instruction
stringlengths 49
63
⌀ | input
stringlengths 0
69
| output
stringlengths 221
18.7k
|
|---|---|---|
Provide detailed information about CVE-2019-1319.
|
CVE ID: CVE-2019-1319
Date Updated: 2024-08-04T18:13:30.335Z
Date Published: 2019-10-10T13:28:41
Description:
An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1319
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-3195.
|
CVE ID: CVE-2012-3195
Date Updated: 2024-08-06T19:57:50.302Z
Date Published: 2012-10-17T00:00:00
Description:
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.50, 8.51, and 8.52 allows remote authenticated users to affect confidentiality via unknown vectors related to Portal.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/51001
- http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
- http://www.securitytracker.com/id?1027671
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide information about the following MITRE ATT&CK technique:
|
T1053.003 : Cron
|
Name: Cron
ID: T1053.003
URL: https://attack.mitre.org/techniques/T1053/003
Platforms: Linux, macOS
Kill Chain Phases: Execution, Persistence, Privilege Escalation
Description: Adversaries may abuse the `cron` utility to perform task scheduling for initial or recurring execution of malicious code.(Citation: 20 macOS Common Tools and Techniques) The `cron` utility is a time-based job scheduler for Unix-like operating systems. The ` crontab` file contains the schedule of cron entries to be run and the specified times for execution. Any `crontab` files are stored in operating system-specific file paths.
An adversary may use `cron` in Linux or Unix environments to execute programs at system startup or on a scheduled basis for [Persistence](TA0003).
Data Sources: File: File Modification, Process: Process Creation, Scheduled Job: Scheduled Job Creation, Command: Command Execution
Detection: Monitor scheduled task creation from common utilities using command-line invocation. Legitimate scheduled tasks may be created during installation of new software or through system administration functions. Look for changes to tasks that do not correlate with known software, patch cycles, etc.
Suspicious program execution through scheduled tasks may show up as outlier processes that have not been seen before when compared against historical data. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as network connections made for Command and Control, learning details about the environment through Discovery, and Lateral Movement.
|
Provide detailed information about CVE-2017-12505.
|
CVE ID: CVE-2017-12505
Date Updated: 2024-09-17T02:47:45.888Z
Date Published: 2018-02-15T22:00:00Z
Description:
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1039152
- http://www.securityfocus.com/bid/100367
- https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-20002.
|
CVE ID: CVE-2021-20002
Date Updated: 2022-02-09T15:25:15
Date Published: 2022-02-09T15:25:15
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-38221.
|
CVE ID: CVE-2021-38221
Date Updated: 2024-08-04T01:37:16.340Z
Date Published: 2022-06-02T17:27:46
Description:
bbs-go <= 3.3.0 including Custom Edition is vulnerable to stored XSS.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/mlogclub/bbs-go/issues/112
- https://github.com/mlogclub/bbs-go/pull/113
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-4797.
|
CVE ID: CVE-2019-4797
Date Updated: 2019-12-30T16:19:29
Date Published: 2019-12-30T16:19:29
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-4327.
|
CVE ID: CVE-2013-4327
Date Updated: 2024-08-06T16:38:01.987Z
Date Published: 2013-10-03T21:00:00
Description:
systemd does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.ubuntu.com/usn/USN-1961-1
- http://www.openwall.com/lists/oss-security/2013/09/18/6
- http://www.debian.org/security/2013/dsa-2777
- https://bugzilla.redhat.com/show_bug.cgi?id=1006680
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-32413.
|
CVE ID: CVE-2023-32413
Date Updated: 2024-08-02T15:18:36.825Z
Date Published: 2023-06-23T00:00:00
Description:
A race condition was addressed with improved state handling. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, macOS Big Sur 11.7.7, macOS Monterey 12.6.6, iOS 16.5 and iPadOS 16.5. An app may be able to gain root privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT213758
- https://support.apple.com/en-us/HT213759
- https://support.apple.com/en-us/HT213764
- https://support.apple.com/en-us/HT213765
- https://support.apple.com/en-us/HT213760
- https://support.apple.com/en-us/HT213757
- https://support.apple.com/en-us/HT213761
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-20183.
|
CVE ID: CVE-2023-20183
Date Updated: 2024-08-02T09:05:35.013Z
Date Published: 2023-05-18T00:00:00
Description:
Multiple vulnerabilities in the API of Cisco DNA Center Software could allow an authenticated, remote attacker to read information from a restricted container, enumerate user information, or execute arbitrary commands in a restricted container as the root user. For more information about these vulnerabilities, see the Details section of this advisory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-multiple-kTQkGU3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-2169.
|
CVE ID: CVE-2019-2169
Date Updated: 2024-08-04T18:42:50.240Z
Date Published: 2019-09-27T18:05:12
Description:
In libxaac there is a possible information disclosure due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118492282
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/android-10
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-7373.
|
CVE ID: CVE-2017-7373
Date Updated: 2024-08-05T15:56:36.466Z
Date Published: 2017-06-13T20:00:00
Description:
In all Android releases from CAF using the Linux kernel, a double free vulnerability exists in a display driver.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/2017-06-01
- http://www.securitytracker.com/id/1038623
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-5309.
|
CVE ID: CVE-2012-5309
Date Updated: 2024-09-17T03:02:50.693Z
Date Published: 2012-10-08T10:00:00Z
Description:
servlet/traveler in IBM Lotus Notes Traveler through 8.5.3.3 Interim Fix 1 does not properly restrict invalid authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://archives.neohapsis.com/archives/fulldisclosure/2012-10/0001.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-6674.
|
CVE ID: CVE-2016-6674
Date Updated: 2024-08-06T01:36:29.442Z
Date Published: 2016-10-10T10:00:00
Description:
system_server in Android before 2016-10-05 on Nexus devices allows attackers to gain privileges via a crafted application, aka internal bug 30445380.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/93316
- http://source.android.com/security/bulletin/2016-10-01.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-11749.
|
CVE ID: CVE-2018-11749
Date Updated: 2024-09-16T22:44:55.842Z
Date Published: 2018-08-24T13:00:00Z
Description:
When users are configured to use startTLS with RBAC LDAP, at login time, the user's credentials are sent via plaintext to the LDAP server. This affects Puppet Enterprise 2018.1.3, 2017.3.9, and 2016.4.14, and is fixed in Puppet Enterprise 2018.1.4, 2017.3.10, and 2016.4.15. It scored an 8.5 CVSS score.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://puppet.com/security/cve/cve-2018-11749
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-8381.
|
CVE ID: CVE-2015-8381
Date Updated: 2024-08-06T08:13:32.417Z
Date Published: 2015-12-02T01:00:00
Description:
The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2015/11/29/1
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- http://www.securityfocus.com/bid/76187
- https://bugs.exim.org/show_bug.cgi?id=1667
- https://bugs.exim.org/show_bug.cgi?id=1672
- https://bto.bluecoat.com/security-advisory/sa128
- http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
- https://security.gentoo.org/glsa/201607-02
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-16805.
|
CVE ID: CVE-2019-16805
Date Updated: 2022-12-02T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-36578.
|
CVE ID: CVE-2024-36578
Date Updated: 2024-08-02T03:37:05.324Z
Date Published: 2024-06-17T00:00:00
Description:
akbr update 1.0.0 is vulnerable to Prototype Pollution via update/index.js.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gist.github.com/mestrtee/8bc749ec2b5453d887b2f4a362a65897
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-16038.
|
CVE ID: CVE-2018-16038
Date Updated: 2024-08-05T10:10:06.118Z
Date Published: 2019-01-18T17:00:00
Description:
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have a out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/106162
- https://helpx.adobe.com/security/products/acrobat/apsb18-41.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-2357.
|
CVE ID: CVE-2011-2357
Date Updated: 2024-08-06T23:00:33.673Z
Date Published: 2011-08-12T18:00:00
Description:
Cross-application scripting vulnerability in the Browser URL loading functionality in Android 2.3.4 and 3.1 allows local applications to bypass the sandbox and execute arbitrary Javascript in arbitrary domains by (1) causing the MAX_TAB number of tabs to be opened, then loading a URI to the targeted domain into the current tab, or (2) making two startActivity function calls beginning with the targeted domain's URI followed by the malicious Javascript while the UI focus is still associated with the targeted domain.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://osvdb.org/74260
- http://android.git.kernel.org/?p=platform/packages/apps/Browser.git%3B%20a=commit%3Bh=096bae248453abe83cbb2e5a2c744bd62cdb620b
- http://android.git.kernel.org/?p=platform/cts.git%3Ba=commit%3Bh=7e48fb87d48d27e65942b53b7918288c8d740e17
- http://www.securityfocus.com/archive/1/519146/100/0/threaded
- http://secunia.com/advisories/45457
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68937
- http://www.securityfocus.com/bid/48954
- http://android.git.kernel.org/?p=platform/packages/apps/Browser.git%3B%20a=commit%3Bh=afa4ab1e4c1d645e34bd408ce04cadfd2e5dae1e
- http://blog.watchfire.com/files/advisory-android-browser.pdf
- http://www.infsec.cs.uni-saarland.de/projects/android-vuln/android_xss.pdf
- http://www.infsec.cs.uni-saarland.de/projects/android-vuln/
- http://blog.watchfire.com/wfblog/2011/08/android-browser-cross-application-scripting-cve-2011-2357.html
- http://seclists.org/fulldisclosure/2011/Aug/9
- http://securitytracker.com/id?1025881
- http://securityreason.com/securityalert/8335
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-6490.
|
CVE ID: CVE-2013-6490
Date Updated: 2024-08-06T17:46:22.110Z
Date Published: 2014-02-06T16:00:00
Description:
The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a negative Content-Length header, which triggers a buffer overflow.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://rhn.redhat.com/errata/RHSA-2014-0139.html
- http://www.debian.org/security/2014/dsa-2859
- http://www.ubuntu.com/usn/USN-2100-1
- http://www.securityfocus.com/bid/65195
- http://www.pidgin.im/news/security/?id=84
- http://hg.pidgin.im/pidgin/main/rev/6bd2dd10e5da
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-34394.
|
CVE ID: CVE-2024-34394
Date Updated: 2024-08-02T02:51:11.412Z
Date Published: 2024-05-02T18:57:35.301Z
Description:
libxmljs2 is vulnerable to a type confusion vulnerability when parsing a specially crafted XML while invoking the namespaces() function (which invokes XmlNode::get_local_namespaces()) on a grand-child of a node that refers to an entity. This vulnerability can lead to denial of service and remote code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://research.jfrog.com/vulnerabilities/libxmljs2-namespaces-type-confusion-rce-jfsa-2024-001034098/
- https://github.com/marudor/libxmljs2/issues/205
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-29052.
|
CVE ID: CVE-2022-29052
Date Updated: 2024-08-03T06:10:59.255Z
Date Published: 2022-04-12T19:50:54
Description:
Jenkins Google Compute Engine Plugin 4.3.8 and earlier stores private keys unencrypted in cloud agent config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2045
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-4862.
|
CVE ID: CVE-2022-4862
Date Updated: 2024-08-28T20:06:02.609Z
Date Published: 2023-03-06T10:46:20.520Z
Description:
Rendering of HTML provided by another authenticated user is possible in browser on M-Files Web before 22.12.12140.3. This allows the content to steal user sensitive information.
This issue affects M-Files New Web: before 22.12.12140.3.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.m-files.com/about/trust-center/security-advisories/cve-2022-4862/
- https://product.m-files.com/security-advisories/cve-2022-4862/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-0869.
|
CVE ID: CVE-2019-0869
Date Updated: 2024-08-04T17:58:59.578Z
Date Published: 2019-04-09T20:20:34
Description:
A spoofing vulnerability exists in Microsoft Azure DevOps Server when it fails to properly handle web requests, aka 'Azure DevOps Server HTML Injection Vulnerability'.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0869
- http://www.securityfocus.com/bid/107768
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-37211.
|
CVE ID: CVE-2021-37211
Date Updated: 2024-09-16T22:30:28.822Z
Date Published: 2021-08-09T09:15:25.418791Z
Description:
The bulletin function of Flygo does not filter special characters while a new announcement is added. Remoter attackers can use the vulnerability with general user’s credential to inject JavaScript and execute stored XSS attacks.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.twcert.org.tw/tw/cp-132-4988-8f642-1.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-38131.
|
CVE ID: CVE-2024-38131
Date Updated: 2024-09-19T21:52:52.872Z
Date Published: 2024-08-13T17:30:09.638Z
Description:
Clipboard Virtual Channel Extension Remote Code Execution Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38131
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-45142.
|
CVE ID: CVE-2022-45142
Date Updated: 2024-08-03T14:09:56.389Z
Date Published: 2023-03-06T00:00:00
Description:
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.openwall.com/lists/oss-security/2023/02/08/1
- https://security.gentoo.org/glsa/202310-06
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-35597.
|
CVE ID: CVE-2021-35597
Date Updated: 2024-09-25T19:27:28.131Z
Date Published: 2021-10-20T10:50:39
Description:
Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://security.netapp.com/advisory/ntap-20211022-0005/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-41089.
|
CVE ID: CVE-2023-41089
Date Updated: 2024-09-12T17:54:32.972Z
Date Published: 2023-10-19T18:13:25.005Z
Description:
The affected product is vulnerable to an improper authentication vulnerability, which may allow an attacker to impersonate a legitimate user as long as the device keeps the session active, since the attack takes advantage of the cookie header to generate "legitimate" requests.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.cisa.gov/news-events/ics-advisories/icsa-23-271-02
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-39476.
|
CVE ID: CVE-2024-39476
Date Updated: 2024-08-02T04:26:15.248Z
Date Published: 2024-07-05T06:55:06.559Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING
Xiao reported that lvm2 test lvconvert-raid-takeover.sh can hang with
small possibility, the root cause is exactly the same as commit
bed9e27baf52 ("Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"")
However, Dan reported another hang after that, and junxiao investigated
the problem and found out that this is caused by plugged bio can't issue
from raid5d().
Current implementation in raid5d() has a weird dependence:
1) md_check_recovery() from raid5d() must hold 'reconfig_mutex' to clear
MD_SB_CHANGE_PENDING;
2) raid5d() handles IO in a deadloop, until all IO are issued;
3) IO from raid5d() must wait for MD_SB_CHANGE_PENDING to be cleared;
This behaviour is introduce before v2.6, and for consequence, if other
context hold 'reconfig_mutex', and md_check_recovery() can't update
super_block, then raid5d() will waste one cpu 100% by the deadloop, until
'reconfig_mutex' is released.
Refer to the implementation from raid1 and raid10, fix this problem by
skipping issue IO if MD_SB_CHANGE_PENDING is still set after
md_check_recovery(), daemon thread will be woken up when 'reconfig_mutex'
is released. Meanwhile, the hang problem will be fixed as well.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/b32aa95843cac6b12c2c014d40fca18aef24a347
- https://git.kernel.org/stable/c/634ba3c97ec413cb10681c7b196db43ee461ecf4
- https://git.kernel.org/stable/c/aa64464c8f4d2ab92f6d0b959a1e0767b829d787
- https://git.kernel.org/stable/c/098d54934814dd876963abfe751c3b1cf7fbe56a
- https://git.kernel.org/stable/c/3f8d5e802d4cedd445f9a89be8c3fd2d0e99024b
- https://git.kernel.org/stable/c/cd2538e5af495b3c747e503db346470fc1ffc447
- https://git.kernel.org/stable/c/e332a12f65d8fed8cf63bedb4e9317bb872b9ac7
- https://git.kernel.org/stable/c/151f66bb618d1fd0eeb84acb61b4a9fa5d8bb0fa
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-44138.
|
CVE ID: CVE-2021-44138
Date Updated: 2024-08-04T04:17:23.598Z
Date Published: 2022-04-04T12:03:05
Description:
There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/maybe-why-not/reponame/issues/2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-20821.
|
CVE ID: CVE-2022-20821
Date Updated: 2024-09-17T01:30:49.057Z
Date Published: 2022-05-26T14:00:31.613559Z
Description:
A vulnerability in the health check RPM of Cisco IOS XR Software could allow an unauthenticated, remote attacker to access the Redis instance that is running within the NOSi container. This vulnerability exists because the health check RPM opens TCP port 6379 by default upon activation. An attacker could exploit this vulnerability by connecting to the Redis instance on the open port. A successful exploit could allow the attacker to write to the Redis in-memory database, write arbitrary files to the container filesystem, and retrieve information about the Redis database. Given the configuration of the sandboxed container that the Redis instance runs in, a remote attacker would be unable to execute remote code or abuse the integrity of the Cisco IOS XR Software host system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-redis-ABJyE5xK
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-3987.
|
CVE ID: CVE-2012-3987
Date Updated: 2024-08-06T20:21:04.256Z
Date Published: 2012-10-10T17:00:00
Description:
Mozilla Firefox before 16.0 on Android assigns chrome privileges to Reader Mode pages, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://osvdb.org/86107
- http://secunia.com/advisories/50856
- https://bugzilla.mozilla.org/show_bug.cgi?id=778582
- http://www.mozilla.org/security/announce/2012/mfsa2012-78.html
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-0236.
|
CVE ID: CVE-2017-0236
Date Updated: 2024-08-05T12:55:19.129Z
Date Published: 2017-05-12T14:00:00
Description:
A remote code execution vulnerability exists in Microsoft Edge in the way that the Chakra JavaScript engine renders when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0224, CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235, and CVE-2017-0238.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1038431
- http://www.securityfocus.com/bid/98234
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0236
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-24831.
|
CVE ID: CVE-2022-24831
Date Updated: 2024-08-03T04:20:50.506Z
Date Published: 2022-05-14T00:30:14
Description:
OpenClinica is an open source software for Electronic Data Capture (EDC) and Clinical Data Management (CDM). Versions prior to 3.16.1 are vulnerable to SQL injection due to the use of string concatenation to create SQL queries instead of prepared statements. No known workarounds exist. This issue has been patched in 3.16.1, 3.15.9, 3.14.1, and 3.13.1 and users are advised to upgrade.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/OpenClinica/OpenClinica/security/advisories/GHSA-5289-4jwp-xp9h
- https://github.com/OpenClinica/OpenClinica/pull/3490/commits/b152cc63019230c9973965a98e4386ea5322c18f
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-20899.
|
CVE ID: CVE-2018-20899
Date Updated: 2024-08-05T12:12:29.310Z
Date Published: 2019-08-01T13:55:56
Description:
cPanel before 71.9980.37 allows stored XSS in the WHM cPAddons installation interface (SEC-398).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://documentation.cpanel.net/display/CL/72+Change+Log
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-48262.
|
CVE ID: CVE-2023-48262
Date Updated: 2024-08-02T21:23:39.475Z
Date Published: 2024-01-10T13:08:03.996Z
Description:
The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-37345.
|
CVE ID: CVE-2022-37345
Date Updated: 2024-08-03T10:29:20.912Z
Date Published: 2022-11-11T15:48:50.315Z
Description:
Improper authentication in BIOS firmware[A1] for some Intel(R) NUC Kits before version RY0386 may allow an authenticated user to potentially enable escalation of privilege via local access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-29844.
|
CVE ID: CVE-2024-29844
Date Updated: 2024-09-25T22:37:13.799Z
Date Published: 2024-04-14T23:48:26.802Z
Description:
Default credentials on the Web Interface of Evolution Controller 2.x allows anyone to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the password. There is no warning or prompt to ask the user to change the default password.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-14639.
|
CVE ID: CVE-2018-14639
Date Updated: 2021-06-18T14:00:22
Date Published: 2021-06-18T14:00:22
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-11815.
|
CVE ID: CVE-2017-11815
Date Updated: 2024-09-16T18:24:46.580Z
Date Published: 2017-10-13T13:00:00Z
Description:
The Microsoft Server Block Message (SMB) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability in the way that it handles certain requests, aka "Windows SMB Information Disclosure Vulnerability".
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1039528
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11815
- http://www.securityfocus.com/bid/101136
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-23470.
|
CVE ID: CVE-2022-23470
Date Updated: 2024-08-03T03:43:46.038Z
Date Published: 2022-12-06T17:37:23.638Z
Description:
Galaxy is an open-source platform for data analysis. An arbitrary file read exists in Galaxy 22.01 and Galaxy 22.05 due to the switch to Gunicorn, which can be used to read any file accessible to the operating system user under which Galaxy is running. This vulnerability affects Galaxy 22.01 and higher, after the switch to gunicorn, which serve static contents directly. Additionally, the vulnerability is mitigated when using Nginx or Apache to serve /static/* contents, instead of Galaxy's internal middleware. This issue has been patched in commit `e5e6bda4f` and will be included in future releases. Users are advised to manually patch their installations. There are no known workarounds for this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/galaxyproject/galaxy/security/advisories/GHSA-grjf-2ghx-q77x
- https://github.com/galaxyproject/galaxy/commit/e5e6bda4f014f807ca77ee0cf6af777a55918346
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-34725.
|
CVE ID: CVE-2022-34725
Date Updated: 2024-08-03T09:15:16.016Z
Date Published: 2022-09-13T18:41:40
Description:
Windows ALPC Elevation of Privilege Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34725
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-20211.
|
CVE ID: CVE-2020-20211
Date Updated: 2024-08-04T14:15:29.020Z
Date Published: 2021-07-07T13:26:20
Description:
Mikrotik RouterOs 6.44.5 (long-term tree) suffers from an assertion failure vulnerability in the /nova/bin/console process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://mikrotik.com/
- http://seclists.org/fulldisclosure/2021/May/0
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-5144.
|
CVE ID: CVE-2011-5144
Date Updated: 2024-08-07T00:30:46.822Z
Date Published: 2012-08-31T21:00:00
Description:
Open Business Management (OBM) 2.4.0-rc13 and earlier allows remote attackers to obtain configuration information via a direct request to test.php, which calls the phpinfo function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.htbridge.ch/advisory/multiple_vulnerabilities_in_obm.html
- http://osvdb.org/78009
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71924
- http://secunia.com/advisories/47139
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-24435.
|
CVE ID: CVE-2023-24435
Date Updated: 2024-08-02T10:56:03.902Z
Date Published: 2023-01-24T00:00:00
Description:
A missing permission check in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-1630.
|
CVE ID: CVE-2016-1630
Date Updated: 2024-08-05T23:02:12.337Z
Date Published: 2016-03-06T02:00:00
Description:
The ContainerNode::parserRemoveChild function in WebKit/Source/core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 49.0.2623.75, mishandles widget updates, which makes it easier for remote attackers to bypass the Same Origin Policy via a crafted web site.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html
- http://www.securityfocus.com/bid/84008
- http://www.debian.org/security/2016/dsa-3507
- http://www.securitytracker.com/id/1035185
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html
- https://security.gentoo.org/glsa/201603-09
- https://codereview.chromium.org/1464223002
- https://code.google.com/p/chromium/issues/detail?id=560011
- http://www.ubuntu.com/usn/USN-2920-1
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-0019.
|
CVE ID: CVE-2021-0019
Date Updated: 2023-05-16T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-39863.
|
CVE ID: CVE-2024-39863
Date Updated: 2024-09-13T17:05:03.928Z
Date Published: 2024-07-17T07:53:31.820Z
Description:
Apache Airflow versions before 2.9.3 have a vulnerability that allows an authenticated attacker to inject a malicious link when installing a provider. Users are recommended to upgrade to version 2.9.3, which fixes this issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/apache/airflow/pull/40475
- https://lists.apache.org/thread/gxkvs279f1mbvckv5q65worr6how20o3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-5104.
|
CVE ID: CVE-2024-5104
Date Updated: 2024-08-01T21:03:10.559Z
Date Published: 2024-05-19T22:00:04.318Z
Description:
A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /view/student_grade_wise.php. The manipulation of the argument grade leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-265094 is the identifier assigned to this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.265094
- https://vuldb.com/?ctiid.265094
- https://vuldb.com/?submit.338507
- https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%209.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-32159.
|
CVE ID: CVE-2023-32159
Date Updated: 2024-08-02T15:10:23.757Z
Date Published: 2024-05-03T01:56:41.112Z
Description:
PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17765.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-23-641/
- https://www.tracker-software.com/product/pdf-xchange-editor/history
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-10234.
|
CVE ID: CVE-2020-10234
Date Updated: 2024-08-04T10:58:39.853Z
Date Published: 2021-02-05T18:58:10
Description:
The AscRegistryFilter.sys kernel driver in IObit Advanced SystemCare 13.2 allows an unprivileged user to send an IOCTL to the device driver. If the user provides a NULL entry for the dwIoControlCode parameter, a kernel panic (aka BSOD) follows. The IOCTL codes can be found in the dispatch function: 0x8001E000, 0x8001E004, 0x8001E008, 0x8001E00C, 0x8001E010, 0x8001E014, 0x8001E020, 0x8001E024, 0x8001E040, 0x8001E044, and 0x8001E048. \DosDevices\AscRegistryFilter and \Device\AscRegistryFilter are affected.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.iobit.com/en/advancedsystemcarefree.php
- https://github.com/FULLSHADE/Kernel-exploits
- https://github.com/FULLSHADE/Kernel-exploits/tree/master/AscRegistryFilter.sys
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-18236.
|
CVE ID: CVE-2017-18236
Date Updated: 2024-08-05T21:13:49.123Z
Date Published: 2018-03-15T19:00:00
Description:
An issue was discovered in Exempi before 2.4.4. The ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp allows remote attackers to cause a denial of service (infinite loop) via a crafted .asf file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cgit.freedesktop.org/exempi/commit/?id=fe59605d3520bf2ca4e0a963d194f10e9fee5806
- https://bugs.freedesktop.org/show_bug.cgi?id=102484
- https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html
- https://usn.ubuntu.com/3668-1/
- https://access.redhat.com/errata/RHSA-2019:2048
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-27801.
|
CVE ID: CVE-2023-27801
Date Updated: 2024-08-02T12:16:36.870Z
Date Published: 2023-04-07T00:00:00
Description:
H3C Magic R100 R100V100R005.bin was discovered to contain a stack overflow via the DelDNSHnList interface at /goform/aspForm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://hackmd.io/%400dayResearch/DelDNSHnList
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-1615.
|
CVE ID: CVE-2023-1615
Date Updated: 2024-08-02T05:57:24.385Z
Date Published: 2023-06-09T05:33:22.261Z
Description:
The Ultimate Addons for Contact Form 7 plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in versions up to, and including, 3.1.23. This makes it possible for authenticated attackers of any authorization level to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/817ca119-ddaf-4525-beee-68c4e0aac544?source=cve
- https://wordpress.org/plugins/ultimate-addons-for-contact-form-7/#developers
- https://plugins.trac.wordpress.org/browser/ultimate-addons-for-contact-form-7/trunk/addons/database/database.php?rev=2897709#L255
- https://plugins.trac.wordpress.org/changeset/2901676/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-2463.
|
CVE ID: CVE-2022-2463
Date Updated: 2024-08-03T00:39:07.530Z
Date Published: 2022-08-25T17:24:53
Description:
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. A crafted malicious .7z exchange file may allow an attacker to gain the privileges of the ISaGRAF Workbench software when opened. If the software is running at the SYSTEM level, then the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-32739.
|
CVE ID: CVE-2024-32739
Date Updated: 2024-08-02T02:20:35.176Z
Date Published: 2024-05-09T14:58:30.263Z
Description:
A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can leak sensitive information via the "query_ptask_verbose" function within MCUDBHelper.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.tenable.com/security/research/tra-2024-14
- https://www.cyberpower.com/global/en/File/GetFileSampleByType?fileId=SU-18070002-07&fileSubType=FileReleaseNote
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2008-0371.
|
CVE ID: CVE-2008-0371
Date Updated: 2024-08-07T07:39:35.228Z
Date Published: 2008-01-22T19:00:00
Description:
Multiple SQL injection vulnerabilities in aliTalk 1.9.1.1, when magic_quotes_gpc is disabled, allow remote authenticated users to execute arbitrary SQL commands via (1) the mohit parameter to (a) inc/receivertwo.php; and allow remote attackers to execute arbitrary SQL commands via (2) the id parameter to (b) inc/usercp.php, related to functionz/usercp.php; or (3) the username parameter to (c) admin/index.php, related to functionz/first_process.php, or (d) index.php. NOTE: some of these details are obtained from third party information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39745
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39735
- https://www.exploit-db.com/exploits/4922
- http://secunia.com/advisories/28515
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39733
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39736
- http://www.securityfocus.com/bid/27315
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-38186.
|
CVE ID: CVE-2021-38186
Date Updated: 2024-08-04T01:37:15.492Z
Date Published: 2021-08-08T05:10:53
Description:
An issue was discovered in the comrak crate before 0.10.1 for Rust. It mishandles & characters, leading to XSS via &# HTML entities.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://rustsec.org/advisories/RUSTSEC-2021-0063.html
- https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/comrak/RUSTSEC-2021-0063.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-6409.
|
CVE ID: CVE-2023-6409
Date Updated: 2024-08-02T08:28:21.802Z
Date Published: 2024-02-14T16:47:05.519Z
Description:
CWE-798: Use of Hard-coded Credentials vulnerability exists that could cause unauthorized
access to a project file protected with application password when opening the file with
EcoStruxure Control Expert.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-01.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-1000221.
|
CVE ID: CVE-2017-1000221
Date Updated: 2024-09-16T19:55:44.833Z
Date Published: 2017-11-17T22:00:00Z
Description:
In Opencast 2.2.3 and older if user names overlap, the Opencast search service used for publication to the media modules and players will handle the access control incorrectly so that users only need to match part of the user name used for the access restriction. For example, a user with the role ROLE_USER will have access to recordings published only for ROLE_USER_X.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://opencast.jira.com/browse/MH-11862
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-41008.
|
CVE ID: CVE-2021-41008
Date Updated: 2023-01-05T21:29:15.715Z
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-1000161.
|
CVE ID: CVE-2018-1000161
Date Updated: 2024-08-05T12:33:49.471Z
Date Published: 2018-04-18T19:00:00
Description:
nmap version 6.49BETA6 through 7.60, up to and including SVN revision 37147 contains a Directory Traversal vulnerability in NSE script http-fetch that can result in file overwrite as the user is running it. This attack appears to be exploitable via a victim that runs NSE script http-fetch against a malicious web site. This vulnerability appears to have been fixed in 7.7.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://nmap.org/changelog.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-26778.
|
CVE ID: CVE-2022-26778
Date Updated: 2024-08-03T05:11:44.480Z
Date Published: 2022-03-09T06:53:18
Description:
Veritas System Recovery (VSR) 18 and 21 stores a network destination password in the Windows registry during configuration of the backup configuration. This could allow a Windows user (who has sufficient privileges) to access a network file system that they were not authorized to access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.veritas.com/content/support/en_US/security/VTS21-002
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-5493.
|
CVE ID: CVE-2017-5493
Date Updated: 2024-08-05T15:04:14.697Z
Date Published: 2017-01-15T02:00:00
Description:
wp-includes/ms-functions.php in the Multisite WordPress API in WordPress before 4.7.1 does not properly choose random numbers for keys, which makes it easier for remote attackers to bypass intended access restrictions via a crafted (1) site signup or (2) user signup.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpvulndb.com/vulnerabilities/8721
- http://www.securityfocus.com/bid/95401
- http://www.debian.org/security/2017/dsa-3779
- https://codex.wordpress.org/Version_4.7.1
- http://www.openwall.com/lists/oss-security/2017/01/14/6
- http://www.securitytracker.com/id/1037591
- https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4
- https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-35308.
|
CVE ID: CVE-2022-35308
Date Updated: 2022-07-11T19:29:15
Date Published: 2022-07-11T19:29:15
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-0462.
|
CVE ID: CVE-2016-0462
Date Updated: 2024-08-05T22:22:54.689Z
Date Published: 2016-01-21T02:00:00
Description:
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53 and 8.54 allows remote authenticated users to affect confidentiality via unknown vectors related to Multichannel Framework, a different vulnerability than CVE-2015-2650.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.securitytracker.com/id/1034720
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-2628.
|
CVE ID: CVE-2016-2628
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-35719.
|
CVE ID: CVE-2023-35719
Date Updated: 2024-09-26T20:24:03.273Z
Date Published: 2023-09-06T04:03:08.608Z
Description:
ManageEngine ADSelfService Plus GINA Client Insufficient Verification of Data Authenticity Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of ManageEngine ADSelfService Plus. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the Password Reset Portal used by the GINA client. The issue results from the lack of proper authentication of data received via HTTP. An attacker can leverage this vulnerability to bypass authentication and execute code in the context of SYSTEM. Was ZDI-CAN-17009.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-23-891
- https://www.manageengine.com/products/self-service-password/kb/our-response-to-CVE-2023-35719.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-35009.
|
CVE ID: CVE-2023-35009
Date Updated: 2024-08-02T16:17:04.275Z
Date Published: 2023-08-16T22:44:27.127Z
Description:
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could allow a remote attacker to obtain system information without authentication which could be used in reconnaissance to gather information that could be used for future attacks. IBM X-Force ID: 257703.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/7026692
- https://exchange.xforce.ibmcloud.com/vulnerabilities/257703
- https://security.netapp.com/advisory/ntap-20230831-0014/
- https://security.netapp.com/advisory/ntap-20240621-0005/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-8651.
|
CVE ID: CVE-2015-8651
Date Updated: 2024-08-06T08:20:43.557Z
Date Published: 2015-12-28T23:00:00
Description:
Integer overflow in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html
- http://www.securitytracker.com/id/1034544
- http://rhn.redhat.com/errata/RHSA-2015-2697.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://helpx.adobe.com/security/products/flash-player/apsb16-01.html
- http://www.securityfocus.com/bid/79705
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html
- https://security.gentoo.org/glsa/201601-03
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2009-3700.
|
CVE ID: CVE-2009-3700
Date Updated: 2024-08-07T06:38:30.282Z
Date Published: 2009-10-28T14:00:00
Description:
Buffer overflow in sgLog.c in squidGuard 1.3 and 1.4 allows remote attackers to cause a denial of service (application hang or loss of blocking functionality) via a long URL with many / (slash) characters, related to "emergency mode."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/53921
- http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091015
- http://www.vupen.com/english/advisories/2009/3013
- http://securitytracker.com/id?1023079
- http://secunia.com/advisories/37107
- http://www.vupen.com/english/advisories/2010/1043
- http://www.osvdb.org/59163
- http://www.debian.org/security/2010/dsa-2040
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://www.securityfocus.com/bid/36800
- http://secunia.com/advisories/39679
- http://www.securityfocus.com/archive/1/507440/100/0/threaded
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-32114.
|
CVE ID: CVE-2024-32114
Date Updated: 2024-08-02T02:06:44.047Z
Date Published: 2024-05-02T08:29:18.219Z
Description:
In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web context (where the Jolokia JMX REST API and the Message REST API are located).
It means that anyone can use these layers without any required authentication. Potentially, anyone can interact with the broker (using Jolokia JMX REST API) and/or produce/consume messages or purge/delete destinations (using the Message REST API).
To mitigate, users can update the default conf/jetty.xml configuration file to add authentication requirement:
<bean id="securityConstraintMapping" class="org.eclipse.jetty.security.ConstraintMapping">
<property name="constraint" ref="securityConstraint" />
<property name="pathSpec" value="/" />
</bean>
Or we encourage users to upgrade to Apache ActiveMQ 6.1.2 where the default configuration has been updated with authentication by default.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://activemq.apache.org/security-advisories.data/CVE-2024-32114-announcement.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-1853.
|
CVE ID: CVE-2023-1853
Date Updated: 2024-08-02T06:05:26.692Z
Date Published: 2023-04-05T07:40:12.354Z
Description:
A vulnerability, which was classified as problematic, has been found in SourceCodester Online Payroll System 1.0. This issue affects some unknown processing of the file /admin/employee_edit.php. The manipulation of the argument of leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224993 was assigned to this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.224993
- https://vuldb.com/?ctiid.224993
- https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%209.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-29553.
|
CVE ID: CVE-2020-29553
Date Updated: 2024-08-04T16:55:10.462Z
Date Published: 2021-03-15T18:20:50
Description:
The Scheduler in Grav CMS through 1.7.0-rc.17 allows an attacker to execute a system command by tricking an admin into visiting a malicious website (CSRF).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://blog.bssi.fr/cve-2020-29553-cve-2020-29555-cve-2020-29556-multiple-vulnerabilities-within-cms-grav/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-39184.
|
CVE ID: CVE-2023-39184
Date Updated: 2024-08-02T18:02:06.397Z
Date Published: 2023-08-08T09:20:52.900Z
Description:
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 7). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PSM files. This could allow an attacker to execute code in the context of the current process.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cert-portal.siemens.com/productcert/pdf/ssa-811403.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-0509.
|
CVE ID: CVE-2014-0509
Date Updated: 2024-08-06T09:20:19.468Z
Date Published: 2014-04-08T21:00:00
Description:
Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and OS X and before 11.2.202.350 on Linux, Adobe AIR before 13.0.0.83 on Android, Adobe AIR SDK before 13.0.0.83, and Adobe AIR SDK & Compiler before 13.0.0.83 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://helpx.adobe.com/security/products/flash-player/apsb14-09.html
- http://www.securityfocus.com/bid/66703
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00012.html
- http://security.gentoo.org/glsa/glsa-201405-04.xml
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00036.html
- http://rhn.redhat.com/errata/RHSA-2014-0380.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00050.html
- http://www.securitytracker.com/id/1030035
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-6356.
|
CVE ID: CVE-2012-6356
Date Updated: 2024-08-06T21:28:39.917Z
Date Published: 2013-02-20T11:00:00
Description:
IBM Maximo Asset Management 7.5, Maximo Asset Management Essentials 7.5, and SmartCloud Control Desk 7.5 allow remote authenticated users to gain privileges via vectors related to an import operation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg21625624
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV27329
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80748
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-24804.
|
CVE ID: CVE-2021-24804
Date Updated: 2024-08-03T19:42:17.213Z
Date Published: 2021-11-17T10:15:43
Description:
The Simple JWT Login WordPress plugin before 3.2.1 does not have nonce checks when saving its settings, allowing attackers to make a logged in admin changed them. Settings such as HMAC verification secret, account registering and default user roles can be updated, which could result in site takeover.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/6f015e8e-462b-4ef7-a9a1-bb91e7d28e37
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-42271.
|
CVE ID: CVE-2022-42271
Date Updated: 2024-08-03T13:03:45.777Z
Date Published: 2023-01-11T06:00:01.038Z
Description:
NVIDIA BMC contains a vulnerability in IPMI handler, where an authorized attacker can cause a buffer overflow and cause a denial of service or gain code execution
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://nvidia.custhelp.com/app/answers/detail/a_id/5435
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-18479.
|
CVE ID: CVE-2018-18479
Date Updated: 2020-03-02T19:36:59
Date Published: 2020-03-02T19:36:59
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-11883.
|
CVE ID: CVE-2017-11883
Date Updated: 2024-09-16T23:06:51.531Z
Date Published: 2017-11-15T03:00:00Z
Description:
.NET Core 1.0, 1.1, and 2.0 allow an unauthenticated attacker to remotely cause a denial of service attack against a .NET Core web application by improperly handling web requests, aka ".NET CORE Denial Of Service Vulnerability".
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11883
- http://www.securityfocus.com/bid/101835
- http://www.securitytracker.com/id/1039793
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-36168.
|
CVE ID: CVE-2022-36168
Date Updated: 2024-08-03T10:00:04.255Z
Date Published: 2022-08-25T23:40:09
Description:
A directory traversal vulnerability was discovered in Wuzhicms 4.1.0. via /coreframe/app/attachment/admin/index.php:
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/wuzhicms/wuzhicms/issues/202
- https://github.com/Cigar-Fasion/CVE/issues/1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-10007.
|
CVE ID: CVE-2013-10007
Date Updated: 2024-08-06T18:09:17.109Z
Date Published: 2023-01-03T10:56:25.721Z
Description:
A vulnerability classified as problematic has been found in ethitter WP-Print-Friendly up to 0.5.2. This affects an unknown part of the file wp-print-friendly.php. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. Upgrading to version 0.5.3 is able to address this issue. The identifier of the patch is 437787292670c20b4abe20160ebbe8428187f2b4. It is recommended to upgrade the affected component. The identifier VDB-217269 was assigned to this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.217269
- https://vuldb.com/?ctiid.217269
- https://github.com/ethitter/WP-Print-Friendly/pull/4
- https://github.com/ethitter/WP-Print-Friendly/commit/437787292670c20b4abe20160ebbe8428187f2b4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-0581.
|
CVE ID: CVE-2012-0581
Date Updated: 2024-08-06T18:30:53.338Z
Date Published: 2012-05-03T22:00:00
Description:
Unspecified vulnerability in the Oracle Agile component in Oracle Supply Chain Products Suite 5.2.2, 6.0.0, and 6.1.1 allows remote attackers to affect integrity, related to SCRM - Company Profiles.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html
- http://www.securitytracker.com/id?1026937
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
- http://secunia.com/advisories/48874
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-2406.
|
CVE ID: CVE-2024-2406
Date Updated: 2024-08-01T19:11:53.483Z
Date Published: 2024-03-12T20:31:06.188Z
Description:
A vulnerability, which was classified as critical, was found in Gacjie Server up to 1.0. This affects the function index of the file /app/admin/controller/Upload.php. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256503.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.256503
- https://vuldb.com/?ctiid.256503
- https://note.zhaoj.in/share/7kZiVRqSuiMx
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-15121.
|
CVE ID: CVE-2020-15121
Date Updated: 2024-08-04T13:08:21.976Z
Date Published: 2020-07-20T18:00:25
Description:
In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/radareorg/radare2/security/advisories/GHSA-r552-vp94-9358
- https://github.com/radareorg/radare2/issues/16945
- https://github.com/radareorg/radare2/pull/16966
- https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YE77P5RSE2T7JHEKMWF2ARTSJGMPXCFY/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWC7KNBETYE5MK6VIUU26LUIISIFGSBZ/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-2248.
|
CVE ID: CVE-2020-2248
Date Updated: 2024-08-04T07:01:41.186Z
Date Published: 2020-09-01T13:50:34
Description:
Jenkins JSGames Plugin 0.2 and earlier evaluates part of a URL as code, resulting in a reflected cross-site scripting (XSS) vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1905
- http://www.openwall.com/lists/oss-security/2020/09/01/3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2009-3856.
|
CVE ID: CVE-2009-3856
Date Updated: 2024-09-16T18:24:47.531Z
Date Published: 2009-11-04T17:00:00Z
Description:
Cross-site scripting (XSS) vulnerability in the default URI in news/ in Twilight CMS before 4.1 allows remote attackers to inject arbitrary web script or HTML via the calendar parameter. NOTE: some of these details are obtained from third party information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/37204
- http://onsec.ru/vuln?id=10
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-9515.
|
CVE ID: CVE-2019-9515
Date Updated: 2024-08-04T21:54:44.327Z
Date Published: 2019-08-13T20:50:59
Description:
Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.cert.org/vuls/id/605641/
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E
- https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E
- https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E
- https://seclists.org/bugtraq/2019/Aug/24
- http://seclists.org/fulldisclosure/2019/Aug/16
- https://www.synology.com/security/advisory/Synology_SA_19_33
- https://support.f5.com/csp/article/K50233772
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/
- https://seclists.org/bugtraq/2019/Aug/43
- https://www.debian.org/security/2019/dsa-4508
- https://www.debian.org/security/2019/dsa-4520
- https://seclists.org/bugtraq/2019/Sep/18
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- https://access.redhat.com/errata/RHSA-2019:2766
- https://access.redhat.com/errata/RHSA-2019:2796
- https://access.redhat.com/errata/RHSA-2019:2861
- https://access.redhat.com/errata/RHSA-2019:2925
- https://access.redhat.com/errata/RHSA-2019:2939
- https://access.redhat.com/errata/RHSA-2019:2955
- https://support.f5.com/csp/article/K50233772?utm_source=f5support&%3Butm_medium=RSS
- https://access.redhat.com/errata/RHSA-2019:3892
- https://access.redhat.com/errata/RHSA-2019:4018
- https://access.redhat.com/errata/RHSA-2019:4019
- https://access.redhat.com/errata/RHSA-2019:4021
- https://access.redhat.com/errata/RHSA-2019:4020
- https://access.redhat.com/errata/RHSA-2019:4045
- https://access.redhat.com/errata/RHSA-2019:4042
- https://access.redhat.com/errata/RHSA-2019:4040
- https://access.redhat.com/errata/RHSA-2019:4041
- https://access.redhat.com/errata/RHSA-2019:4352
- https://access.redhat.com/errata/RHSA-2020:0727
- https://usn.ubuntu.com/4308-1/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-41013.
|
CVE ID: CVE-2023-41013
Date Updated: 2024-09-26T14:29:11.209Z
Date Published: 2023-09-12T00:00:00
Description:
Cross Site Scripting (XSS) in Webmail Calendar in IceWarp 10.3.1 allows remote attackers to inject arbitrary web script or HTML via the "p4" field.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://icewrap.com
- https://medium.com/%40katikitala.sushmitha078/cve-2023-41013-789841dcad91
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-44756.
|
CVE ID: CVE-2022-44756
Date Updated: 2024-08-03T14:01:31.321Z
Date Published: 2022-12-19T21:17:57.664Z
Description:
Insights for Vulnerability Remediation (IVR) is vulnerable to improper input validation. This may lead to information disclosure. This requires privileged access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0102168
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-34825.
|
CVE ID: CVE-2022-34825
Date Updated: 2024-08-03T09:22:10.692Z
Date Published: 2022-11-08T00:00:00
Description:
Uncontrolled Search Path Element in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://jpn.nec.com/security-info/secinfo/nv22-014_en.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-48794.
|
CVE ID: CVE-2022-48794
Date Updated: 2024-09-11T17:34:15.221Z
Date Published: 2024-07-16T11:43:49.434Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
net: ieee802154: at86rf230: Stop leaking skb's
Upon error the ieee802154_xmit_complete() helper is not called. Only
ieee802154_wake_queue() is called manually. In the Tx case we then leak
the skb structure.
Free the skb structure upon error before returning when appropriate.
As the 'is_tx = 0' cannot be moved in the complete handler because of a
possible race between the delay in switching to STATE_RX_AACK_ON and a
new interrupt, we introduce an intermediate 'was_tx' boolean just for
this purpose.
There is no Fixes tag applying here, many changes have been made on this
area and the issue kind of always existed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/d2a1eaf51b7d4412319adb6acef114ba472d1692
- https://git.kernel.org/stable/c/af649e5c95f56df64363bc46f6746b87819f9c0d
- https://git.kernel.org/stable/c/6312f6a53fd3ea38125dcaca5e3c9aa7d8a60cf7
- https://git.kernel.org/stable/c/455ef08d6e5473526fa6763f75a93f7198206966
- https://git.kernel.org/stable/c/0fd484644c68897c490a3307bfcc8bf767df5a43
- https://git.kernel.org/stable/c/23b2a25382400168427ea278f3d8bf4ecfd333bf
- https://git.kernel.org/stable/c/1c72f04d52b7200bb83426a9bed378668271ea4a
- https://git.kernel.org/stable/c/e5ce576d45bf72fd0e3dc37eff897bfcc488f6a9
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-5365.
|
CVE ID: CVE-2012-5365
Date Updated: 2024-08-06T21:05:46.737Z
Date Published: 2020-02-20T14:20:16
Description:
The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2012/10/10/12
- https://www.securityfocus.com/bid/56170/info
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-25041.
|
CVE ID: CVE-2023-25041
Date Updated: 2024-08-02T11:11:43.531Z
Date Published: 2023-04-07T11:17:04.191Z
Description:
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Cththemes Monolit theme <= 2.0.6 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/monolit/wordpress-monolit-theme-theme-2-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-28555.
|
CVE ID: CVE-2023-28555
Date Updated: 2024-08-02T13:43:22.842Z
Date Published: 2023-08-08T09:15:02.599Z
Description:
Transient DOS in Audio while remapping channel buffer in media codec decoding.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-52915.
|
CVE ID: CVE-2023-52915
Date Updated: 2024-09-10T14:09:11.116Z
Date Published: 2024-09-06T09:07:49.695Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer
In af9035_i2c_master_xfer, msg is controlled by user. When msg[i].buf
is null and msg[i].len is zero, former checks on msg[i].buf would be
passed. Malicious data finally reach af9035_i2c_master_xfer. If accessing
msg[i].buf[0] without sanity check, null ptr deref would happen.
We add check on msg[i].len to prevent crash.
Similar commit:
commit 0ed554fd769a
("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/b2f54ed7739dfdf42c4df0a11131aad7c8635464
- https://git.kernel.org/stable/c/fa58d9db5cad4bb7bb694b6837e3b96d87554f2b
- https://git.kernel.org/stable/c/b49c6e5dd236787f13a062ec528d724169f11152
- https://git.kernel.org/stable/c/6c01ef65de0b321b2db1ef9abf8f1d15862b937e
- https://git.kernel.org/stable/c/d9ef84a7c222497ecb5fdf93361c76931804825e
- https://git.kernel.org/stable/c/0143f282b15f7cedc0392ea10050fb6000fd16e6
- https://git.kernel.org/stable/c/41b7181a40af84448a2b144fb02d8bf32b7e9a23
- https://git.kernel.org/stable/c/7bf744f2de0a848fb1d717f5831b03db96feae89
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-4690.
|
CVE ID: CVE-2012-4690
Date Updated: 2024-08-06T20:42:54.997Z
Date Published: 2012-12-08T15:00:00
Description:
Rockwell Automation Allen-Bradley MicroLogix controller 1100, 1200, 1400, and 1500; SLC 500 controller platform; and PLC-5 controller platform, when Static status is not enabled, allow remote attackers to cause a denial of service via messages that trigger modification of status bits.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://ics-cert.us-cert.gov/advisories/ICSA-12-342-01A
- https://rockwellautomation.custhelp.com/app/answers/detail/a_id/511407
- http://www.us-cert.gov/control_systems/pdf/ICSA-12-342-01.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.