instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2020-13856.
CVE ID: CVE-2020-13856 Date Updated: 2024-08-04T12:32:13.138Z Date Published: 2021-02-01T01:18:06 Description: An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.0.8-std devices. Authentication is not required to download the support file that contains sensitive information such as cleartext credentials and password hashes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mofinetwork.com/index.php?main_page=page&id=14 - https://www.criticalstart.com/critical-vulnerabilities-discovered-in-mofi-routers/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-37889.
CVE ID: CVE-2022-37889 Date Updated: 2024-08-03T10:37:41.984Z Date Published: 2022-10-07T00:00:00 Description: There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-014.txt - https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1604.
CVE ID: CVE-2013-1604 Date Updated: 2024-08-06T15:04:49.652Z Date Published: 2014-03-25T14:00:00 Description: Directory traversal vulnerability in MayGion IP Cameras with firmware before 2013.04.22 (05.53) allows remote attackers to read arbitrary files via a .. (dot dot) in the default URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/84589 - http://seclists.org/fulldisclosure/2013/May/194 - http://www.coresecurity.com/advisories/maygion-IP-cameras-multiple-vulnerabilities - http://www.exploit-db.com/exploits/25813 - http://www.securityfocus.com/bid/60192 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16333.
CVE ID: CVE-2017-16333 Date Updated: 2024-08-05T20:20:05.637Z Date Published: 2023-01-11T21:40:08.055Z Description: Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_event, at 0x9d01ed7c, the value for the `s_offset` key is copied using `strcpy` to the buffer at `$sp+0x2b0`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3934.
CVE ID: CVE-2009-3934 Date Updated: 2024-08-07T06:45:50.383Z Date Published: 2009-11-12T16:00:00 Description: The WebFrameLoaderClient::dispatchDidChangeLocationWithinPage function in src/webkit/glue/webframeloaderclient_impl.cc in Google Chrome before 3.0.195.32 allows user-assisted remote attackers to cause a denial of service via a page-local link, related to an "empty redirect chain," as demonstrated by a message in Yahoo! Mail. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/43068 - http://googlechromereleases.blogspot.com/2009/11/stable-channel-update.html - http://www.vupen.com/english/advisories/2011/0212 - http://src.chromium.org/viewvc/chrome?view=rev&revision=30772 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - http://codereview.chromium.org/326015 - http://code.google.com/p/chromium/issues/detail?id=22205 - https://exchange.xforce.ibmcloud.com/vulnerabilities/54296 - http://src.chromium.org/viewvc/chrome/branches/195/src/webkit/glue/webframeloaderclient_impl.cc?r1=30772&r2=30771 - http://www.osvdb.org/59744 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-25061.
CVE ID: CVE-2020-25061 Date Updated: 2024-08-04T15:26:09.592Z Date Published: 2020-08-31T20:46:59 Description: An issue was discovered on LG mobile devices with Android OS 9 and 10 software on the VZW network. lge_property allows property overwrites. The LG ID is LVE-SMP-200016 (July 2020). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lgsecurity.lge.com/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1936.
CVE ID: CVE-2024-1936 Date Updated: 2024-08-08T20:42:53.543Z Date Published: 2024-03-04T21:31:54.044Z Description: The encrypted subject of an email message could be incorrectly and permanently assigned to an arbitrary other email message in Thunderbird's local cache. Consequently, when replying to the contaminated email message, the user might accidentally leak the confidential subject to a third party. While this update fixes the bug and avoids future message contamination, it does not automatically repair existing contaminations. Users are advised to use the repair folder functionality, which is available from the context menu of email folders, which will erase incorrect subject assignments. This vulnerability affects Thunderbird < 115.8.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1860977 - https://www.mozilla.org/security/advisories/mfsa2024-11/ - https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0861.
CVE ID: CVE-2014-0861 Date Updated: 2024-08-06T09:27:20.170Z Date Published: 2014-02-22T21:00:00 Description: Cross-site scripting (XSS) vulnerability in the server in IBM Cognos Business Intelligence (BI) 8.4.1, 10.1 before IF6, 10.1.1 before IF5, 10.2 before IF7, 10.2.1 before IF4, and 10.2.1.1 before IF4 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter that is not properly handled during use of the Back button. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21662856 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18315.
CVE ID: CVE-2018-18315 Date Updated: 2024-08-05T11:08:21.414Z Date Published: 2018-10-15T04:00:00 Description: com/mossle/cdn/CdnController.java in lemon 1.9.0 allows attackers to upload arbitrary files because the copyMultipartFileToFile method in CdnUtils only checks for a ../ substring, and does not validate the file type and spaceName parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xuhuisheng/lemon/issues/175 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-39209.
CVE ID: CVE-2022-39209 Date Updated: 2024-08-03T12:00:42.513Z Date Published: 2022-09-15T00:00:00 Description: cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. In versions prior to 0.29.0.gfm.6 a polynomial time complexity issue in cmark-gfm's autolink extension may lead to unbounded resource exhaustion and subsequent denial of service. Users may verify the patch by running `python3 -c 'print("![l"* 100000 + "\n")' | ./cmark-gfm -e autolink`, which will resource exhaust on unpatched cmark-gfm but render correctly on patched cmark-gfm. This vulnerability has been patched in 0.29.0.gfm.6. Users are advised to upgrade. Users unable to upgrade should disable the use of the autolink extension. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/github/cmark-gfm/security/advisories/GHSA-cgh3-p57x-9q7q - https://github.com/github/cmark-gfm/commit/9d57d8a23142b316282bdfc954cb0ecda40a8655 - https://en.wikipedia.org/wiki/Time_complexity - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMGP65NANDVKPDMXMKYO2ZV2H2HZJY4P/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIUCZN3PEKUCT2JQYQTYOVIJG2KSD6G7/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEAAAI4OULDYQ2TA3HOXH54PC3DCBFZS/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33237.
CVE ID: CVE-2022-33237 Date Updated: 2024-08-03T08:01:20.493Z Date Published: 2022-11-15T00:00:00 Description: Transient DOS due to buffer over-read in WLAN firmware while processing PPE threshold. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/november-2022-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43293.
CVE ID: CVE-2022-43293 Date Updated: 2024-08-03T13:26:02.903Z Date Published: 2023-04-11T00:00:00 Description: Wacom Driver 6.3.46-1 for Windows was discovered to contain an arbitrary file write vulnerability via the component \Wacom\Wacom_Tablet.exe. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lucabarile.github.io/Blog/blog.html - https://lucabarile.github.io/Blog/CVE-2022-43293/index.html - https://github.com/LucaBarile/CVE-2022-43293 - https://cdn.wacom.com/u/productsupport/drivers/win/professional/releasenotes/Windows_6.4.2-1.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5182.
CVE ID: CVE-2014-5182 Date Updated: 2024-09-17T03:28:45.761Z Date Published: 2014-08-06T19:00:00Z Description: Multiple SQL injection vulnerabilities in the yawpp plugin 1.2 for WordPress allow remote authenticated users with Contributor privileges to execute arbitrary SQL commands via vectors related to (1) admin_functions.php or (2) admin_update.php, as demonstrated by the id parameter in the update action to wp-admin/admin.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=834445%40yawpp&old=824042%40yawpp&sfp_email=&sfph_mail=#file36 - http://codevigilant.com/disclosure/wp-plugin-yawpp-a1-injection - http://wordpress.org/plugins/yawpp/changelog/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-37422.
CVE ID: CVE-2023-37422 Date Updated: 2024-10-03T15:22:54.945Z Date Published: 2023-08-22T17:57:26.526Z Description: Vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26990.
CVE ID: CVE-2021-26990 Date Updated: 2024-08-03T20:40:47.472Z Date Published: 2021-03-19T18:42:06 Description: Cloud Manager versions prior to 3.9.4 are susceptible to a vulnerability that could allow a remote attacker to overwrite arbitrary system files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.netapp.com/advisory/NTAP-20210318-0001 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3225.
CVE ID: CVE-2010-3225 Date Updated: 2024-08-07T03:03:18.489Z Date Published: 2010-10-13T18:00:00 Description: Use-after-free vulnerability in the Media Player Network Sharing Service in Microsoft Windows Vista SP1 and SP2 and Windows 7 allows remote attackers to execute arbitrary code via a crafted Real Time Streaming Protocol (RTSP) packet, aka "RTSP Use After Free Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-075 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6684 - http://www.us-cert.gov/cas/techalerts/TA10-285A.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20862.
CVE ID: CVE-2019-20862 Date Updated: 2024-08-05T02:53:09.407Z Date Published: 2020-06-19T14:17:46 Description: An issue was discovered in Mattermost Server before 5.13.0. Non-members may fetch a team's slash commands. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mattermost.com/security-updates/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0800.
CVE ID: CVE-2024-0800 Date Updated: 2024-08-01T18:18:18.806Z Date Published: 2024-03-13T19:03:04.017Z Description: A path traversal vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.servlet.ImportNodeServlet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2024-07 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-44744.
CVE ID: CVE-2022-44744 Date Updated: 2024-08-03T14:01:31.287Z Date Published: 2022-11-07T19:00:53.561Z Description: Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security-advisory.acronis.com/advisories/SEC-2718 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5045.
CVE ID: CVE-2015-5045 Date Updated: 2024-08-06T06:32:32.640Z Date Published: 2018-03-26T18:00:00 Description: The Administration and Reporting tool in IBM Rational License Key Server (RLKS) before 8.1.4.9 iFix 04 allows local users to obtain sensitive information via unspecified vectors. IBM X-Force ID: 106938. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21982895 - https://exchange.xforce.ibmcloud.com/vulnerabilities/106938 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-1566.
CVE ID: CVE-2021-1566 Date Updated: 2024-09-17T00:42:32.412Z Date Published: 2021-06-16T17:45:41.215864Z Description: A vulnerability in the Cisco Advanced Malware Protection (AMP) for Endpoints integration of Cisco AsyncOS for Cisco Email Security Appliance (ESA) and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to intercept traffic between an affected device and the AMP servers. This vulnerability is due to improper certificate validation when an affected device establishes TLS connections. A man-in-the-middle attacker could exploit this vulnerability by sending a crafted TLS packet to an affected device. A successful exploit could allow the attacker to spoof a trusted host and then extract sensitive information or alter certain API requests. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-cert-vali-n8L97RW No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-28507.
CVE ID: CVE-2021-28507 Date Updated: 2024-09-17T04:20:33.347Z Date Published: 2022-01-14T19:04:51.398195Z Description: An issue has recently been discovered in Arista EOS where, under certain conditions, the service ACL configured for OpenConfig gNOI and OpenConfig RESTCONF might be bypassed, which results in the denied requests being forwarded to the agent. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arista.com/en/support/advisories-notices/security-advisories/13449-security-advisory-0071 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14093.
CVE ID: CVE-2017-14093 Date Updated: 2024-08-05T19:13:41.870Z Date Published: 2017-12-15T14:00:00 Description: The Log Query and Quarantine Query pages in Trend Micro ScanMail for Exchange 12.0 are vulnerable to cross site scripting (XSS) attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://success.trendmicro.com/solution/1118486 - https://www.coresecurity.com/advisories/trend-micro-scanmail-microsoft-exchange-multiple-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-37247.
CVE ID: CVE-2023-37247 Date Updated: 2024-08-02T17:09:32.891Z Date Published: 2023-07-11T09:07:24.367Z Description: A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21138) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-764801.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-41682.
CVE ID: CVE-2024-41682 Date Updated: 2024-08-13T17:54:30.651Z Date Published: 2024-08-13T07:54:19.932Z Description: A vulnerability has been identified in Location Intelligence family (All versions < V4.4). Affected products do not properly enforce restriction of excessive authentication attempts. This could allow an unauthenticated remote attacker to conduct brute force attacks against legitimate user passwords. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/html/ssa-720392.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3592.
CVE ID: CVE-2010-3592 Date Updated: 2024-08-07T03:18:52.135Z Date Published: 2011-01-19T15:00:00 Description: Unspecified vulnerability in the Oracle Document Capture component in Oracle Fusion Middleware 10.1.3.4 and 10.1.3.5 allows remote attackers to affect integrity and availability via unknown vectors related to Internal Operations. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2011/0143 - http://www.securitytracker.com/id?1024981 - http://www.securityfocus.com/bid/45871 - http://secunia.com/advisories/42976 - http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/64769 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-38628.
CVE ID: CVE-2022-38628 Date Updated: 2024-08-03T11:02:14.226Z Date Published: 2022-12-13T00:00:00 Description: Nortek Linear eMerge E3-Series 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e were discovered to contain a cross-site scripting (XSS) vulnerability which is chained with a local session fixation. This vulnerability allows attackers to escalate privileges via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38628/CVE-2022-38628.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24678.
CVE ID: CVE-2021-24678 Date Updated: 2024-08-03T19:42:15.975Z Date Published: 2021-10-04T11:20:21 Description: The CM Tooltip Glossary WordPress plugin before 3.9.21 does not escape some glossary_tooltip shortcode attributes, which could allow users a role as low as Contributor to perform Stored Cross-Site Scripting attacks No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/b83880f7-8614-4409-9305-d059b5df15dd No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3763.
CVE ID: CVE-2015-3763 Date Updated: 2024-08-06T05:56:14.949Z Date Published: 2015-08-16T23:00:00 Description: Safari in Apple iOS before 8.4.1 does not limit the rate of JavaScript alert messages, which allows remote attackers to cause a denial of service (apparent browser locking) via a crafted web site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/kb/HT205030 - http://www.securitytracker.com/id/1033275 - http://www.securityfocus.com/bid/76337 - http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4249.
CVE ID: CVE-2008-4249 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6566.
CVE ID: CVE-2019-6566 Date Updated: 2024-08-04T20:23:21.879Z Date Published: 2019-05-09T14:51:49 Description: GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to replace the uninstaller with a malicious version, which could allow an attacker to gain administrator privileges to the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-19-122-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1041 : Exfiltration Over C2 Channel
Name: Exfiltration Over C2 Channel ID: T1041 URL: https://attack.mitre.org/techniques/T1041 Platforms: Linux, macOS, Windows Kill Chain Phases: Exfiltration Description: Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications. Data Sources: Command: Command Execution, File: File Access, Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Content, Network Traffic: Network Traffic Flow Detection: Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2)
Provide detailed information about CVE-2022-33283.
CVE ID: CVE-2022-33283 Date Updated: 2024-08-03T08:01:20.511Z Date Published: 2023-01-06T05:02:25.629Z Description: Information disclosure due to buffer over-read in WLAN while WLAN frame parsing due to missing frame length check. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/january-2023-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4076.
CVE ID: CVE-2016-4076 Date Updated: 2024-08-06T00:17:30.862Z Date Published: 2016-04-25T10:00:00 Description: epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 2.0.x before 2.0.3 does not properly initialize memory for search patterns, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1035685 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11591 - http://www.wireshark.org/security/wnpa-sec-2016-19.html - https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ea8e6955fcff21333c203bc00f69d5025761459b No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0957.
CVE ID: CVE-2023-0957 Date Updated: 2024-08-02T05:32:46.090Z Date Published: 2023-03-03T07:00:41.041Z Description: An issue was discovered in Gitpod versions prior to release-2022.11.2.16. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to the Gitpod JSONRPC server using a victim’s credentials, because the Origin header is not restricted. This can lead to the extraction of data from workspaces, to a full takeover of the workspace. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://app.safebase.io/portal/71ccd717-aa2d-4a1e-942e-c768d37e9e0c/preview?product=default&orgId=71ccd717-aa2d-4a1e-942e-c768d37e9e0c&tcuUid=1d505bda-9a38-4ca5-8724-052e6337f34d - https://github.com/gitpod-io/gitpod/releases/tag/release-2022.11.2 - https://github.com/gitpod-io/gitpod/pull/16378 - https://github.com/gitpod-io/gitpod/pull/16405 - https://github.com/gitpod-io/gitpod/commit/12956988eec0031f42ffdfa3bdc3359f65628f9f - https://github.com/gitpod-io/gitpod/commit/673ab6856fa04c13b7b1f2a968e4d090f1d94e4f - https://snyk.io/blog/gitpod-remote-code-execution-vulnerability-websockets/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14651.
CVE ID: CVE-2017-14651 Date Updated: 2024-08-05T19:34:39.735Z Date Published: 2017-09-21T18:00:00 Description: WSO2 Data Analytics Server 3.1.0 has XSS in carbon/resources/add_collection_ajaxprocessor.jsp via the collectionName or parentPath parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/cybersecurityworks/Disclosed/issues/15 - https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2017-0265 - https://cybersecurityworks.com/zerodays/cve-2017-14651-wso2.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31718.
CVE ID: CVE-2021-31718 Date Updated: 2024-08-03T23:03:33.750Z Date Published: 2021-04-25T18:35:34 Description: The server in npupnp before 4.1.4 is affected by DNS rebinding in the embedded web server (including UPnP SOAP and GENA endpoints), leading to remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://framagit.org/medoc92/npupnp - https://www.lesbonscomptes.com/upmpdcli/npupnp-doc/libnpupnp.html - http://www.openwall.com/lists/oss-security/2021/04/25/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46917.
CVE ID: CVE-2021-46917 Date Updated: 2024-08-04T05:17:43.010Z Date Published: 2024-02-27T06:53:55.427Z Description: In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: fix wq cleanup of WQCFG registers A pre-release silicon erratum workaround where wq reset does not clear WQCFG registers was leaked into upstream code. Use wq reset command instead of blasting the MMIO region. This also address an issue where we clobber registers in future devices. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/e5eb9757fe4c2392e069246ae78badc573af1833 - https://git.kernel.org/stable/c/f7dc8f5619165e1fa3383d0c2519f502d9e2a1a9 - https://git.kernel.org/stable/c/ea9aadc06a9f10ad20a90edc0a484f1147d88a7a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49543.
CVE ID: CVE-2023-49543 Date Updated: 2024-08-28T19:55:35.941Z Date Published: 2024-03-01T00:00:00 Description: Incorrect access control in Book Store Management System v1 allows attackers to access unauthorized pages and execute administrative functions without authenticating. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sourcecodester.com/php/15748/book-store-management-system-project-using-php-codeigniter-3-free-source-code.html - https://owasp.org/Top10/A01_2021-Broken_Access_Control/ - https://github.com/geraldoalcantara/CVE-2023-49543 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-22171.
CVE ID: CVE-2020-22171 Date Updated: 2024-08-04T14:51:10.394Z Date Published: 2021-06-22T14:09:19 Description: PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\registration.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/itodaro/PHPGurukul_Hospital_Management_System4.0_cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28618.
CVE ID: CVE-2022-28618 Date Updated: 2024-08-03T05:56:16.116Z Date Published: 2022-05-20T20:50:19 Description: A command injection security vulnerability has been identified in HPE Nimble Storage Hybrid Flash Arrays, HPE Nimble Storage All Flash Arrays and HPE Nimble Storage Secondary Flash Arrays that could allow an attacker to execute arbitrary commands on a Nimble appliance. HPE has made the following software updates to resolve the vulnerability in HPE Nimble Storage: 5.0.10.100 or later, 5.2.1.0 or later, 6.0.0.100 or later. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst04276en_us No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6064.
CVE ID: CVE-2023-6064 Date Updated: 2024-08-02T08:21:17.273Z Date Published: 2024-01-01T14:18:52.756Z Description: The PayHere Payment Gateway WordPress plugin before 2.2.12 automatically creates publicly-accessible log files containing sensitive information when transactions occur. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/423c8881-628b-4380-9677-65b3f5165efe No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-26602.
CVE ID: CVE-2023-26602 Date Updated: 2024-08-02T11:53:54.298Z Date Published: 2023-02-26T00:00:00 Description: ASUS ASMB8 iKVM firmware through 1.14.51 allows remote attackers to execute arbitrary code by using SNMP to create extensions, as demonstrated by snmpset for NET-SNMP-EXTEND-MIB with /bin/sh for command execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nwsec.de/NWSSA-002-2023.txt - http://packetstormsecurity.com/files/171137/ASUS-ASMB8-iKVM-1.14.51-SNMP-Remote-Root.html - http://seclists.org/fulldisclosure/2023/Feb/15 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10739.
CVE ID: CVE-2016-10739 Date Updated: 2024-08-06T03:30:20.151Z Date Published: 2019-01-21T19:00:00 Description: In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sourceware.org/bugzilla/show_bug.cgi?id=20018 - http://www.securityfocus.com/bid/106672 - https://bugzilla.redhat.com/show_bug.cgi?id=1347549 - http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html - https://access.redhat.com/errata/RHSA-2019:2118 - https://access.redhat.com/errata/RHSA-2019:3513 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-28876.
CVE ID: CVE-2021-28876 Date Updated: 2024-08-03T21:55:11.787Z Date Published: 2021-04-11T00:00:00 Description: In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/rust-lang/rust/issues/81740 - https://github.com/rust-lang/rust/pull/81741 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/ - https://security.gentoo.org/glsa/202210-09 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30194.
CVE ID: CVE-2021-30194 Date Updated: 2024-08-03T22:24:59.599Z Date Published: 2021-05-25T12:09:38 Description: CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Read. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://customers.codesys.com/index.php - https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14726&token=553da5d11234bbe1ceed59969d419a71bb8c8747&download= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3624.
CVE ID: CVE-2016-3624 Date Updated: 2024-08-06T00:03:34.095Z Date Published: 2016-10-03T16:00:00 Description: The cvtClump function in the rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) by setting the "-v" option to -1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2016/04/08/4 - https://security.gentoo.org/glsa/201701-16 - http://www.securityfocus.com/bid/85956 - http://bugzilla.maptools.org/show_bug.cgi?id=2568 - http://www.debian.org/security/2017/dsa-3762 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4851.
CVE ID: CVE-2008-4851 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1472.
CVE ID: CVE-2015-1472 Date Updated: 2024-08-06T04:47:15.942Z Date Published: 2015-04-08T10:00:00 Description: The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - https://security.gentoo.org/glsa/201602-02 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - http://www.ubuntu.com/usn/USN-2519-1 - http://www.securityfocus.com/bid/72428 - https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06 - https://sourceware.org/ml/libc-alpha/2015-02/msg00119.html - http://openwall.com/lists/oss-security/2015/02/04/1 - http://seclists.org/fulldisclosure/2019/Jun/18 - https://seclists.org/bugtraq/2019/Jun/14 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html - http://seclists.org/fulldisclosure/2019/Sep/7 - https://seclists.org/bugtraq/2019/Sep/7 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11062.
CVE ID: CVE-2020-11062 Date Updated: 2024-08-04T11:21:14.505Z Date Published: 2020-05-12T19:25:12 Description: In GLPI after 0.68.1 and before 9.4.6, multiple reflexive XSS occur in Dropdown endpoints due to an invalid Content-Type. This has been fixed in version 9.4.6. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/glpi-project/glpi/security/advisories/GHSA-3xxh-f5p2-jg3h - https://github.com/glpi-project/glpi/commit/5e1c52c5e8a30ceb4e9572964da7ed89ddfb1aaf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7523.
CVE ID: CVE-2018-7523 Date Updated: 2024-09-16T16:37:44.622Z Date Published: 2018-03-21T20:00:00Z Description: In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double free vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/103394 - https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-24907.
CVE ID: CVE-2023-24907 Date Updated: 2024-08-02T11:11:42.945Z Date Published: 2023-03-14T16:55:53.362Z Description: Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24907 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2142.
CVE ID: CVE-2024-2142 Date Updated: 2024-08-01T19:03:39.159Z Date Published: 2024-03-30T06:44:45.640Z Description: The Ultimate Addons for Beaver Builder – Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Info Table widget in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/8b6c6e10-3feb-4ecd-a17a-81e15c471d3d?source=cve - https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/info-table/includes/frontend.php#L29 - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-25931.
CVE ID: CVE-2023-25931 Date Updated: 2024-08-02T11:39:05.335Z Date Published: 2023-03-01T18:56:30.093Z Description: Medtronic identified that the Pelvic Health clinician apps, which are installed on the Smart Programmer mobile device, have a password vulnerability that requires a security update to fix. Not updating could potentially result in unauthorized control of the clinician therapy application, which has greater control over therapy parameters than the patient app. Changes still cannot be made outside of the established therapy parameters of the programmer. For unauthorized access to occur, an individual would need physical access to the Smart Programmer. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://global.medtronic.com/xg-en/product-security/security-bulletins/pelvic-health-interstim-micro.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1479.
CVE ID: CVE-2009-1479 Date Updated: 2024-08-07T05:13:25.643Z Date Published: 2009-10-22T15:26:00 Description: Directory traversal vulnerability in client/desktop/default.htm in Boxalino before 09.05.25-0421 allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/507319/100/0/threaded - https://exchange.xforce.ibmcloud.com/vulnerabilities/53932 - http://www.csnc.ch/misc/files/advisories/CVE-2009-1479-Boxalino-Directory_Traversal.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3884.
CVE ID: CVE-2013-3884 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30723.
CVE ID: CVE-2022-30723 Date Updated: 2024-08-03T06:56:13.996Z Date Published: 2022-06-07T18:01:22 Description: Broadcasting Intent including the BluetoothDevice object without proper restriction of receivers in activateVoiceRecognitionWithDevice function of Bluetooth prior to SMR Jun-2022 Release 1 leaks MAC address of the connected Bluetooth device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2765.
CVE ID: CVE-2017-2765 Date Updated: 2024-08-05T14:02:07.640Z Date Published: 2017-02-08T17:00:00 Description: EMC Isilon InsightIQ 4.1.0, 4.0.1, 4.0.0, 3.2.2, 3.2.1, 3.2.0, 3.1.1, 3.1.0, 3.0.1, 3.0.0 is affected by an authentication bypass vulnerability that could potentially be exploited by attackers to compromise the affected system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/95945 - http://www.securityfocus.com/archive/1/540100/30/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33599.
CVE ID: CVE-2021-33599 Date Updated: 2024-08-03T23:50:43.167Z Date Published: 2021-09-07T12:12:28 Description: A vulnerability affecting F-Secure Antivirus engine was discovered whereby scanning WIM archive file can lead to denial-of-service (infinite loop and freezes AV engine scanner). The vulnerability can be exploit remotely by an attacker. A successful attack will result in Denial-of-Service of the Anti-Virus engine. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame - https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33599 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0021.
CVE ID: CVE-2015-0021 Date Updated: 2024-08-06T03:55:27.970Z Date Published: 2015-02-11T02:00:00 Description: Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/72436 - http://www.securitytracker.com/id/1031723 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3422.
CVE ID: CVE-2015-3422 Date Updated: 2024-08-06T05:47:57.719Z Date Published: 2015-06-18T18:00:00 Description: Cross-site scripting (XSS) vulnerability in SearchBlox before 8.2.1 allows remote attackers to inject arbitrary web script or HTML via the menu2 parameter to admin/main.jsp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/535780/100/0/threaded - http://www.securityfocus.com/bid/75263 - http://packetstormsecurity.com/files/132341/SearchBlox-8.2-Cross-Site-Scripting.html - https://www.htbridge.com/advisory/HTB23256 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10348.
CVE ID: CVE-2018-10348 Date Updated: 2021-01-22T20:09:13 Date Published: 2021-01-22T20:09:13 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1327.
CVE ID: CVE-2009-1327 Date Updated: 2024-08-07T05:13:25.197Z Date Published: 2009-04-17T10:00:00 Description: Stack-based buffer overflow in Mini-stream WM Downloader 3.0.0.9 allows remote attackers to execute arbitrary code via a long URI in a playlist (.m3u) file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/49842 - https://www.exploit-db.com/exploits/8411 - https://www.exploit-db.com/exploits/8403 - http://www.securityfocus.com/bid/34494 - http://secunia.com/advisories/34674 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5123.
CVE ID: CVE-2019-5123 Date Updated: 2024-08-04T19:47:55.945Z Date Published: 2019-10-25T17:22:19 Description: Specially crafted web requests can cause SQL injections in YouPHPTube 7.6. An attacker can send a web request with Parameter dir in /objects/pluginSwitch.json.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0911 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30713.
CVE ID: CVE-2021-30713 Date Updated: 2024-08-03T22:40:32.057Z Date Published: 2021-09-08T14:29:13 Description: A permissions issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.4. A malicious application may be able to bypass Privacy preferences. Apple is aware of a report that this issue may have been actively exploited.. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT212529 - https://support.apple.com/kb/HT212805 - http://seclists.org/fulldisclosure/2021/Sep/40 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8780.
CVE ID: CVE-2014-8780 Date Updated: 2024-08-06T13:26:02.570Z Date Published: 2018-03-07T15:00:00 Description: Cross-site scripting (XSS) vulnerability in Jease 2.11 allows remote authenticated users to inject arbitrary web script or HTML via a content section note. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/534272/100/0/threaded - https://www.vulnerability-lab.com/get_content.php?id=1373 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18982.
CVE ID: CVE-2018-18982 Date Updated: 2024-08-05T11:23:08.904Z Date Published: 2018-11-27T21:00:00 Description: NUUO CMS All versions 3.3 and prior the web server application allows injection of arbitrary SQL characters, which can be used to inject SQL into an executing statement and allow arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/46449/ - https://ics-cert.us-cert.gov/advisories/ICSA-18-284-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4686.
CVE ID: CVE-2017-4686 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-8277.
CVE ID: CVE-2017-8277 Date Updated: 2024-08-05T16:34:22.284Z Date Published: 2017-09-21T15:00:00 Description: In all Qualcomm products with Android releases from CAF using the Linux kernel, in the function msm_dba_register_client, if the client registers failed, it would be freed. However the client was not removed from list. Use-after-free would occur when traversing the list next time. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-09-01 - http://www.securityfocus.com/bid/100658 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7681.
CVE ID: CVE-2020-7681 Date Updated: 2024-09-16T17:38:44.120Z Date Published: 2020-07-25T08:35:19.851795Z Description: This affects all versions of package marscode. There is no path sanitization in the path provided at fs.readFile in index.js. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://snyk.io/vuln/SNYK-JS-MARSCODE-590122 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2015.
CVE ID: CVE-2012-2015 Date Updated: 2024-09-17T01:01:36.902Z Date Published: 2012-06-29T22:00:00Z Description: Unspecified vulnerability in HP System Management Homepage (SMH) before 7.1.1 allows remote authenticated users to gain privileges and obtain sensitive information via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3031.
CVE ID: CVE-2010-3031 Date Updated: 2024-09-17T03:29:02.882Z Date Published: 2010-08-17T17:31:00Z Description: Buffer overflow in Wyse ThinOS HF 4.4.079i, and possibly other versions before ThinOS 6.5, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the LPD service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/JALR-87AKR5 - http://www.kb.cert.org/vuls/id/320233 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-34888.
CVE ID: CVE-2021-34888 Date Updated: 2024-08-04T00:26:54.664Z Date Published: 2022-01-13T21:43:18 Description: This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14841. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 - https://www.zerodayinitiative.com/advisories/ZDI-21-1477/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20937.
CVE ID: CVE-2018-20937 Date Updated: 2024-08-05T12:19:26.089Z Date Published: 2019-08-01T16:06:22 Description: cPanel before 68.0.27 does not validate database and dbuser names during renames (SEC-321). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://documentation.cpanel.net/display/CL/68+Change+Log No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6101.
CVE ID: CVE-2012-6101 Date Updated: 2024-09-16T17:07:43.307Z Date Published: 2013-01-27T22:00:00Z Description: Multiple open redirect vulnerabilities in Moodle 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors related to (1) backup/backupfilesedit.php, (2) comment/comment_post.php, (3) course/switchrole.php, (4) mod/wiki/filesedit.php, (5) tag/coursetags_add.php, or (6) user/files.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-35991 - https://moodle.org/mod/forum/discuss.php?d=220162 - http://openwall.com/lists/oss-security/2013/01/21/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-44473.
CVE ID: CVE-2023-44473 Date Updated: 2024-09-19T14:02:44.075Z Date Published: 2023-10-09T10:08:47.756Z Description: Cross-Site Request Forgery (CSRF) vulnerability in Michael Tran Table of Contents Plus plugin <= 2302 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/table-of-contents-plus/wordpress-table-of-contents-plus-plugin-2302-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-31293.
CVE ID: CVE-2023-31293 Date Updated: 2024-08-02T14:53:30.859Z Date Published: 2023-12-29T00:00:00 Description: An issue was discovered in Sesami Cash Point & Transport Optimizer (CPTO) 6.3.8.6 (#718), allows remote attackers to obtain sensitive information and bypass profile restriction via improper access control in the Reader system user's web browser, allowing the journal to be displayed, despite the option being disabled. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://herolab.usd.de/en/security-advisories/usd-2022-0061/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41644.
CVE ID: CVE-2022-41644 Date Updated: 2024-08-03T12:49:43.612Z Date Published: 2022-10-31T19:47:21.832Z Description: Delta Electronics InfraSuite Device Master versions 00.00.01a and prior lacks authentication for a function that changes group privileges. An attacker could use this to create a denial-of-service state or escalate their own privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-07 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41738.
CVE ID: CVE-2022-41738 Date Updated: 2024-08-29T20:11:03.403Z Date Published: 2024-02-17T16:17:20.712Z Description: IBM Storage Scale Container Native Storage Access 5.1.2.1 -through 5.1.7.0 could allow an attacker to initiate connections to containers from external networks. IBM X-Force ID: 237812. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7095312 - https://exchange.xforce.ibmcloud.com/vulnerabilities/237812 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8243.
CVE ID: CVE-2018-8243 Date Updated: 2024-08-05T06:46:13.792Z Date Published: 2018-06-14T12:00:00 Description: A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8267. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8243 - http://www.securityfocus.com/bid/104403 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14350.
CVE ID: CVE-2017-14350 Date Updated: 2024-09-16T20:51:56.794Z Date Published: 2017-09-29T15:00:00Z Description: A potential security vulnerability has been identified in HPE Application Performance Management (BSM) Platform versions 9.26, 9.30, 9.40. The vulnerability could be remotely exploited to allow code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.zerodayinitiative.com/advisories/ZDI-17-825/ - http://www.securityfocus.com/bid/100988 - https://softwaresupport.hpe.com/km/KM02960811 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4298.
CVE ID: CVE-2008-4298 Date Updated: 2024-08-07T10:08:34.967Z Date Published: 2008-09-27T00:00:00 Description: Memory leak in the http_request_parse function in request.c in lighttpd before 1.4.20 allows remote attackers to cause a denial of service (memory consumption) via a large number of requests with duplicate request headers. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32069 - http://bugs.gentoo.org/show_bug.cgi?id=238180 - http://secunia.com/advisories/32972 - http://www.openwall.com/lists/oss-security/2008/09/26/5 - http://trac.lighttpd.net/trac/changeset/2305 - http://wiki.rpath.com/Advisories:rPSA-2008-0309 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45471 - http://secunia.com/advisories/32834 - http://www.securityfocus.com/bid/31434 - http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0309 - http://secunia.com/advisories/32132 - http://www.lighttpd.net/security/lighttpd_sa_2008_07.txt - http://www.securityfocus.com/archive/1/497932/100/0/threaded - http://www.vupen.com/english/advisories/2008/2741 - http://www.debian.org/security/2008/dsa-1645 - http://secunia.com/advisories/32480 - http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html - http://trac.lighttpd.net/trac/ticket/1774 - http://security.gentoo.org/glsa/glsa-200812-04.xml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-23178.
CVE ID: CVE-2021-23178 Date Updated: 2024-08-03T19:05:53.926Z Date Published: 2023-04-25T18:33:37.875Z Description: Improper access control in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows attackers to validate online payments with a tokenized payment method that belongs to another user, causing the victim's payment method to be charged instead. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/odoo/odoo/issues/107690 - https://www.debian.org/security/2023/dsa-5399 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-6267.
CVE ID: CVE-2020-6267 Date Updated: 2024-08-04T08:55:22.272Z Date Published: 2020-07-14T12:30:14 Description: Some sensitive cookies in SAP Disclosure Management, version 10.1, are missing HttpOnly flag, leading to sensitive cookie without Http Only flag. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675 - https://launchpad.support.sap.com/#/notes/2758000 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-45095.
CVE ID: CVE-2022-45095 Date Updated: 2024-08-03T14:01:31.526Z Date Published: 2023-02-01T04:45:08.879Z Description: Dell PowerScale OneFS, 8.2.x-9.4.x, contain a command injection vulnerability. An authenticated user having access local shell and having the privilege to gather logs from the cluster could potentially exploit this vulnerability, leading to execute arbitrary commands, denial of service, information disclosure, and data deletion. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000206357/dell-emc-powerscale-onefs-security-updates-for-multiple-security-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0874.
CVE ID: CVE-2023-0874 Date Updated: 2024-08-02T05:24:34.703Z Date Published: 2023-04-10T13:18:03.854Z Description: The Klaviyo WordPress plugin before 3.0.10 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/495e39db-793d-454b-9ef1-dd91cae2c49b No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23451.
CVE ID: CVE-2023-23451 Date Updated: 2024-08-02T10:28:40.926Z Date Published: 2023-04-19T00:00:00 Description: The Flexi Classic and Flexi Soft Gateways SICK UE410-EN3 FLEXI ETHERNET GATEW. with serial number <=2311xxxx all Firmware versions, SICK UE410-EN1 FLEXI ETHERNET GATEW. with serial number <=2311xxxx all Firmware versions, SICK UE410-EN3S04 FLEXI ETHERNET GATEW. with serial number <=2311xxxx all Firmware versions, SICK UE410-EN4 FLEXI ETHERNET GATEW. with serial number <=2311xxxx all Firmware versions, SICK FX0-GENT00000 FLEXISOFT EIP GATEW. with serial number <=2311xxxx with Firmware <=V2.11.0, SICK FX0-GMOD00000 FLEXISOFT MOD GATEW. with serial number <=2311xxxx with Firmware <=V2.11.0, SICK FX0-GPNT00000 FLEXISOFT PNET GATEW. with serial number <=2311xxxx with Firmware <=V2.12.0, SICK FX0-GENT00030 FLEXISOFT EIP GATEW.V2 with serial number <=2311xxxx all Firmware versions, SICK FX0-GPNT00030 FLEXISOFT PNET GATEW.V2 with serial number <=2311xxxx all Firmware versions and SICK FX0-GMOD00010 FLEXISOFT MOD GW with serial number <=2311xxxx with Firmware <=V2.11.0 all have Telnet enabled by factory default. No password is set in the default configuration. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sick.com/psirt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26910.
CVE ID: CVE-2021-26910 Date Updated: 2024-08-03T20:33:41.306Z Date Published: 2021-02-08T19:56:38 Description: Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/netblue30/firejail/commit/97d8a03cad19501f017587cc4e47d8418273834b - https://unparalleled.eu/publications/2021/advisory-unpar-2021-0.txt - https://unparalleled.eu/blog/2021/20210208-rigged-race-against-firejail-for-local-root/ - https://github.com/netblue30/firejail/releases/tag/0.9.64.4 - http://www.openwall.com/lists/oss-security/2021/02/09/1 - https://www.debian.org/security/2021/dsa-4849 - https://lists.debian.org/debian-lts-announce/2021/02/msg00015.html - https://security.gentoo.org/glsa/202105-19 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-25548.
CVE ID: CVE-2023-25548 Date Updated: 2024-08-02T11:25:19.192Z Date Published: 2023-04-18T20:32:42.718Z Description: A CWE-863: Incorrect Authorization vulnerability exists that could allow access to device credentials on specific DCE endpoints not being properly secured when a hacker is using a low privileged user. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5777.
CVE ID: CVE-2017-5777 Date Updated: 2021-06-11T21:02:56 Date Published: 2021-06-11T21:02:56 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1000046.
CVE ID: CVE-2017-1000046 Date Updated: 2024-08-05T21:53:06.271Z Date Published: 2017-07-13T20:00:00 Description: Mautic 2.6.1 and earlier fails to set flags on session cookies No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.trustmatta.com/advisories/MATTA-2017-002.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41553.
CVE ID: CVE-2022-41553 Date Updated: 2024-08-03T12:42:46.456Z Date Published: 2022-11-01T02:11:01.157Z Description: Insertion of Sensitive Information into Temporary File vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Analytics probe component), Hitachi Ops Center Analyzer on Linux (Hitachi Ops Center Analyzer probe component) allows local users to gain sensitive information. This issue affects Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.4.0-00; Hitachi Ops Center Analyzer: from 10.0.0-00 before 10.9.0-00. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-3817.
CVE ID: CVE-2017-3817 Date Updated: 2024-08-05T14:39:40.628Z Date Published: 2017-04-07T17:00:00 Description: A vulnerability in the role-based resource checking functionality of Cisco Unified Computing System (UCS) Director could allow an authenticated, remote attacker to view unauthorized information for any virtual machine in a UCS domain. More Information: CSCvc32434. Known Affected Releases: 5.5(0.1) 6.0(0.0). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-ucs-director - http://www.securitytracker.com/id/1038194 - http://www.securityfocus.com/bid/97430 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5834.
CVE ID: CVE-2018-5834 Date Updated: 2024-09-16T17:22:59.288Z Date Published: 2018-07-06T17:00:00Z Description: In __wlan_hdd_cfg80211_vendor_scan(), a buffer overwrite can potentially occur in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin - https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=ede0f8a4d11ec56ee87177478cc0c25af0894860 - https://source.android.com/security/bulletin/2018-06-01#qualcomm-components No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-21599.
CVE ID: CVE-2020-21599 Date Updated: 2024-08-04T14:30:33.570Z Date Published: 2021-09-16T00:00:00 Description: libde265 v1.0.4 contains a heap buffer overflow in the de265_image::available_zscan function, which can be exploited via a crafted a file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/strukturag/libde265/issues/235 - https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html - https://www.debian.org/security/2023/dsa-5346 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3108.
CVE ID: CVE-2009-3108 Date Updated: 2024-08-07T06:14:55.700Z Date Published: 2009-09-08T23:00:00 Description: The Aclient GUI in Symantec Altiris Deployment Solution 6.9.x before 6.9 SP3 Build 430 installs a client executable with insecure permissions (Everyone:Full Control), which allows local users to gain privileges by replacing the executable with a Trojan horse program. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/36111 - http://secunia.com/advisories/36502 - http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090826_00 - http://www.securitytracker.com/id?1022779 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39039.
CVE ID: CVE-2023-39039 Date Updated: 2024-09-25T18:40:43.362Z Date Published: 2023-09-18T00:00:00 Description: An information leak in Camp Style Project Line v13.6.1 allows attackers to obtain the channel access token and send crafted messages. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://camp.com - https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39039.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23689.
CVE ID: CVE-2023-23689 Date Updated: 2024-08-02T10:35:33.740Z Date Published: 2023-02-28T16:40:39.621Z Description: Dell PowerScale nodes A200, A2000, H400, H500, H600, H5600, F800, F810 integrated hardware management software contains an uncontrolled resource consumption vulnerability. This may allow an unauthenticated network host to impair built-in hardware management functionality and trigger OneFS data protection mechanism causing a denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000209895/dell-emc-powerscale-onefs-security-updates-for-multiple-security No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25709.
CVE ID: CVE-2022-25709 Date Updated: 2024-08-03T04:49:42.670Z Date Published: 2023-03-07T04:43:20.820Z Description: Memory corruption in modem due to use of out of range pointer offset while processing qmi msg No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-7241.
CVE ID: CVE-2013-7241 Date Updated: 2024-08-06T18:01:19.959Z Date Published: 2013-12-31T11:00:00 Description: Cross-site scripting (XSS) vulnerability in the export function in zp-core/zp-extensions/mergedRSS.php in Zenphoto before 1.4.5.4 allows remote attackers to inject arbitrary web script or HTML via the URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://openwall.com/lists/oss-security/2013/12/30/10 - http://seclists.org/bugtraq/2013/Oct/20 - http://openwall.com/lists/oss-security/2013/12/29/1 - http://www.zenphoto.org/news/zenphoto-1.4.5.4 - http://www.enkomio.com/Advisory/SOJOBO-ADV-13-01 - http://www.securityfocus.com/bid/62815 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.