230711-01/ - https://jvn.jp/en/jp/JVN05223215/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6000.
CVE ID: CVE-2018-6000 Date Updated: 2024-08-05T05:47:56.273Z Date Published: 2018-01-22T20:00:00 Description: An issue was discovered in AsusWRT before 3.0.0.4.384_10007. The do_vpnupload_post function in router/httpd/web.c in vpnupload.cgi provides functionality for setting NVRAM configuration values, which allows attackers to set the admin password and launch an SSH daemon (or enable infosvr command mode), and consequently obtain remote administrative access, via a crafted request. This is available to unauthenticated attackers in conjunction with CVE-2018-5999. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/pedrib/PoC/blob/master/advisories/asuswrt-lan-rce.txt - https://www.exploit-db.com/exploits/44176/ - https://blogs.securiteam.com/index.php/archives/3589 - https://www.exploit-db.com/exploits/43881/ - https://raw.githubusercontent.com/pedrib/PoC/master/exploits/metasploit/asuswrt_lan_rce.rb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-45671.
CVE ID: CVE-2023-45671 Date Updated: 2024-08-02T20:21:16.910Z Date Published: 2023-10-30T22:41:17.276Z Description: Frigate is an open source network video recorder. Prior to version 0.13.0 Beta 3, there is a reflected cross-site scripting vulnerability in any API endpoints reliant on the `/<camera_name>` base path as values provided for the path are not sanitized. Exploiting this vulnerability requires the attacker to both know very specific information about a user's Frigate server and requires an authenticated user to be tricked into clicking a specially crafted link to their Frigate instance. This vulnerability could exploited by an attacker under the following circumstances: Frigate publicly exposed to the internet (even with authentication); attacker knows the address of a user's Frigate instance; attacker crafts a specialized page which links to the user's Frigate instance; attacker finds a way to get an authenticated user to visit their specialized page and click the button/link. As the reflected values included in the URL are not sanitized or escaped, this permits execution arbitrary Javascript payloads. Version 0.13.0 Beta 3 contains a patch for this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/blakeblackshear/frigate/security/advisories/GHSA-jjxc-m35j-p56f - https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1971.
CVE ID: CVE-2015-1971 Date Updated: 2024-08-06T05:02:42.523Z Date Published: 2016-01-03T00:00:00 Description: Unspecified vulnerability in Jazz Team Server in Jazz Foundation in IBM Rational Collaborative Lifecycle Management (CLM) 3.x and 4.x before 4.0.7 IF8 and 5.x before 5.0.2 IF10; Rational Quality Manager (RQM) 2.x and 3.x before 3.0.1.6 IF7, 4.x before 4.0.7 IF8, and 5.x before 5.0.2 IF10; Rational Team Concert (RTC) 2.x and 3.x before 3.0.1.6 IF7, 4.x before 4.0.7 IF8, and 5.x before 5.0.2 IF10; Rational Requirements Composer (RRC) 2.x and 3.x before 3.0.1.6 IF7 and 4.0 through 4.0.7; Rational DOORS Next Generation (RDNG) 4.x before 4.0.7 IF8 and 5.x before 5.0.2 IF10; Rational Engineering Lifecycle Manager (RELM) 1.0 through 1.0.0.1, 4.0.3 through 4.0.7, and 5.0 through 5.0.2; Rational Rhapsody Design Manager (DM) 3.0 through 3.0.1, 4.0 through 4.0.7, 5.0 through 5.0.2, and 6.0; and Rational Software Architect Design Manager (DM) 3.0 through 3.0.1, 4.0 through 4.0.7, and 5.0 through 5.0.2 allows remote attackers to cause a denial of service via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21971164 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2923.
CVE ID: CVE-2010-2923 Date Updated: 2024-08-07T02:46:48.647Z Date Published: 2010-07-30T20:00:00 Description: SQL injection vulnerability in the YouTube (com_youtube) component 1.5 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id_cate parameter to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/60624 - http://www.exploit-db.com/exploits/14467 - http://packetstormsecurity.org/1007-exploits/joomlayoutube-sql.txt - http://www.securityfocus.com/bid/41938 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0387.
CVE ID: CVE-2018-0387 Date Updated: 2024-08-05T03:21:15.426Z Date Published: 2018-07-18T23:00:00 Description: A vulnerability in Cisco Webex Teams (for Windows and macOS) could allow an unauthenticated, remote attacker to execute arbitrary code on the user's device, possibly with elevated privileges. The vulnerability occurs because Cisco Webex Teams does not properly sanitize input. An attacker could exploit the vulnerability by sending a user a malicious link and persuading the user to follow the link. A successful exploit could allow the attacker to execute arbitrary code on the user's system. Cisco Bug IDs: CSCvh66250. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-teams-rce - http://www.securityfocus.com/bid/104873 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-46722.
CVE ID: CVE-2022-46722 Date Updated: 2024-08-03T14:39:38.455Z Date Published: 2023-08-14T22:40:33.623Z Description: A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13. An app may be able to modify protected parts of the file system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213488 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5622.
CVE ID: CVE-2016-5622 Date Updated: 2024-08-06T01:07:59.473Z Date Published: 2016-10-25T14:00:00 Description: Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Applications 11.3.0, 11.4.0, 12.0.1 through 12.0.3, 12.1.0, and 12.2.0 allows remote attackers to affect confidentiality and integrity via vectors related to INFRA. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1037049 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - http://www.securityfocus.com/bid/93666 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3190.
CVE ID: CVE-2022-3190 Date Updated: 2024-08-03T01:00:10.864Z Date Published: 2022-09-13T00:00:00 Description: Infinite loop in the F5 Ethernet Trailer protocol dissector in Wireshark 3.6.0 to 3.6.7 and 3.4.0 to 3.4.15 allows denial of service via packet injection or crafted capture file No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wireshark.org/security/wnpa-sec-2022-06.html - https://gitlab.com/wireshark/wireshark/-/issues/18307 - https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3190.json - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YR5LIOF5VKS4DC2NQWXTMPPXOYJC46XC/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CH4NUKZKPY4MFQHFBTONJK2AWES4DFDA/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10683.
CVE ID: CVE-2017-10683 Date Updated: 2024-09-16T21:57:55.560Z Date Published: 2017-06-29T23:00:00Z Description: In mpg123 1.25.0, there is a heap-based buffer over-read in the convert_latin1 function in libmpg123/id3.c. A crafted input will lead to a remote denial of service attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1465819 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-42055.
CVE ID: CVE-2023-42055 Date Updated: 2024-08-02T19:16:49.703Z Date Published: 2024-05-03T02:12:38.173Z Description: PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20928. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-1365/ - https://www.tracker-software.com/support/security-bulletins.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52206.
CVE ID: CVE-2023-52206 Date Updated: 2024-09-04T15:34:37.566Z Date Published: 2024-01-08T19:32:07.020Z Description: Deserialization of Untrusted Data vulnerability in Live Composer Team Page Builder: Live Composer live-composer-page-builder.This issue affects Page Builder: Live Composer: from n/a through 1.5.25. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/live-composer-page-builder/wordpress-page-builder-live-composer-plugin-1-5-25-php-object-injection-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0753.
CVE ID: CVE-2013-0753 Date Updated: 2024-08-06T14:41:47.369Z Date Published: 2013-01-13T20:00:00 Description: Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17053 - http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html - http://rhn.redhat.com/errata/RHSA-2013-0145.html - http://www.ubuntu.com/usn/USN-1681-4 - http://rhn.redhat.com/errata/RHSA-2013-0144.html - http://www.mozilla.org/security/announce/2013/mfsa2013-16.html - http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html - http://www.ubuntu.com/usn/USN-1681-1 - http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html - https://bugzilla.mozilla.org/show_bug.cgi?id=814001 - http://www.ubuntu.com/usn/USN-1681-2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-0178.
CVE ID: CVE-2022-0178 Date Updated: 2024-08-02T23:18:42.014Z Date Published: 2022-01-13T22:25:11 Description: Missing Authorization vulnerability in snipe snipe/snipe-it.This issue affects snipe/snipe-i before 5.3.8. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368 - https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25214.
CVE ID: CVE-2024-25214 Date Updated: 2024-08-16T19:50:15.743Z Date Published: 2024-02-14T00:00:00 Description: An issue in Employee Managment System v1.0 allows attackers to bypass authentication via injecting a crafted payload into the E-mail and Password parameters at /alogin.html. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20Authentication%20Bypass.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22917.
CVE ID: CVE-2021-22917 Date Updated: 2024-08-03T18:58:26.017Z Date Published: 2021-07-12T10:22:39 Description: Brave Browser Desktop between versions 1.17 and 1.20 is vulnerable to information disclosure by way of DNS requests in Tor windows not flowing through Tor if adblocking was enabled. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/1077022 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25106.
CVE ID: CVE-2022-25106 Date Updated: 2024-08-03T04:29:01.837Z Date Published: 2022-03-04T19:20:01 Description: D-Link DIR-859 v1.05 was discovered to contain a stack-based buffer overflow via the function genacgi_main. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dlink.com/en/security-bulletin/ - https://github.com/chunklhit/cve/blob/master/dlink/DIR859/BufferOverflow.md - https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10267 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0997.
CVE ID: CVE-2010-0997 Date Updated: 2024-08-07T01:06:52.534Z Date Published: 2010-04-20T16:00:00 Description: Cross-site scripting (XSS) vulnerability in 107_plugins/content/content_manager.php in the Content Management plugin in e107 before 0.7.20, when the personal content manager is enabled, allows user-assisted remote authenticated users to inject arbitrary web script or HTML via the content_heading parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://e107.org/svn_changelog.php?version=0.7.20 - http://www.vupen.com/english/advisories/2010/0919 - http://secunia.com/secunia_research/2010-43/ - http://www.securityfocus.com/bid/39539 - https://exchange.xforce.ibmcloud.com/vulnerabilities/57933 - http://e107.org/comment.php?comment.news.864 - http://www.securityfocus.com/archive/1/510809/100/0/threaded - http://secunia.com/advisories/39013 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-37990.
CVE ID: CVE-2024-37990 Date Updated: 2024-09-10T15:12:10.308Z Date Published: 2024-09-10T09:36:33.772Z Description: A vulnerability has been identified in SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0) (All versions < V4.2), SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0) (All versions < V4.2), SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0) (All versions < V4.2), SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0) (All versions < V4.2), SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0) (All versions < V4.2), SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0) (All versions < V4.2), SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0) (All versions < V4.2), SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0) (All versions < V4.2), SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0) (All versions < V4.2), SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0) (All versions < V4.2), SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0) (All versions < V4.2), SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0) (All versions < V4.2), SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0) (All versions < V4.2), SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0) (All versions < V4.2), SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0) (All versions < V4.2), SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0) (All versions < V4.2), SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0) (All versions < V4.2), SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0) (All versions < V4.2), SIMATIC RF1140R (6GT2831-6CB00) (All versions < V1.1), SIMATIC RF1170R (6GT2831-6BB00) (All versions < V1.1), SIMATIC RF166C (6GT2002-0EE20) (All versions < V2.2), SIMATIC RF185C (6GT2002-0JE10) (All versions < V2.2), SIMATIC RF186C (6GT2002-0JE20) (All versions < V2.2), SIMATIC RF186CI (6GT2002-0JE50) (All versions < V2.2), SIMATIC RF188C (6GT2002-0JE40) (All versions < V2.2), SIMATIC RF188CI (6GT2002-0JE60) (All versions < V2.2), SIMATIC RF360R (6GT2801-5BA30) (All versions < V2.2). The affected applications contain configuration files which can be modified. An attacker with privilege access can modify these files and enable features that are not released for this device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/html/ssa-765405.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0925.
CVE ID: CVE-2010-0925 Date Updated: 2024-09-16T16:23:58.824Z Date Published: 2010-03-03T19:00:00Z Description: cfnetwork.dll 1.450.5.0 in CFNetwork, as used by safari.exe 531.21.10 in Apple Safari 4.0.4 on Windows, allows remote attackers to cause a denial of service (application crash) via a long string in the SRC attribute of a (1) IMG or (2) IFRAME element. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://nobytes.com/exploits/Safari_4.0.4_background_DoS_pl.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-31082.
CVE ID: CVE-2023-31082 Date Updated: 2024-08-02T14:45:25.688Z Date Published: 2023-04-24T00:00:00 Description: An issue was discovered in drivers/tty/n_gsm.c in the Linux kernel 6.2. There is a sleeping function called from an invalid context in gsmld_write, which will block the kernel. Note: This has been disputed by 3rd parties as not a valid vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lore.kernel.org/all/CA+UBctCZok5FSQ=LPRA+A-jocW=L8FuMVZ_7MNqhh483P5yN8A%40mail.gmail.com/ - https://security.netapp.com/advisory/ntap-20230929-0003/ - https://bugzilla.suse.com/show_bug.cgi?id=1210781 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15771.
CVE ID: CVE-2018-15771 Date Updated: 2024-09-17T03:58:36.708Z Date Published: 2018-11-13T14:00:00Z Description: Dell EMC RecoverPoint versions prior to 5.1.2.1 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an information disclosure vulnerability. A malicious boxmgmt user may potentially be able to determine the existence of any system file via Boxmgmt CLI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1042059 - http://www.securityfocus.com/bid/105916 - https://seclists.org/fulldisclosure/2018/Nov/34 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10100.
CVE ID: CVE-2017-10100 Date Updated: 2024-08-05T17:33:15.107Z Date Published: 2017-08-08T15:00:00 Description: Vulnerability in the PeopleSoft Enterprise PRTL Interaction Hub component of Oracle PeopleSoft Products (subcomponent: HTML Area). The supported version that is affected is 9.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PRTL Interaction Hub. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PRTL Interaction Hub, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PRTL Interaction Hub accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PRTL Interaction Hub accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1038932 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html - http://www.securityfocus.com/bid/99759 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26828.
CVE ID: CVE-2024-26828 Date Updated: 2024-08-02T00:14:13.603Z Date Published: 2024-04-17T09:43:52.995Z Description: In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "bytes_left" is type ssize_t while sizeof() is type size_t. That means that because of type promotion, the comparison is done as an unsigned and if we have negative bytes left the loop continues instead of ending. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/7190353835b4a219abb70f90b06cdcae97f11512 - https://git.kernel.org/stable/c/f7ff1c89fb6e9610d2b01c1821727729e6609308 - https://git.kernel.org/stable/c/df2af9fdbc4ddde18a3371c4ca1a86596e8be301 - https://git.kernel.org/stable/c/cffe487026be13eaf37ea28b783d9638ab147204 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11654.
CVE ID: CVE-2017-11654 Date Updated: 2024-08-05T18:12:40.569Z Date Published: 2017-07-26T14:00:00 Description: An out-of-bounds read and write flaw was found in the way SIPcrack 0.2 processed SIP traffic, because 0x00 termination of a payload array was mishandled. A remote attacker could potentially use this flaw to crash the sipdump process by generating specially crafted SIP traffic. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://openwall.com/lists/oss-security/2017/07/26/1 - http://www.securityfocus.com/bid/100023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2228.
CVE ID: CVE-2016-2228 Date Updated: 2024-08-05T23:24:48.639Z Date Published: 2016-04-13T16:00:00 Description: Cross-site scripting (XSS) vulnerability in horde/templates/topbar/_menubar.html.php in Horde Groupware before 5.2.12 and Horde Groupware Webmail Edition before 5.2.12 allows remote attackers to inject arbitrary web script or HTML via the searchfield parameter, as demonstrated by a request to xplorer/gollem/manager.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2016/02/06/4 - http://bugs.horde.org/ticket/14213 - http://www.openwall.com/lists/oss-security/2016/02/06/5 - http://www.debian.org/security/2016/dsa-3497 - http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177484.html - http://lists.horde.org/archives/announce/2016/001149.html - http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177584.html - http://lists.horde.org/archives/announce/2016/001148.html - https://github.com/horde/horde/blob/e838d4c800b0d1ecaf8b4cc613fd3af4f994c79c/bundles/webmail/docs/CHANGES - https://github.com/horde/horde/commit/ab07a1b447de34e13983b4d7ceb18b58c3a358d8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-51488.
CVE ID: CVE-2023-51488 Date Updated: 2024-08-02T22:32:10.359Z Date Published: 2024-02-10T08:27:19.187Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic, Inc. Crowdsignal Dashboard – Polls, Surveys & more allows Reflected XSS.This issue affects Crowdsignal Dashboard – Polls, Surveys & more: from n/a through 3.0.11. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/polldaddy/wordpress-crowdsignal-polls-ratings-plugin-3-0-11-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9135.
CVE ID: CVE-2016-9135 Date Updated: 2024-08-06T02:42:10.545Z Date Published: 2016-11-03T10:00:00 Description: Exponent CMS 2.3.9 suffers from a SQL injection vulnerability in "/framework/modules/help/controllers/helpController.php" affecting the version parameter. Impact is Information Disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/exponentcms/exponent-cms/commit/d5c3c175b60bd26b2b74ec85b8f0d2544db2c8db - http://www.securityfocus.com/bid/94127 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-0117.
CVE ID: CVE-2022-0117 Date Updated: 2024-08-02T23:18:41.803Z Date Published: 2022-02-11T23:36:09 Description: Policy bypass in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html - https://crbug.com/1115847 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-2089.
CVE ID: CVE-2021-2089 Date Updated: 2024-09-26T18:18:57.107Z Date Published: 2021-01-20T14:50:09 Description: Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Runtime Catalog). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujan2021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-25056.
CVE ID: CVE-2019-25056 Date Updated: 2024-08-05T03:00:19.050Z Date Published: 2022-01-26T04:20:10 Description: In Bromite through 78.0.3904.130, there are adblock rules in the release APK; therefore, probing which resources are blocked and which aren't can identify the application version and defeat the User-Agent protection mechanism. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/bromite/bromite/issues/2#issuecomment-524102774 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1088.
CVE ID: CVE-2010-1088 Date Updated: 2024-08-07T01:14:05.650Z Date Published: 2010-04-06T22:00:00 Description: fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount "symlinks," which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=ac278a9c505092dd82077a2446af8f9fc0d9c095 - http://www.mandriva.com/security/advisories?name=MDVSA-2010:198 - http://www.openwall.com/lists/oss-security/2010/02/24/3 - http://www.mandriva.com/security/advisories?name=MDVSA-2010:088 - http://www.securityfocus.com/bid/39044 - http://secunia.com/advisories/43315 - http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00007.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10093 - http://www.novell.com/linux/security/advisories/2010_23_kernel.html - http://www.vmware.com/security/advisories/VMSA-2011-0003.html - http://secunia.com/advisories/39742 - https://bugzilla.redhat.com/show_bug.cgi?id=567813 - http://www.debian.org/security/2010/dsa-2053 - http://www.securityfocus.com/archive/1/516397/100/0/threaded - http://secunia.com/advisories/39830 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28129.
CVE ID: CVE-2022-28129 Date Updated: 2024-08-03T05:48:36.561Z Date Published: 2022-08-10T00:00:00 Description: Improper Input Validation vulnerability in HTTP/1.1 header parsing of Apache Traffic Server allows an attacker to send invalid headers. This issue affects Apache Traffic Server 8.0.0 to 9.1.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21 - https://www.debian.org/security/2022/dsa-5206 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/ - https://lists.debian.org/debian-lts-announce/2023/01/msg00019.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39970.
CVE ID: CVE-2023-39970 Date Updated: 2024-08-04T08:42:34.551Z Date Published: 2023-08-17T20:06:32.953Z Description: Unrestricted Upload of File with Dangerous Type vulnerability in AcyMailing component for Joomla. It allows remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://extensions.joomla.org/extension/acymailing-starter/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0086.
CVE ID: CVE-2015-0086 Date Updated: 2024-08-06T03:55:27.996Z Date Published: 2015-03-11T10:00:00 Description: Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 Gold and SP1, Word 2013 RT Gold and SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 Gold and SP1, Web Applications 2010 SP2, and Web Apps Server 2013 Gold and SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1031896 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-022 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21172.
CVE ID: CVE-2023-21172 Date Updated: 2024-08-02T09:28:26.116Z Date Published: 2023-06-28T00:00:00 Description: In multiple functions of WifiCallingSettings.java, there is a possible way to change calling preferences for the admin user due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262243015 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2023-06-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0619.
CVE ID: CVE-2021-0619 Date Updated: 2024-08-03T15:47:28.228Z Date Published: 2021-11-18T14:54:43 Description: In ape extractor, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561395; Issue ID: ALPS05561395. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/November-2021 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.