instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2022-29280.
CVE ID: CVE-2022-29280 Date Updated: 2022-04-21T21:34:35 Date Published: 2022-04-21T21:34:35 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7331.
CVE ID: CVE-2019-7331 Date Updated: 2024-09-17T01:35:54.481Z Date Published: 2019-02-04T19:00:00Z Description: Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3 while editing an existing monitor field named "signal check color" (monitor.php). There exists no input validation or output filtration, leaving it vulnerable to HTML Injection and an XSS attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ZoneMinder/zoneminder/issues/2451 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6023.
CVE ID: CVE-2008-6023 Date Updated: 2024-08-07T11:13:14.001Z Date Published: 2009-02-02T21:29:00 Description: PHP remote file inclusion vulnerability in includes/todofleetcontrol.php in a newer version of Xnova, possibly 0.8 sp1, allows remote attackers to execute arbitrary PHP code via a URL in the xnova_root_path parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/48533 - http://www.vupen.com/english/advisories/2008/2412 - https://www.exploit-db.com/exploits/6254 - http://www.securityfocus.com/bid/30715 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-9285.
CVE ID: CVE-2017-9285 Date Updated: 2024-09-17T00:25:58.378Z Date Published: 2018-03-02T20:00:00Z Description: NetIQ eDirectory before 9.0 SP4 did not enforce login restrictions when "ebaclient" was used, allowing unpermitted access to eDirectory services. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.novell.com/support/kb/doc.php?id=7016794 - https://bugzilla.suse.com/show_bug.cgi?id=1029077 - https://www.netiq.com/documentation/edirectory-9/edirectory904_releasenotes/data/edirectory904_releasenotes.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4900.
CVE ID: CVE-2011-4900 Date Updated: 2024-08-07T00:16:35.165Z Date Published: 2019-11-06T16:46:02 Description: TYPO3 before 4.5.4 allows Information Disclosure in the backend. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security-tracker.debian.org/tracker/CVE-2011-4900 - https://typo3.org/security/advisory/typo3-core-sa-2011-001/#Information_Disclosure No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11146.
CVE ID: CVE-2020-11146 Date Updated: 2024-08-04T11:28:12.494Z Date Published: 2021-01-21T09:41:15 Description: Out of bound write while copying data using IOCTL due to lack of check of array index received from user in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27249.
CVE ID: CVE-2023-27249 Date Updated: 2024-08-02T12:01:32.533Z Date Published: 2023-03-23T00:00:00 Description: swfdump v0.9.2 was discovered to contain a heap buffer overflow in the function swf_GetPlaceObject at swfobject.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://swfdump.com - https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc - https://github.com/matthiaskramm/swftools - https://github.com/matthiaskramm/swftools/issues/197 - https://github.com/keepinggg/poc/tree/main/poc_of_swfdump No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7485.
CVE ID: CVE-2020-7485 Date Updated: 2024-08-04T09:33:19.254Z Date Published: 2020-04-15T21:03:31 Description: **VERSION NOT SUPPORTED WHEN ASSIGNED** A legacy support account in the TriStation software version v4.9.0 and earlier could cause improper access to the TriStation host machine. This was addressed in TriStation version v4.9.1 and v4.10.1 released on May 30, 2013.1 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.se.com/ww/en/download/document/SESB-2020-105-01 - https://us-cert.cisa.gov/ics/advisories/icsa-20-205-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0600.
CVE ID: CVE-2018-0600 Date Updated: 2024-08-05T03:28:11.195Z Date Published: 2018-06-26T14:00:00 Description: Untrusted search path vulnerability in the installer of PlayMemories Home for Windows ver.5.5.01 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.d-imaging.sony.co.jp/www/disoft/int/download/playmemories-home/win/ja/index.html - http://jvn.jp/en/jp/JVN13940333/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6818.
CVE ID: CVE-2016-6818 Date Updated: 2024-08-06T01:43:38.156Z Date Published: 2017-04-13T19:00:00 Description: SQL injection vulnerability in SAP Business Intelligence platform before January 2017 allows remote attackers to obtain sensitive information, modify data, cause a denial of service (data deletion), or launch administrative operations or possibly OS commands via a crafted SQL query. The vendor response is SAP Security Note 2361633. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/97661 - https://erpscan.io/press-center/blog/sap-cyber-threat-intelligence-report-january-2017/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0078.
CVE ID: CVE-2009-0078 Date Updated: 2024-08-07T04:24:17.452Z Date Published: 2009-04-15T03:49:00 Description: The Windows Management Instrumentation (WMI) provider in Microsoft Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly implement isolation among a set of distinct processes that (1) all run under the NetworkService account or (2) all run under the LocalService account, which allows local users to gain privileges by accessing the resources of one of the processes, aka "Windows WMI Service Isolation Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6193 - http://osvdb.org/53666 - http://www.securitytracker.com/id?1022044 - http://www.us-cert.gov/cas/techalerts/TA09-104A.html - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-012 - http://www.vupen.com/english/advisories/2009/1026 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-5075.
CVE ID: CVE-2010-5075 Date Updated: 2024-08-07T04:09:38.901Z Date Published: 2014-12-28T01:00:00 Description: Integer overflow in aswFW.sys 5.0.594.0 in Avast! Internet Security 5.0 Korean Trial allows local users to cause a denial of service (memory corruption and panic) via a crafted IOCTL_ASWFW_COMM_PIDINFO_RESULTS DeviceIoControl request to \\.\aswFW. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/42148 - https://web.archive.org/web/20120228033302/http://www.x90c.org/advisories/avast_internet_security_5.0_memory_corruption_advisory.txt - http://x90c.blogspot.com/2011/11/avast-internet-security-aswfwsys-ioctl.html - http://x90c.blogspot.com/2011/12/bid-42148-my-avast-kernel-driver-0day_01.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3578.
CVE ID: CVE-2020-3578 Date Updated: 2024-09-16T23:21:07.193Z Date Published: 2020-10-21T18:40:32.095597Z Description: A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access rule and access parts of the WebVPN portal that are supposed to be blocked. The vulnerability is due to insufficient validation of URLs when portal access rules are configured. An attacker could exploit this vulnerability by accessing certain URLs on the affected device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-rule-bypass-P73ABNWQ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0567.
CVE ID: CVE-2008-0567 Date Updated: 2024-08-07T07:46:55.141Z Date Published: 2008-02-05T01:00:00 Description: Multiple PHP remote file inclusion vulnerabilities in ChronoEngine ChronoForms (com_chronocontact) 2.3.5 component for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) PPS/File.php, (2) Writer.php, and (3) PPS.php in excelwriter/; and (4) BIFFwriter.php, (5) Workbook.php, (6) Worksheet.php, and (7) Format.php in excelwriter/Writer/. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/5020 - http://www.securityfocus.com/bid/27531 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4186.
CVE ID: CVE-2015-4186 Date Updated: 2024-08-06T06:04:03.203Z Date Published: 2015-06-17T10:00:00 Description: The diagnostics subsystem in the administrative web interface on Cisco Virtualization Experience (aka VXC) Client 6215 devices with firmware 11.2(27.4) allows local users to gain privileges for OS command execution via a crafted option value, aka Bug ID CSCug54412. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/75195 - http://www.securitytracker.com/id/1032583 - http://tools.cisco.com/security/center/viewAlert.x?alertId=39347 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2692.
CVE ID: CVE-2018-2692 Date Updated: 2024-10-03T20:32:07.859Z Date Published: 2018-01-18T02:00:00 Description: Vulnerability in the Oracle Financial Services Asset Liability Management component of Oracle Financial Services Applications (subcomponent: User Interface). Supported versions that are affected are 6.1.x and 8.0.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Asset Liability Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Financial Services Asset Liability Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Asset Liability Management accessible data as well as unauthorized read access to a subset of Oracle Financial Services Asset Liability Management accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - http://www.securitytracker.com/id/1040214 - http://www.securityfocus.com/bid/102621 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-29157.
CVE ID: CVE-2020-29157 Date Updated: 2024-08-04T16:48:01.632Z Date Published: 2021-07-14T19:59:14 Description: An issue in RAONWIZ K Editor v2018.0.0.10 allows attackers to perform a DLL hijacking attack when the service or system is restarted. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/blackcon/ae155656d21a2228aa25fdcb79c85159 - https://docs.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-search-order No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19996.
CVE ID: CVE-2019-19996 Date Updated: 2024-08-05T02:32:10.227Z Date Published: 2019-12-26T17:34:12 Description: An issue was discovered on Intelbras IWR 3000N 1.8.7 devices. A malformed login request allows remote attackers to cause a denial of service (reboot), as demonstrated by JSON misparsing of the \""} string to v1/system/login. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://medium.com/%40rsantos_14778/dos-cve-2019-19996-5ad1be772179 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11267.
CVE ID: CVE-2019-11267 Date Updated: 2020-02-03T15:00:29 Date Published: 2020-02-03T15:00:29 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-125067.
CVE ID: CVE-2014-125067 Date Updated: 2024-08-06T14:10:56.639Z Date Published: 2023-01-08T09:09:51.287Z Description: A vulnerability classified as critical was found in corincerami curiosity. Affected by this vulnerability is an unknown functionality of the file app/controllers/image_controller.rb. The manipulation of the argument sol leads to sql injection. The patch is named d64fddd74ca72714e73f4efe24259ca05c8190eb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217639. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.217639 - https://vuldb.com/?ctiid.217639 - https://github.com/corincerami/curiosity/commit/d64fddd74ca72714e73f4efe24259ca05c8190eb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8889.
CVE ID: CVE-2020-8889 Date Updated: 2024-08-04T10:12:10.977Z Date Published: 2023-03-28T00:00:00 Description: The ShipStation.com plugin 1.0 for CS-Cart allows remote attackers to obtain sensitive information (via action=export) because a typo results in a successful comparison of a blank password and NULL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jerdiggity.com/node/869 - https://www.jerdiggity.com/node/871 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24882.
CVE ID: CVE-2024-24882 Date Updated: 2024-08-01T23:28:12.959Z Date Published: 2024-05-17T08:48:42.875Z Description: Improper Privilege Management vulnerability in Masteriyo LMS allows Privilege Escalation.This issue affects LMS: from n/a through 1.7.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/learning-management-system/wordpress-lms-by-masteriyo-plugin-1-7-2-privilege-escalation-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3630.
CVE ID: CVE-2016-3630 Date Updated: 2024-08-06T00:03:34.408Z Date Published: 2016-04-13T16:00:00 Description: The binary delta decoder in Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a (1) clone, (2) push, or (3) pull command, related to (a) a list sizing rounding error and (b) short records. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181505.html - https://security.gentoo.org/glsa/201612-19 - http://www.debian.org/security/2016/dsa-3542 - https://selenic.com/repo/hg-stable/rev/b9714d958e89 - https://selenic.com/repo/hg-stable/rev/b6ed2505d6cf - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00018.html - https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_3.7.3_.282016-3-29.29 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00017.html - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00016.html - http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181542.html - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00043.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13406.
CVE ID: CVE-2018-13406 Date Updated: 2024-08-05T09:00:35.177Z Date Published: 2018-07-06T14:00:00 Description: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://usn.ubuntu.com/3752-2/ - https://usn.ubuntu.com/3752-3/ - https://usn.ubuntu.com/3753-2/ - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.17.4 - https://usn.ubuntu.com/3754-1/ - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9f645bcc566a1e9f921bdae7528a01ced5bc3713 - https://github.com/torvalds/linux/commit/9f645bcc566a1e9f921bdae7528a01ced5bc3713 - http://www.securitytracker.com/id/1041355 - https://usn.ubuntu.com/3752-1/ - https://usn.ubuntu.com/3753-1/ - http://www.securityfocus.com/bid/104685 - https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19620.
CVE ID: CVE-2019-19620 Date Updated: 2024-08-05T02:25:12.388Z Date Published: 2019-12-06T15:59:14 Description: In SecureWorks Red Cloak Windows Agent before 2.0.7.9, a local user can bypass the generation of telemetry alerts by removing NT AUTHORITY\SYSTEM permissions from a file. This is limited in scope to the collection of process-execution telemetry, for executions against specific files where the SYSTEM user was denied access to the source file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.secureworks.com/resources/ds-aetd-red-cloak-data-sheet - https://medium.com/%40CowbellSteve/secureworks-red-cloak-local-bypass-bfaed2be407e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-25765.
CVE ID: CVE-2021-25765 Date Updated: 2024-08-03T20:11:28.083Z Date Published: 2021-02-03T15:26:18 Description: In JetBrains YouTrack before 2020.4.4701, CSRF via attachment upload was possible. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.jetbrains.com - https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1881.
CVE ID: CVE-2022-1881 Date Updated: 2024-08-03T00:17:00.929Z Date Published: 2022-07-15T07:40:10 Description: In affected versions of Octopus Server an Insecure Direct Object Reference vulnerability exists where it is possible for a user to download Project Exports from a Project they do not have permissions to access. This vulnerability only impacts projects within the same Space. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://advisories.octopus.com/post/2022/sa2022-06/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7012.
CVE ID: CVE-2020-7012 Date Updated: 2024-08-04T09:18:03.021Z Date Published: 2020-06-03T17:55:43 Description: Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype pollution flaw in the Upgrade Assistant. An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.elastic.co/community/security/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0889.
CVE ID: CVE-2017-0889 Date Updated: 2024-09-16T19:21:11.237Z Date Published: 2017-11-13T17:00:00Z Description: Paperclip ruby gem version 3.1.4 and later suffers from a Server-SIde Request Forgery (SSRF) vulnerability in the Paperclip::UriAdapter class. Attackers may be able to access information about internal network resources. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/209430 - https://github.com/thoughtbot/paperclip/pull/2435 - https://hackerone.com/reports/713 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40486.
CVE ID: CVE-2023-40486 Date Updated: 2024-08-02T18:31:53.893Z Date Published: 2024-05-03T02:11:19.568Z Description: Maxon Cinema 4D SKP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Maxon Cinema 4D. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21434. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-1186/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4386.
CVE ID: CVE-2024-4386 Date Updated: 2024-08-01T20:40:47.218Z Date Published: 2024-05-09T20:03:23.835Z Description: The Gallery Block (Meow Gallery) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data_atts’ parameter in versions up to, and including, 5.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/477b41a5-b2ff-4b94-9622-824146a0e2ed?source=cve - https://plugins.trac.wordpress.org/browser/meow-gallery/trunk/classes/core.php#L273 - https://plugins.trac.wordpress.org/changeset/3082976/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-46866.
CVE ID: CVE-2024-46866 Date Updated: 2024-09-29T13:41:44.644Z Date Published: 2024-09-27T12:42:54.381Z Description: In the Linux kernel, the following vulnerability has been resolved: drm/xe/client: add missing bo locking in show_meminfo() bo_meminfo() wants to inspect bo state like tt and the ttm resource, however this state can change at any point leading to stuff like NPD and UAF, if the bo lock is not held. Grab the bo lock when calling bo_meminfo(), ensuring we drop any spinlocks first. In the case of object_idr we now also need to hold a ref. v2 (MattB) - Also add xe_bo_assert_held() (cherry picked from commit 4f63d712fa104c3ebefcb289d1e733e86d8698c7) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/abc8feacacf8fae10eecf6fea7865e8c1fee419c - https://git.kernel.org/stable/c/94c4aa266111262c96c98f822d1bccc494786fee No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11251.
CVE ID: CVE-2020-11251 Date Updated: 2024-08-04T11:28:13.800Z Date Published: 2021-04-07T07:55:34 Description: Out-of-bounds read vulnerability while accessing DTMF payload due to lack of check of buffer length before copying in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1189
The MITRE ATT&CK technique T1189: Drive-by Compromise is related to the vulnerability CVE-CVE-2010-1885. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2022-21696.
CVE ID: CVE-2022-21696 Date Updated: 2024-08-03T02:53:34.799Z Date Published: 2022-01-18T19:55:10 Description: OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions it is possible to change the username to that of another chat participant with an additional space character at the end of the name string. An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/onionshare/onionshare/security/advisories/GHSA-68vr-8f46-vc9f - https://github.com/onionshare/onionshare/releases/tag/v2.5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6303.
CVE ID: CVE-2013-6303 Date Updated: 2024-08-06T17:38:59.950Z Date Published: 2014-03-05T11:00:00 Description: Directory traversal vulnerability in IBM Algo One, as used in MetaData Management Tools in UDS 4.7.0 through 5.0.0, ACSWeb in Algo Security Access Control Management 4.7.0 through 4.9.0, and ACSWeb in AlgoWebApps 5.0.0, allows remote authenticated users to read arbitrary files via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/88534 - http://www-01.ibm.com/support/docview.wss?uid=swg21666110 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-22722.
CVE ID: CVE-2023-22722 Date Updated: 2024-08-02T10:13:50.232Z Date Published: 2023-01-25T05:58:01.087Z Description: GLPI is a Free Asset and IT Management Software package. Versions 9.4.0 and above, prior to 10.0.6 are subject to Cross-site Scripting. An attacker can persuade a victim into opening a URL containing a payload exploiting this vulnerability. After exploited, the attacker can make actions as the victim or exfiltrate session cookies. This issue is patched in version 10.0.6. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/glpi-project/glpi/security/advisories/GHSA-352j-wr38-493c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3220.
CVE ID: CVE-2018-3220 Date Updated: 2024-10-02T19:34:53.126Z Date Published: 2018-10-17T01:00:00 Description: Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/105603 - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1203
The MITRE ATT&CK technique T1203: Exploitation for Client Execution is related to the vulnerability CVE-CVE-2014-0593. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2015-10004.
CVE ID: CVE-2015-10004 Date Updated: 2024-08-06T08:58:24.640Z Date Published: 2022-12-27T21:13:11.967Z Description: Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654 - https://github.com/robbert229/jwt/issues/12 - https://pkg.go.dev/vuln/GO-2020-0023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3649.
CVE ID: CVE-2009-3649 Date Updated: 2024-08-07T06:38:30.058Z Date Published: 2009-10-09T14:18:00 Description: Cross-site scripting (XSS) vulnerability in forums/index.php in Power Bulletin Board (PBBoard) 2.0.2 and possibly earlier allows remote attackers to inject arbitrary web script or HTML via the id parameter in a new_topic action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.sec-area.com/?p=141%23more-141&gtlang=en - http://www.securityfocus.com/archive/1/506992/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12910.
CVE ID: CVE-2020-12910 Date Updated: 2021-06-11T21:41:19 Date Published: 2021-06-11T21:41:19 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17827.
CVE ID: CVE-2017-17827 Date Updated: 2024-08-05T20:59:17.924Z Date Published: 2017-12-21T04:00:00 Description: Piwigo 2.9.2 is vulnerable to Cross-Site Request Forgery via /admin.php?page=configuration&section=main or /admin.php?page=batch_manager&mode=unit. An attacker can exploit this to coerce an admin user into performing unintended actions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Piwigo/Piwigo/issues/822 - https://github.com/Piwigo/Piwigo/commit/c3b4c6f7f0ddeaea492080fb8211d7b4cfedaf6f - https://github.com/sahildhar/sahildhar.github.io/blob/master/research/reports/Piwigo_2.9.2/Cross%20Site%20Request%20Forgery%20in%20Piwigo%202.9.2.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11685.
CVE ID: CVE-2017-11685 Date Updated: 2024-08-05T18:19:37.662Z Date Published: 2017-07-27T06:00:00 Description: Multiple Reflective cross-site scripting (XSS) vulnerabilities in search and display of event data in Zoho ManageEngine Event Log Analyzer 11.4 and 11.5 allow remote attackers to inject arbitrary web script or HTML, as demonstrated by the fName parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://init6.me/exploiting-manageengine-eventlog-analyzer.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4926.
CVE ID: CVE-2011-4926 Date Updated: 2024-08-07T00:23:38.643Z Date Published: 2012-08-29T01:00:00 Description: Cross-site scripting (XSS) vulnerability in adminimize/adminimize_page.php in the Adminimize plugin before 1.7.22 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2012/01/10/9 - http://wordpress.org/extend/plugins/adminimize/changelog/ - http://www.osvdb.org/77472 - http://www.openwall.com/lists/oss-security/2012/01/05/10 - http://www.securityfocus.com/archive/1/520591/100/0/threaded - http://plugins.trac.wordpress.org/changeset?reponame=&new=467338%40adminimize&old=466900%40adminimize#file5 - http://www.securityfocus.com/bid/50745 - http://www.securityfocus.com/archive/1/520591 - https://exchange.xforce.ibmcloud.com/vulnerabilities/71414 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15601.
CVE ID: CVE-2019-15601 Date Updated: 2020-04-16T19:09:37 Date Published: 2020-01-06T16:32:53 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1108.
CVE ID: CVE-2023-1108 Date Updated: 2024-08-02T05:32:46.370Z Date Published: 2023-09-14T14:48:58.869Z Description: A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2023:1184 - https://access.redhat.com/errata/RHSA-2023:1185 - https://access.redhat.com/errata/RHSA-2023:1512 - https://access.redhat.com/errata/RHSA-2023:1513 - https://access.redhat.com/errata/RHSA-2023:1514 - https://access.redhat.com/errata/RHSA-2023:1516 - https://access.redhat.com/errata/RHSA-2023:2135 - https://access.redhat.com/errata/RHSA-2023:3883 - https://access.redhat.com/errata/RHSA-2023:3884 - https://access.redhat.com/errata/RHSA-2023:3885 - https://access.redhat.com/errata/RHSA-2023:3888 - https://access.redhat.com/errata/RHSA-2023:3892 - https://access.redhat.com/errata/RHSA-2023:3954 - https://access.redhat.com/errata/RHSA-2023:4612 - https://access.redhat.com/security/cve/CVE-2023-1108 - https://bugzilla.redhat.com/show_bug.cgi?id=2174246 - https://github.com/advisories/GHSA-m4mm-pg93-fv78 - https://security.netapp.com/advisory/ntap-20231020-0002/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14002.
CVE ID: CVE-2018-14002 Date Updated: 2024-08-05T09:21:40.883Z Date Published: 2018-07-12T15:00:00 Description: An integer overflow vulnerability exists in the function distribute of MP3 Coin (MP3), an Ethereum token smart contract. An attacker could use it to set any user's balance. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/VenusADLab/EtherTokens/blob/master/SHARKTECH/SHARKTECH.md - https://github.com/VenusADLab/EtherTokens/tree/master/MP3%20Coin%28MP3%29 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33742.
CVE ID: CVE-2022-33742 Date Updated: 2024-08-03T08:09:22.683Z Date Published: 2022-07-05T12:50:39 Description: Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://xenbits.xenproject.org/xsa/advisory-403.txt - http://xenbits.xen.org/xsa/advisory-403.html - http://www.openwall.com/lists/oss-security/2022/07/05/6 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGFTRZ66KQYTSYIRT5FRHF5D6O72NWOP/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/ - https://www.debian.org/security/2022/dsa-5191 - https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0426.
CVE ID: CVE-2010-0426 Date Updated: 2024-08-07T00:45:12.329Z Date Published: 2010-02-24T18:00:00 Description: sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/38803 - ftp://ftp.sudo.ws/pub/sudo/sudo-1.6.9p21.patch.gz - http://sudo.ws/repos/sudo/rev/88f3181692fe - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7238 - http://www.gentoo.org/security/en/glsa/glsa-201003-01.xml - http://www.mandriva.com/security/advisories?name=MDVSA-2010:049 - http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040578.html - http://secunia.com/advisories/38762 - http://www.debian.org/security/2010/dsa-2006 - http://secunia.com/advisories/39399 - http://www.securityfocus.com/bid/38362 - http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040588.html - http://www.securityfocus.com/archive/1/514489/100/0/threaded - http://www.ubuntu.com/usn/USN-905-1 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10814 - http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html - http://www.vupen.com/english/advisories/2010/0949 - http://sudo.ws/bugs/show_bug.cgi?id=389 - http://wiki.rpath.com/Advisories:rPSA-2010-0075 - http://www.vupen.com/english/advisories/2010/0450 - http://www.sudo.ws/sudo/stable.html - http://secunia.com/advisories/38659 - http://secunia.com/advisories/38795 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570737 - http://www.linuxquestions.org/questions/linux-security-4/the-use-of-sudoedit-command-question-785442/ - http://secunia.com/advisories/38915 - http://sudo.ws/repos/sudo/rev/f86e1b56d074 - http://securitytracker.com/id?1023658 - http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.577019 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2550.
CVE ID: CVE-2016-2550 Date Updated: 2024-08-05T23:32:20.927Z Date Published: 2016-04-27T17:00:00 Description: The Linux kernel before 4.5 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by leveraging incorrect tracking of descriptor ownership and sending each descriptor over a UNIX socket before closing it. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-4312. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1311517 - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - http://www.ubuntu.com/usn/USN-2949-1 - http://www.openwall.com/lists/oss-security/2016/02/23/2 - http://www.debian.org/security/2016/dsa-3503 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=415e3d3e90ce9e18727e8843ae343eda5a58fad6 - http://www.ubuntu.com/usn/USN-2947-3 - http://www.ubuntu.com/usn/USN-2947-2 - http://www.ubuntu.com/usn/USN-2947-1 - http://www.ubuntu.com/usn/USN-2946-2 - http://www.ubuntu.com/usn/USN-2948-1 - http://www.ubuntu.com/usn/USN-2946-1 - http://www.ubuntu.com/usn/USN-2948-2 - https://github.com/torvalds/linux/commit/415e3d3e90ce9e18727e8843ae343eda5a58fad6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15415.
CVE ID: CVE-2018-15415 Date Updated: 2024-09-16T19:37:08.827Z Date Published: 2018-10-05T14:00:00Z Description: A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerability exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file via a link or an email attachment and persuading the user to open the file by using the affected software. A successful exploit could allow the attacker to execute arbitrary code on the affected system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1041795 - http://www.securityfocus.com/bid/105520 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-webex-rce No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1232.
CVE ID: CVE-2013-1232 Date Updated: 2024-08-06T14:57:04.270Z Date Published: 2013-05-04T01:00:00 Description: The HTTP implementation in Cisco WebEx Node for MCS, WebEx Meetings Server, and WebEx Node for ASR 1000 Series allows remote attackers to read the contents of uninitialized memory locations via a crafted request, aka Bug IDs CSCue36672, CSCue31363, CSCuf17466, and CSCug61252. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1232 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-0712.
CVE ID: CVE-2022-0712 Date Updated: 2024-08-02T23:40:03.461Z Date Published: 2022-02-22T17:52:48 Description: NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466 - https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-9812.
CVE ID: CVE-2017-9812 Date Updated: 2024-08-05T17:18:02.195Z Date Published: 2017-07-17T21:00:00 Description: The reportId parameter of the getReportStatus action method can be abused in the web interface in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312) to read arbitrary files with kluser privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2017/Jun/33 - http://packetstormsecurity.com/files/143190/Kaspersky-Anti-Virus-File-Server-8.0.3.297-XSS-CSRF-Code-Execution.html - http://www.securityfocus.com/bid/99330 - http://www.securitytracker.com/id/1038798 - https://www.exploit-db.com/exploits/42269/ - https://www.coresecurity.com/advisories/kaspersky-anti-virus-file-server-multiple-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2855.
CVE ID: CVE-2023-2855 Date Updated: 2024-08-02T06:33:05.827Z Date Published: 2023-05-26T00:00:00 Description: Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wireshark.org/security/wnpa-sec-2023-12.html - https://gitlab.com/wireshark/wireshark/-/issues/19062 - https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json - https://www.debian.org/security/2023/dsa-5429 - https://security.gentoo.org/glsa/202309-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3992.
CVE ID: CVE-2020-3992 Date Updated: 2024-08-04T07:52:20.539Z Date Published: 2020-10-20T16:11:13 Description: OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vmware.com/security/advisories/VMSA-2020-0023.html - https://www.zerodayinitiative.com/advisories/ZDI-20-1377/ - https://www.zerodayinitiative.com/advisories/ZDI-20-1385/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7661.
CVE ID: CVE-2019-7661 Date Updated: 2024-08-04T20:54:28.214Z Date Published: 2019-03-07T22:00:00 Description: An issue was discovered in PHPMyWind 5.5. The method parameter of the data/api/oauth/connect.php page has a reflected Cross-site Scripting (XSS) vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/0xUhaw/CVE-Bins/tree/master/PHPMyWind/XSS-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-43901.
CVE ID: CVE-2024-43901 Date Updated: 2024-09-15T17:55:11.928Z Date Published: 2024-08-26T10:11:00.255Z Description: In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix NULL pointer dereference for DTN log in DCN401 When users run the command: cat /sys/kernel/debug/dri/0/amdgpu_dm_dtn_log The following NULL pointer dereference happens: [ +0.000003] BUG: kernel NULL pointer dereference, address: NULL [ +0.000005] #PF: supervisor instruction fetch in kernel mode [ +0.000002] #PF: error_code(0x0010) - not-present page [ +0.000002] PGD 0 P4D 0 [ +0.000004] Oops: 0010 [#1] PREEMPT SMP NOPTI [ +0.000003] RIP: 0010:0x0 [ +0.000008] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [...] [ +0.000002] PKRU: 55555554 [ +0.000002] Call Trace: [ +0.000002] <TASK> [ +0.000003] ? show_regs+0x65/0x70 [ +0.000006] ? __die+0x24/0x70 [ +0.000004] ? page_fault_oops+0x160/0x470 [ +0.000006] ? do_user_addr_fault+0x2b5/0x690 [ +0.000003] ? prb_read_valid+0x1c/0x30 [ +0.000005] ? exc_page_fault+0x8c/0x1a0 [ +0.000005] ? asm_exc_page_fault+0x27/0x30 [ +0.000012] dcn10_log_color_state+0xf9/0x510 [amdgpu] [ +0.000306] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000003] ? vsnprintf+0x2fb/0x600 [ +0.000009] dcn10_log_hw_state+0xfd0/0xfe0 [amdgpu] [ +0.000218] ? __mod_memcg_lruvec_state+0xe8/0x170 [ +0.000008] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? debug_smp_processor_id+0x17/0x20 [ +0.000003] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? set_ptes.isra.0+0x2b/0x90 [ +0.000004] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? _raw_spin_unlock+0x19/0x40 [ +0.000004] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000002] ? do_anonymous_page+0x337/0x700 [ +0.000004] dtn_log_read+0x82/0x120 [amdgpu] [ +0.000207] full_proxy_read+0x66/0x90 [ +0.000007] vfs_read+0xb0/0x340 [ +0.000005] ? __count_memcg_events+0x79/0xe0 [ +0.000002] ? srso_alias_return_thunk+0x5/0xfbef5 [ +0.000003] ? count_memcg_events.constprop.0+0x1e/0x40 [ +0.000003] ? handle_mm_fault+0xb2/0x370 [ +0.000003] ksys_read+0x6b/0xf0 [ +0.000004] __x64_sys_read+0x19/0x20 [ +0.000003] do_syscall_64+0x60/0x130 [ +0.000004] entry_SYSCALL_64_after_hwframe+0x6e/0x76 [ +0.000003] RIP: 0033:0x7fdf32f147e2 [...] This error happens when the color log tries to read the gamut remap information from DCN401 which is not initialized in the dcn401_dpp_funcs which leads to a null pointer dereference. This commit addresses this issue by adding a proper guard to access the gamut_remap callback in case the specific ASIC did not implement this function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/1e68b7ce6bc6073579fe8713ec6b85aa9cd2e351 - https://git.kernel.org/stable/c/5af757124792817f8eb1bd0c80ad60fab519586b No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3229.
CVE ID: CVE-2009-3229 Date Updated: 2024-08-07T06:22:23.535Z Date Published: 2009-09-17T10:00:00 Description: The core server component in PostgreSQL 8.4 before 8.4.1, 8.3 before 8.3.8, and 8.2 before 8.2.14 allows remote authenticated users to cause a denial of service (backend shutdown) by "re-LOAD-ing" libraries from a certain plugins directory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=522092 - https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00307.html - http://www.postgresql.org/docs/8.3/static/release-8-3-8.html - http://www.securityfocus.com/bid/36314 - http://marc.info/?l=bugtraq&m=134124585221119&w=2 - http://secunia.com/advisories/36837 - http://www.postgresql.org/support/security.html - http://secunia.com/advisories/36660 - http://www.securityfocus.com/archive/1/509917/100/0/threaded - http://secunia.com/advisories/36800 - http://www.us.debian.org/security/2009/dsa-1900 - https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00305.html - http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html - http://sunsolve.sun.com/search/document.do?assetkey=1-66-270408-1 - http://secunia.com/advisories/36727 - http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html - http://www.ubuntu.com/usn/usn-834-1 - http://marc.info/?l=bugtraq&m=134124585221119&w=2 - http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0012 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-20015.
CVE ID: CVE-2024-20015 Date Updated: 2024-08-01T21:52:31.653Z Date Published: 2024-02-05T05:59:38.166Z Description: In telephony, there is a possible escalation of privilege due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08441419; Issue ID: ALPS08441419. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/February-2024 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2545.
CVE ID: CVE-2012-2545 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15944.
CVE ID: CVE-2020-15944 Date Updated: 2024-08-04T13:30:23.341Z Date Published: 2020-08-04T19:02:54 Description: An issue was discovered in the Gantt-Chart module before 5.5.5 for Jira. Due to missing validation of user input, it is vulnerable to a persistent XSS attack. An attacker can embed the attack vectors in the dashboard of other users. To exploit this vulnerability, an attacker has to be authenticated. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://marketplace.atlassian.com/apps/28997/gantt-chart-for-jira?hosting=cloud&tab=overview - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-030.txt - http://seclists.org/fulldisclosure/2020/Aug/1 - http://packetstormsecurity.com/files/158752/Gantt-Chart-For-Jira-5.5.4-Cross-Site-Scripting.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0528.
CVE ID: CVE-2017-0528 Date Updated: 2024-08-05T13:11:06.314Z Date Published: 2017-03-08T01:00:00 Description: An elevation of privilege vulnerability in the kernel security subsystem could enable a local malicious application to to execute code in the context of a privileged process. This issue is rated as High because it is a general bypass for a kernel level defense in depth or exploit mitigation technology. Product: Android. Versions: Kernel-3.18. Android ID: A-33351919. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-03-01 - http://www.securitytracker.com/id/1037968 - http://www.securityfocus.com/bid/96807 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5546.
CVE ID: CVE-2016-5546 Date Updated: 2024-08-06T01:07:57.827Z Date Published: 2017-01-27T22:01:00 Description: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity impacts). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2017-0338.html - http://www.debian.org/security/2017/dsa-3782 - http://rhn.redhat.com/errata/RHSA-2017-0176.html - https://security.gentoo.org/glsa/201701-65 - http://rhn.redhat.com/errata/RHSA-2017-0180.html - http://www.securityfocus.com/bid/95506 - http://www.securitytracker.com/id/1037637 - https://security.gentoo.org/glsa/201707-01 - http://rhn.redhat.com/errata/RHSA-2017-0175.html - http://rhn.redhat.com/errata/RHSA-2017-0177.html - http://rhn.redhat.com/errata/RHSA-2017-0263.html - https://access.redhat.com/errata/RHSA-2017:1216 - https://security.netapp.com/advisory/ntap-20170119-0001/ - http://rhn.redhat.com/errata/RHSA-2017-0269.html - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html - http://rhn.redhat.com/errata/RHSA-2017-0337.html - http://rhn.redhat.com/errata/RHSA-2017-0336.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11269.
CVE ID: CVE-2019-11269 Date Updated: 2024-09-16T23:11:41.537Z Date Published: 2019-06-12T14:46:18.601170Z Description: Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujan2021.html - https://pivotal.io/security/cve-2019-11269 - http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21857.
CVE ID: CVE-2024-21857 Date Updated: 2024-08-14T18:05:35.128Z Date Published: 2024-08-14T13:45:37.158Z Description: Uncontrolled search path for some Intel(R) oneAPI Compiler software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01057.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40194.
CVE ID: CVE-2022-40194 Date Updated: 2024-09-17T03:02:13.927Z Date Published: 2022-09-23T15:05:35.492169Z Description: Unauthenticated Sensitive Information Disclosure vulnerability in Customer Reviews for WooCommerce plugin <= 5.3.5 at WordPress No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/customer-reviews-woocommerce/wordpress-customer-reviews-for-woocommerce-plugin-5-3-5-sensitive-information-disclosure-vulnerability/_s_id=cve - https://wordpress.org/plugins/customer-reviews-woocommerce/#developers No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18903.
CVE ID: CVE-2017-18903 Date Updated: 2024-08-05T21:37:44.304Z Date Published: 2020-06-19T18:44:09 Description: An issue was discovered in Mattermost Server before 4.0.0, 3.10.2, and 3.9.2. CSRF can occur if CORS is enabled. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mattermost.com/security-updates/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-20131.
CVE ID: CVE-2020-20131 Date Updated: 2024-08-04T14:15:28.819Z Date Published: 2021-09-29T21:29:02 Description: LaraCMS v1.0.1 contains a stored cross-site scripting (XSS) vulnerability which allows atackers to execute arbitrary web scripts or HTML via a crafted payload in the page management module. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/wanglelecc/laracms/issues/36 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7994.
CVE ID: CVE-2019-7994 Date Updated: 2024-08-04T21:02:19.420Z Date Published: 2019-08-26T18:51:10 Description: Adobe Photoshop CC versions 19.1.8 and earlier and 20.0.5 and earlier have an out of bound write vulnerability. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/photoshop/apsb19-44.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-7012.
CVE ID: CVE-2008-7012 Date Updated: 2024-08-07T11:49:02.486Z Date Published: 2009-08-19T10:00:00 Description: courier/1000@/api_error_email.html (aka "error reporting page") in Accellion File Transfer Appliance FTA_7_0_178, and possibly other versions before FTA_7_0_189, allows remote attackers to send spam e-mail via modified description and client_email parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/31178 - http://www.securitytracker.com/id?1020870 - http://osvdb.org/48242 - http://zebux.free.fr/pub/Advisory/Advisory_Accellion_SPAM_Engine_Vulnerability_200808.txt - http://secunia.com/advisories/31848 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45159 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-3956.
CVE ID: CVE-2019-3956 Date Updated: 2024-08-04T19:26:27.675Z Date Published: 2019-06-07T20:01:28 Description: Dameware Remote Mini Control version 12.1.0.34 and prior contains an unauthenticated remote buffer over-read due to the server not properly validating CltDHPubKeyLen during key negotiation, which could crash the application or leak sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2019-26 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6190.
CVE ID: CVE-2013-6190 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3199.
CVE ID: CVE-2024-3199 Date Updated: 2024-08-01T20:05:08.170Z Date Published: 2024-05-02T16:52:30.219Z Description: The The Plus Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the countdown widget in all versions up to, and including, 5.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/ab15fe2b-974c-41b0-ab6b-68322d2d3396?source=cve - https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.4.2/modules/widgets/tp_countdown.php#L1781 - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056776%40the-plus-addons-for-elementor-page-builder%2Ftags%2F5.4.2&new=3076733%40the-plus-addons-for-elementor-page-builder%2Ftags%2F5.5.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-44427.
CVE ID: CVE-2021-44427 Date Updated: 2024-08-04T04:25:16.300Z Date Published: 2021-11-29T21:34:16 Description: An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/francoisjacquet/rosariosis/-/issues/328 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5604.
CVE ID: CVE-2019-5604 Date Updated: 2024-08-04T20:01:52.138Z Date Published: 2019-07-26T00:24:10 Description: In FreeBSD 12.0-STABLE before r350246, 12.0-RELEASE before 12.0-RELEASE-p8, 11.3-STABLE before r350247, 11.3-RELEASE before 11.3-RELEASE-p1, and 11.2-RELEASE before 11.2-RELEASE-p12, the emulated XHCI device included with the bhyve hypervisor did not properly validate data provided by the guest, allowing an out-of-bounds read. This provides a malicious guest the possibility to crash the system or access system memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.FreeBSD.org/advisories/FreeBSD-SA-19:16.bhyve.asc - http://packetstormsecurity.com/files/153753/FreeBSD-Security-Advisory-FreeBSD-SA-19-16.bhyve.html - https://security.netapp.com/advisory/ntap-20190814-0003/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33148.
CVE ID: CVE-2022-33148 Date Updated: 2024-09-16T19:51:42.051Z Date Published: 2022-08-22T18:29:35.981786Z Description: A sql injection vulnerability exists in the ObjectYPT functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Live Schedules plugin, allowing an attacker to inject SQL by manipulating the title parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/WWBN/AVideo/blob/e04b1cd7062e16564157a82bae389eedd39fa088/updatedb/updateDb.v12.0.sql - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2235.
CVE ID: CVE-2010-2235 Date Updated: 2024-08-07T02:25:07.514Z Date Published: 2010-12-09T19:00:00Z Description: template_api.py in Cobbler before 2.0.7, as used in Red Hat Network Satellite Server and other products, does not disable the ability of the Cheetah template engine to execute Python statements contained in templates, which allows remote authenticated administrators to execute arbitrary code via a crafted kickstart template file, a different vulnerability than CVE-2008-6954. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=607662 - http://www.redhat.com/support/errata/RHSA-2010-0775.html - http://people.fedoraproject.org/~shenson/cobbler/cobbler-2.0.8.tar.gz No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5942.
CVE ID: CVE-2023-5942 Date Updated: 2024-08-02T08:14:25.224Z Date Published: 2023-11-27T16:22:05.089Z Description: The Medialist WordPress plugin before 1.4.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/914559e1-eed5-4a69-8371-a48055835453 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1434.
CVE ID: CVE-2012-1434 Date Updated: 2024-09-17T04:20:25.524Z Date Published: 2012-03-21T10:00:00Z Description: The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/522005 - http://www.ieee-security.org/TC/SP2012/program.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52196.
CVE ID: CVE-2023-52196 Date Updated: 2024-08-02T22:55:41.416Z Date Published: 2024-01-08T20:30:15.096Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Phil Ewels CPT Bootstrap Carousel allows Reflected XSS.This issue affects CPT Bootstrap Carousel: from n/a through 1.12. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/cpt-bootstrap-carousel/wordpress-cpt-bootstrap-carousel-plugin-1-12-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1000542.
CVE ID: CVE-2018-1000542 Date Updated: 2024-08-05T12:40:47.266Z Date Published: 2018-06-26T16:00:00 Description: netbeans-mmd-plugin version <= 1.4.3 contains a XML External Entity (XXE) vulnerability in MMD file import that can result in Possible information disclosure, server-side request forgery, or remote code execution. This attack appear to be exploitable via Specially crafted MMD file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/raydac/netbeans-mmd-plugin/issues/45 - https://0dd.zone/2018/06/02/Netbeans-MMD-Plugin-XXE/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-31312.
CVE ID: CVE-2024-31312 Date Updated: 2024-08-02T01:52:56.333Z Date Published: 2024-07-09T20:09:15.484Z Description: In multiple locations, there is a possible information leak due to a missing permission check. This could lead to local information disclosure exposing played media with no additional execution privileges needed. User interaction is not needed for exploitation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://android.googlesource.com/platform/frameworks/base/+/748055291460bcaafa3e53c7da1601a687959477 - https://source.android.com/security/bulletin/2024-06-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1697.
CVE ID: CVE-2009-1697 Date Updated: 2024-08-07T05:20:35.202Z Date Published: 2009-06-10T17:37:00 Description: CRLF injection vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject HTTP headers and bypass the Same Origin Policy via a crafted HTML document, related to cross-site scripting (XSS) attacks that depend on communication with arbitrary web sites on the same server through use of XMLHttpRequest without a Host header. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://securitytracker.com/id?1022344 - http://support.apple.com/kb/HT3639 - http://secunia.com/advisories/43068 - http://www.vupen.com/english/advisories/2009/1621 - http://www.vupen.com/english/advisories/2011/0212 - http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - http://www.securityfocus.com/bid/35260 - http://www.vupen.com/english/advisories/2009/1522 - http://secunia.com/advisories/37746 - http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - http://www.debian.org/security/2009/dsa-1950 - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - http://secunia.com/advisories/35379 - http://osvdb.org/54992 - http://support.apple.com/kb/HT3613 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-6664.
CVE ID: CVE-2020-6664 Date Updated: 2021-01-12T20:02:40 Date Published: 2021-01-12T20:02:40 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5977.
CVE ID: CVE-2013-5977 Date Updated: 2024-08-06T17:29:42.316Z Date Published: 2013-11-01T14:00:00 Description: Cross-site request forgery (CSRF) vulnerability in Cart66Product.php in the Cart66 Lite plugin before 1.5.1.15 for WordPress allows remote attackers to hijack the authentication of administrators for requests that (1) create or modify products or conduct cross-site scripting (XSS) attacks via the (2) Product name or (3) Price description field in a product save action via a request to wp-admin/admin.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://archives.neohapsis.com/archives/bugtraq/2013-10/0048.html - http://www.exploit-db.com/exploits/28959 - http://osvdb.org/98352 - http://seclists.org/bugtraq/2013/Oct/52 - https://exchange.xforce.ibmcloud.com/vulnerabilities/87874 - http://secunia.com/advisories/55265 - http://wordpress.org/plugins/cart66-lite/changelog/ - http://blog.noobroot.com/#%21/2013/10/0-day-wordpress-cart66-plugin-15114.html - http://www.securityfocus.com/bid/62975 - http://packetstormsecurity.com/files/123587/WordPress-Cart66-1.5.1.14-Cross-Site-Request-Forgery-Cross-Site-Scripting.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8647.
CVE ID: CVE-2020-8647 Date Updated: 2024-08-04T10:03:46.527Z Date Published: 2020-02-06T00:06:51 Description: There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.kernel.org/show_bug.cgi?id=206359 - http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html - https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html - https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html - https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html - https://www.debian.org/security/2020/dsa-4698 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16021.
CVE ID: CVE-2020-16021 Date Updated: 2024-08-04T13:30:23.505Z Date Published: 2021-01-08T17:51:29 Description: Race in image burner in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to perform OS-level privilege escalation via a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html - https://crbug.com/1139414 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1456.
CVE ID: CVE-2009-1456 Date Updated: 2024-08-07T05:13:25.648Z Date Published: 2009-04-28T16:00:00 Description: Directory traversal vulnerability in admin.php in Malleo 1.2.3 allows remote authenticated administrators to include and execute arbitrary local files via a .. (dot dot) in the module parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/502763/100/0/threaded - http://secunia.com/advisories/34766 - http://www.securityfocus.com/bid/34588 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-29189.
CVE ID: CVE-2020-29189 Date Updated: 2024-08-04T16:48:01.685Z Date Published: 2020-12-24T14:36:59 Description: Incorrect Access Control vulnerability in TerraMaster TOS <= 4.2.06 allows remote authenticated attackers to bypass read-only restriction and obtain full access to any folder within the NAS No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://terramaster.com - https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0937.
CVE ID: CVE-2009-0937 Date Updated: 2024-08-07T04:57:16.638Z Date Published: 2009-03-18T01:00:00 Description: Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/34583 - http://archives.seul.org/or/announce/Feb-2009/msg00000.html - http://secunia.com/advisories/33880 - http://www.securityfocus.com/bid/33713 - http://security.gentoo.org/glsa/glsa-200904-11.xml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1474.
CVE ID: CVE-2014-1474 Date Updated: 2024-08-06T09:42:35.491Z Date Published: 2014-07-15T14:00:00 Description: Algorithmic complexity vulnerability in Email::Address::List before 0.02, as used in RT 4.2.0 through 4.2.2, allows remote attackers to cause a denial of service (CPU consumption) via a string without an address. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.html - https://metacpan.org/changes/release/ALEXMV/Email-Address-List-0.02 - http://lists.bestpractical.com/pipermail/rt-announce/2014-June/000257.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4358.
CVE ID: CVE-2016-4358 Date Updated: 2024-08-06T00:25:14.512Z Date Published: 2016-06-08T14:00:00 Description: HPE Matrix Operating Environment before 7.5.1 allows remote attackers to obtain sensitive information or modify data via unspecified vectors, a different vulnerability than CVE-2016-2029. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52504.
CVE ID: CVE-2023-52504 Date Updated: 2024-08-02T23:03:20.409Z Date Published: 2024-03-02T21:52:18.500Z Description: In the Linux kernel, the following vulnerability has been resolved: x86/alternatives: Disable KASAN in apply_alternatives() Fei has reported that KASAN triggers during apply_alternatives() on a 5-level paging machine: BUG: KASAN: out-of-bounds in rcu_is_watching() Read of size 4 at addr ff110003ee6419a0 by task swapper/0/0 ... __asan_load4() rcu_is_watching() trace_hardirqs_on() text_poke_early() apply_alternatives() ... On machines with 5-level paging, cpu_feature_enabled(X86_FEATURE_LA57) gets patched. It includes KASAN code, where KASAN_SHADOW_START depends on __VIRTUAL_MASK_SHIFT, which is defined with cpu_feature_enabled(). KASAN gets confused when apply_alternatives() patches the KASAN_SHADOW_START users. A test patch that makes KASAN_SHADOW_START static, by replacing __VIRTUAL_MASK_SHIFT with 56, works around the issue. Fix it for real by disabling KASAN while the kernel is patching alternatives. [ mingo: updated the changelog ] No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/3719d3c36aa853d5a2401af9f8d6b116c91ad5ae - https://git.kernel.org/stable/c/3770c38cd6a60494da29ac2da73ff8156440a2d1 - https://git.kernel.org/stable/c/6788b10620ca6e98575d1e06e72a8974aad7657e - https://git.kernel.org/stable/c/ecba5afe86f30605eb9dfb7f265a8de0218d4cfc - https://git.kernel.org/stable/c/5b784489c8158518bf7a466bb3cc045b0fb66b4b - https://git.kernel.org/stable/c/cd287cc208dfe6bd6da98e7f88e723209242c9b4 - https://git.kernel.org/stable/c/d35652a5fc9944784f6f50a5c979518ff8dacf61 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34134.
CVE ID: CVE-2022-34134 Date Updated: 2024-08-03T08:16:17.090Z Date Published: 2022-06-27T23:09:50 Description: Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /application/controllers/Users.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/bbalet/jorani/issues/369 - https://github.com/bbalet/jorani/commit/299b5a3a66add4ac643e3ba78ada4d9637c8baff No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-29932.
CVE ID: CVE-2022-29932 Date Updated: 2024-08-03T06:33:43.116Z Date Published: 2022-05-11T13:49:53 Description: The HTTP Server in PRIMEUR SPAZIO 2.5.1.954 (File Transfer) allows an unauthenticated attacker to obtain sensitive data (related to the content of transferred files) via a crafted HTTP request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.primeur.com/managed-file-transfer - https://github.com/Off3nS3c/CVE-2022-29932/blob/main/Proof-of-Concept.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41387.
CVE ID: CVE-2023-41387 Date Updated: 2024-09-25T14:23:26.034Z Date Published: 2023-09-19T00:00:00 Description: A SQL injection in the flutter_downloader component through 1.11.1 for iOS allows remote attackers to steal session tokens and overwrite arbitrary files inside the app's container. The internal database of the framework is exposed to the local user if an app uses UIFileSharingEnabled and LSSupportsOpeningDocumentsInPlace properties. As a result, local users can obtain the same attack primitives as remote attackers by tampering with the internal database of the framework on the device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pub.dev/packages/flutter_downloader/changelog - https://seredynski.com/articles/exploiting-ios-apps-to-extract-session-tokens-and-overwrite-user-data No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-7220.
CVE ID: CVE-2023-7220 Date Updated: 2024-08-02T08:57:35.830Z Date Published: 2024-01-09T07:31:03.195Z Description: A vulnerability was found in Totolink NR1800X 9.1.0u.6279_B20210910 and classified as critical. Affected by this issue is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249854 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.249854 - https://vuldb.com/?ctiid.249854 - https://github.com/jylsec/vuldb/blob/main/TOTOLINK/NR1800X/1/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23272.
CVE ID: CVE-2024-23272 Date Updated: 2024-08-01T22:59:32.183Z Date Published: 2024-03-08T01:35:54.007Z Description: A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. A user may gain access to protected parts of the file system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT214083 - https://support.apple.com/en-us/HT214085 - https://support.apple.com/en-us/HT214084 - http://seclists.org/fulldisclosure/2024/Mar/21 - http://seclists.org/fulldisclosure/2024/Mar/22 - http://seclists.org/fulldisclosure/2024/Mar/23 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.