instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2024-23157.
CVE ID: CVE-2024-23157 Date Updated: 2024-08-01T22:59:31.791Z Date Published: 2024-06-25T03:30:58.799Z Description: A maliciously crafted SLDASM or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0010 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22257.
CVE ID: CVE-2022-22257 Date Updated: 2024-08-03T03:07:50.177Z Date Published: 2022-04-11T19:38:18 Description: The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2022/4/ - https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1557
The MITRE ATT&CK technique T1557: Man-in-the-Middle is related to the vulnerability CVE-CVE-2014-3566. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2021-31871.
CVE ID: CVE-2021-31871 Date Updated: 2024-08-03T23:10:30.764Z Date Published: 2021-04-30T05:18:52 Description: An issue was discovered in klibc before 2.0.9. An integer overflow in the cpio command may result in a NULL pointer dereference on 64-bit systems. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kernel.org/pub/linux/libs/klibc/2.0/ - https://lists.zytor.com/archives/klibc/2021-April/004593.html - https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=2e48a12ab1e30d43498c2d53e878a11a1b5102d5 - http://www.openwall.com/lists/oss-security/2021/04/30/1 - https://lists.debian.org/debian-lts-announce/2021/06/msg00025.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4602.
CVE ID: CVE-2018-4602 Date Updated: 2023-09-14T18:42:21.996Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-36299.
CVE ID: CVE-2023-36299 Date Updated: 2024-08-02T16:45:56.229Z Date Published: 2023-08-03T00:00:00 Description: A File Upload vulnerability in typecho v.1.2.1 allows a remote attacker to execute arbitrary code via the upload and options-general parameters in index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/typecho/typecho/releases/tag/v1.2.1 - https://github.com/MentalityXt/typecho-v1.2.1-RCE No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2972.
CVE ID: CVE-2023-2972 Date Updated: 2024-08-02T06:41:03.932Z Date Published: 2023-05-30T00:00:00 Description: Prototype Pollution in GitHub repository antfu/utils prior to 0.7.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/009f1cd9-401c-49a7-bd08-be35cff6faef - https://github.com/antfu/utils/commit/7f8b16c6181c988bdb96613fbb2533b345f68682 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17872.
CVE ID: CVE-2017-17872 Date Updated: 2024-08-05T21:06:49.248Z Date Published: 2017-12-24T00:00:00 Description: The JEXTN Video Gallery extension 3.0.5 for Joomla! has SQL Injection via the id parameter in a view=category action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/43330/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4372.
CVE ID: CVE-2024-4372 Date Updated: 2024-08-01T20:40:47.032Z Date Published: 2024-05-21T06:00:02.612Z Description: The Carousel Slider WordPress plugin before 2.2.11 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52515.
CVE ID: CVE-2023-52515 Date Updated: 2024-09-11T17:33:41.155Z Date Published: 2024-03-02T21:52:25.863Z Description: In the Linux kernel, the following vulnerability has been resolved: RDMA/srp: Do not call scsi_done() from srp_abort() After scmd_eh_abort_handler() has called the SCSI LLD eh_abort_handler callback, it performs one of the following actions: * Call scsi_queue_insert(). * Call scsi_finish_command(). * Call scsi_eh_scmd_add(). Hence, SCSI abort handlers must not call scsi_done(). Otherwise all the above actions would trigger a use-after-free. Hence remove the scsi_done() call from srp_abort(). Keep the srp_free_req() call before returning SUCCESS because we may not see the command again if SUCCESS is returned. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a - https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5 - https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206 - https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc - https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19592.
CVE ID: CVE-2019-19592 Date Updated: 2024-08-05T02:16:48.409Z Date Published: 2020-01-21T18:27:23 Description: Jama Connect 8.44.0 is vulnerable to stored Cross-Site Scripting No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sumukh30.blogspot.com/2020/01/normal-0-false-false-false-en-us-x-none.html?m=1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10947.
CVE ID: CVE-2019-10947 Date Updated: 2024-08-04T22:40:15.259Z Date Published: 2019-04-17T14:04:53 Description: Delta Industrial Automation CNCSoft, CNCSoft ScreenEditor Version 1.00.88 and prior. Multiple stack-based buffer overflow vulnerabilities may be exploited by processing specially crafted project files, allowing an attacker to remotely execute arbitrary code. This may occur because CNCSoft lacks user input validation before copying data from project files onto the stack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-19-106-01 - https://www.zerodayinitiative.com/advisories/ZDI-19-417/ - https://www.zerodayinitiative.com/advisories/ZDI-19-399/ - https://www.zerodayinitiative.com/advisories/ZDI-19-401/ - https://www.zerodayinitiative.com/advisories/ZDI-19-402/ - https://www.zerodayinitiative.com/advisories/ZDI-19-403/ - https://www.zerodayinitiative.com/advisories/ZDI-19-404/ - https://www.zerodayinitiative.com/advisories/ZDI-19-410/ - https://www.zerodayinitiative.com/advisories/ZDI-19-400/ - http://www.securityfocus.com/bid/107989 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-7095.
CVE ID: CVE-2008-7095 Date Updated: 2024-08-07T11:56:14.052Z Date Published: 2009-08-27T18:00:00 Description: The SNMP daemon in ArubaOS 3.3.2.6 in Aruba Mobility Controller does not restrict SNMP access, which allows remote attackers to (1) read all SNMP community strings via SNMP-COMMUNITY-MIB::snmpCommunityName (1.3.6.1.6.3.18.1.1.1.2) or SNMP-VIEW-BASED-ACM-MIB::vacmGroupName (1.3.6.1.6.3.16.1.2.1.3) with knowledge of one community string, and (2) read SNMPv3 user names via SNMP-USER-BASED-SM-MIB or SNMP-VIEW-BASED-ACM-MIB. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/498033/100/0/threaded - http://osvdb.org/51916 - http://www.securityfocus.com/bid/32102 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-4169.
CVE ID: CVE-2009-4169 Date Updated: 2024-09-16T23:56:17.526Z Date Published: 2009-12-02T18:00:00Z Description: Cross-site scripting (XSS) vulnerability in wp-cumulus.php in the WP-Cumulus Plug-in before 1.22 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.roytanck.com/2009/09/27/wp-cumulus-1-22-fixes-a-security-hole-please-upgrade/ - http://www.vupen.com/english/advisories/2009/3322 - http://www.securityfocus.com/bid/37102 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2193.
CVE ID: CVE-2009-2193 Date Updated: 2024-08-07T05:44:55.051Z Date Published: 2009-08-06T16:00:00 Description: Buffer overflow in the kernel in Apple Mac OS X 10.5 before 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via a crafted AppleTalk response packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/kb/HT3757 - http://secunia.com/advisories/36096 - http://osvdb.org/56838 - http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html - http://www.securitytracker.com/id?1022674 - http://www.securityfocus.com/bid/35954 - https://exchange.xforce.ibmcloud.com/vulnerabilities/52435 - http://www.vupen.com/english/advisories/2009/2172 - http://www.us-cert.gov/cas/techalerts/TA09-218A.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39020.
CVE ID: CVE-2021-39020 Date Updated: 2024-09-17T01:21:12.309Z Date Published: 2022-05-05T16:00:24.083086Z Description: IBM Guardium Data Encryption (GDE) 4.0.0.7 and lower stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 213855. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6579773 - https://exchange.xforce.ibmcloud.com/vulnerabilities/213855 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-46822.
CVE ID: CVE-2022-46822 Date Updated: 2024-08-03T14:39:39.060Z Date Published: 2023-05-09T11:12:08.508Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in JC Development Team WooCommerce JazzCash Gateway Plugin plugin <= 2.0 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/jazzcash-woocommerce-gateway/wordpress-woocommerce-jazzcash-gateway-plugin-plugin-2-0-cross-site-scripting-xss?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4389.
CVE ID: CVE-2016-4389 Date Updated: 2024-08-06T00:25:14.592Z Date Published: 2016-10-05T10:00:00 Description: The Filter SDK in HPE KeyView 10.18 through 10.24 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4387, CVE-2016-4388, and CVE-2016-4390. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1036935 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05297477 - http://www.securityfocus.com/bid/93424 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1005
The MITRE ATT&CK technique T1005: Data from Local System is related to the vulnerability CVE-CVE-2018-5459. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as secondary_impact.
Provide detailed information about CVE-2021-36033.
CVE ID: CVE-2021-36033 Date Updated: 2024-09-16T23:21:27.087Z Date Published: 2021-09-01T14:28:30.908518Z Description: Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an XML Injection vulnerability in the Widgets Module. An attacker with admin privileges can trigger a specially crafted script to achieve remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/magento/apsb21-64.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35643.
CVE ID: CVE-2022-35643 Date Updated: 2024-09-17T00:46:04.288Z Date Published: 2022-07-29T14:05:11.503142Z Description: IBM PowerVM VIOS 3.1 could allow a remote attacker to tamper with system configuration or cause a denial of service. IBM X-Force ID: 230956. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6607886 - https://exchange.xforce.ibmcloud.com/vulnerabilities/230956 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-25723.
CVE ID: CVE-2023-25723 Date Updated: 2023-02-14T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8691.
CVE ID: CVE-2019-8691 Date Updated: 2024-08-04T21:24:29.523Z Date Published: 2019-12-18T17:33:21 Description: A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Mojave 10.14.6. An application may be able to read restricted memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT210348 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5422.
CVE ID: CVE-2008-5422 Date Updated: 2024-08-07T10:56:45.857Z Date Published: 2008-12-11T15:00:00 Description: Sun Sun Ray Server Software 3.1 through 4.0 does not properly restrict access, which allows remote attackers to discover the Sun Ray administration password, and obtain admin access to the Data Store and Administration GUI, via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.avaya.com/elmodocs2/security/ASA-2008-502.htm - http://secunia.com/advisories/33108 - http://www.securityfocus.com/bid/32769 - https://exchange.xforce.ibmcloud.com/vulnerabilities/47253 - http://www.vupen.com/english/advisories/2008/3406 - http://www.securitytracker.com/id?1021383 - http://sunsolve.sun.com/search/document.do?assetkey=1-21-127553-04-1 - http://sunsolve.sun.com/search/document.do?assetkey=1-26-240365-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41653.
CVE ID: CVE-2022-41653 Date Updated: 2024-08-03T12:49:43.421Z Date Published: 2022-12-13T21:08:36.871Z Description: Daikin SVMPC1 version 2.1.22 and prior and SVMPC2 version 1.2.3 and prior are vulnerable to an attacker obtaining user login credentials and control the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0559.
CVE ID: CVE-2020-0559 Date Updated: 2024-08-04T06:02:52.341Z Date Published: 2020-08-13T03:27:23 Description: Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-12301.
CVE ID: CVE-2017-12301 Date Updated: 2024-08-05T18:36:55.801Z Date Published: 2017-10-19T08:00:00 Description: A vulnerability in the Python scripting subsystem of Cisco NX-OS Software could allow an authenticated, local attacker to escape the Python parser and gain unauthorized access to the underlying operating system of the device. The vulnerability exists due to insufficient sanitization of user-supplied parameters that are passed to certain Python functions within the scripting sandbox of the affected device. An attacker could exploit this vulnerability to escape the scripting sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user. To exploit this vulnerability, an attacker must have local access and be authenticated to the targeted device with administrative or Python execution privileges. These requirements could limit the possibility of a successful exploit. This vulnerability affects the following Cisco products if they are running Cisco NX-OS Software: Multilayer Director Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches - Standalone, NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCvb86832, CSCvd86474, CSCvd86479, CSCvd86484, CSCvd86490, CSCve97102, CSCvf12757, CSCvf12804, CSCvf12815, CSCvf15198. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1039622 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-ppe No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24912.
CVE ID: CVE-2021-24912 Date Updated: 2024-08-03T19:49:13.475Z Date Published: 2022-08-22T14:56:37 Description: The Transposh WordPress Translation WordPress plugin before 1.0.8 does not have CSRF check in its tp_translation AJAX action, which could allow attackers to make authorised users add a translation. Given the lack of sanitisation in the tk0 parameter, this could lead to a Stored Cross-Site Scripting issue which will be executed in the context of a logged in admin No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/349483e2-3ab5-4573-bc03-b1ebab40584d No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8610.
CVE ID: CVE-2014-8610 Date Updated: 2024-08-06T13:26:02.365Z Date Published: 2014-12-15T17:27:00 Description: AndroidManifest.xml in Android before 5.0.0 does not require the SEND_SMS permission for the SmsReceiver receiver, which allows attackers to send stored SMS messages, and consequently transmit arbitrary new draft SMS messages or trigger additional per-message charges from a network operator for old messages, via a crafted application that broadcasts an intent with the com.android.mms.transaction.MESSAGE_SENT action, aka Bug 17671795. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/joswr1ght/drozer-modules/blob/master/whfs/smsdraftsend.py - http://xteam.baidu.com/?p=164 - http://seclists.org/fulldisclosure/2014/Nov/85 - http://seclists.org/fulldisclosure/2014/Dec/8 - http://packetstormsecurity.com/files/129282/Android-SMS-Resend.html - https://android.googlesource.com/platform/packages/apps/Mms/+/008d6202fca4002a7dfe333f22377faa73585c67 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20108.
CVE ID: CVE-2021-20108 Date Updated: 2024-08-03T17:30:07.471Z Date Published: 2021-07-19T14:34:05 Description: Manage Engine Asset Explorer Agent 1.0.34 listens on port 9000 for incoming commands over HTTPS from Manage Engine Server. The HTTPS certificates are not verified which allows any arbitrary user on the network to send commands over port 9000. While these commands may not be executed (due to authtoken validation), the Asset Explorer agent will reach out to the manage engine server for an HTTP request. During this process, AEAgent.cpp allocates 0x66 bytes using "malloc". This memory is never free-ed in the program, causing a memory leak. Additionally, the instruction sent to aeagent (ie: NEWSCAN, DELTASCAN, etc) is converted to a unicode string, but is never freed. These memory leaks allow a remote attacker to exploit a Denial of Service scenario through repetitively sending these commands to an agent and eventually crashing it the agent due to an out-of-memory condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2021-29 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5595.
CVE ID: CVE-2014-5595 Date Updated: 2024-08-06T11:48:49.913Z Date Published: 2014-09-09T01:00:00 Description: The actionpuzzlefamily for Kakao (aka com.com2us.actionpuzzlefamily.kakao.freefull.google.global.android.common) application 1.4.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/360121 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34000.
CVE ID: CVE-2024-34000 Date Updated: 2024-08-02T02:42:59.810Z Date Published: 2024-05-31T20:01:11.769Z Description: ID numbers displayed in the lesson overview report required additional sanitizing to prevent a stored XSS risk. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://moodle.org/mod/forum/discuss.php?d=458388 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0191.
CVE ID: CVE-2008-0191 Date Updated: 2024-08-07T07:39:34.214Z Date Published: 2008-01-10T00:00:00 Description: WordPress 2.2.x and 2.3.x allows remote attackers to obtain sensitive information via an invalid p parameter in an rss2 action to the default URI, which reveals the full path and the SQL database structure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://securityvulns.ru/Sdocument663.html - http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/39423 - http://www.securityfocus.com/archive/1/485786/100/0/threaded - http://securityreason.com/securityalert/3539 - http://websecurity.com.ua/1634/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32078.
CVE ID: CVE-2021-32078 Date Updated: 2024-08-03T23:17:29.143Z Date Published: 2021-06-17T14:13:38 Description: An Out-of-Bounds Read was discovered in arch/arm/mach-footbridge/personal-pci.c in the Linux kernel through 5.12.11 because of the lack of a check for a value that shouldn't be negative, e.g., access to element -2 of an array, aka CID-298a58e165e4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kirtikumarar.com/CVE-2021-32078.txt - https://github.com/torvalds/linux/commit/298a58e165e447ccfaae35fe9f651f9d7e15166f - https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=298a58e165e447ccfaae35fe9f651f9d7e15166f - https://security.netapp.com/advisory/ntap-20210813-0002/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24018.
CVE ID: CVE-2024-24018 Date Updated: 2024-08-01T23:19:51.240Z Date Published: 2024-02-08T00:00:00 Description: A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass in crafted offset, limit, and sort parameters to perform SQL injection via /system/dataPerm/list No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/201206030/novel-plus - https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/24018.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8631.
CVE ID: CVE-2016-8631 Date Updated: 2024-08-06T02:27:41.243Z Date Published: 2018-07-31T20:00:00 Description: The OpenShift Enterprise 3 router does not properly sort routes when processing newly added routes. An attacker with access to create routes can potentially overwrite existing routes and redirect network traffic for other users to their own site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/94110 - https://access.redhat.com/errata/RHSA-2016:2696 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8631 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-32956.
CVE ID: CVE-2024-32956 Date Updated: 2024-08-08T16:08:52.194Z Date Published: 2024-04-24T08:23:04.043Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rometheme RomethemeKit For Elementor allows Stored XSS.This issue affects RomethemeKit For Elementor: from n/a through 1.4.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/rometheme-for-elementor/wordpress-romethemekit-for-elementor-plugin-1-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2877.
CVE ID: CVE-2023-2877 Date Updated: 2024-08-02T06:41:02.359Z Date Published: 2023-06-27T13:17:12.873Z Description: The Formidable Forms WordPress plugin before 6.3.1 does not adequately authorize the user or validate the plugin URL in its functionality for installing add-ons. This allows a user with a role as low as Subscriber to install and activate arbitrary plugins of arbitrary versions from the WordPress.org plugin repository onto the site, leading to Remote Code Execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/33765da5-c56e-42c1-83dd-fcaad976b402 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4862.
CVE ID: CVE-2023-4862 Date Updated: 2024-08-02T07:38:00.803Z Date Published: 2023-10-16T19:38:56.312Z Description: The File Manager Pro WordPress plugin before 1.8.1 does not adequately validate and escape some inputs, leading to XSS by high-privilege users. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/81821bf5-69e1-4005-b3eb-d541490909cc No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-24955.
CVE ID: CVE-2023-24955 Date Updated: 2024-08-02T11:11:43.707Z Date Published: 2023-05-09T17:03:01.864Z Description: Microsoft SharePoint Server Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24955 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2519.
CVE ID: CVE-2015-2519 Date Updated: 2024-08-06T05:17:27.239Z Date Published: 2015-09-09T00:00:00 Description: Integer overflow in Windows Journal in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows remote attackers to execute arbitrary code via a crafted .jnt file, aka "Windows Journal Integer Overflow RCE Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-098 - http://www.securitytracker.com/id/1033484 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6638.
CVE ID: CVE-2016-6638 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4705.
CVE ID: CVE-2012-4705 Date Updated: 2024-08-06T20:42:55.138Z Date Published: 2013-02-24T11:00:00 Description: Directory traversal vulnerability in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via vectors involving a crafted pathname. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://ics-cert.us-cert.gov/advisories/ICSA-13-050-01A No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4606.
CVE ID: CVE-2016-4606 Date Updated: 2024-08-06T00:32:25.958Z Date Published: 2020-02-21T01:15:21 Description: Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1036858 - https://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html - http://www.securityfocus.com/bid/93055 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0959.
CVE ID: CVE-2009-0959 Date Updated: 2024-08-07T04:57:17.110Z Date Published: 2009-06-19T16:00:00 Description: The MPEG-4 video codec in Apple iPhone OS 1.0 through 2.2.1 and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to cause a denial of service (device reset) via a crafted MPEG-4 video file that triggers an "input validation issue." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/55237 - http://support.apple.com/kb/HT3639 - http://www.vupen.com/english/advisories/2009/1621 - http://www.securityfocus.com/bid/35414 - https://exchange.xforce.ibmcloud.com/vulnerabilities/51211 - http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - http://www.securityfocus.com/bid/35433 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-16139.
CVE ID: CVE-2018-16139 Date Updated: 2024-08-05T10:17:38.258Z Date Published: 2019-05-13T19:48:36 Description: Cross-site scripting (XSS) vulnerability in BIBLIOsoft BIBLIOpac 2008 allows remote attackers to inject arbitrary web script or HTML via the db or action parameter to to bin/wxis.exe/bibliopac/. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.0x90.zone/web/xss/2019/02/01/XSS-Bibliosoft.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4368.
CVE ID: CVE-2010-4368 Date Updated: 2024-09-16T19:39:59.178Z Date Published: 2010-12-02T16:00:00Z Description: awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/870532 - http://awstats.sourceforge.net/docs/awstats_changelog.txt - http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3853.
CVE ID: CVE-2010-3853 Date Updated: 2024-08-07T03:26:12.299Z Date Published: 2011-01-24T17:00:00 Description: pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://security.gentoo.org/glsa/glsa-201206-31.xml - http://lists.vmware.com/pipermail/security-announce/2011/000126.html - http://www.vupen.com/english/advisories/2011/0606 - http://www.securityfocus.com/archive/1/516909/100/0/threaded - http://www.mandriva.com/security/advisories?name=MDVSA-2010:220 - http://secunia.com/advisories/49711 - http://www.redhat.com/support/errata/RHSA-2010-0891.html - https://bugzilla.redhat.com/show_bug.cgi?id=643043 - http://www.redhat.com/support/errata/RHSA-2010-0819.html - http://www.vmware.com/security/advisories/VMSA-2011-0004.html - http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_namespace/pam_namespace.c?view=log#rev1.13 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-40470.
CVE ID: CVE-2021-40470 Date Updated: 2024-08-04T02:44:10.487Z Date Published: 2021-10-13T00:27:12 Description: DirectX Graphics Kernel Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40470 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9927.
CVE ID: CVE-2014-9927 Date Updated: 2024-08-06T14:02:36.806Z Date Published: 2017-06-06T14:00:00 Description: In UIM in all Android releases from CAF using the Linux kernel, a Buffer Copy without Checking Size of Input vulnerability could potentially exist. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-05-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10908.
CVE ID: CVE-2019-10908 Date Updated: 2024-08-04T22:40:15.422Z Date Published: 2019-04-07T13:32:58 Description: In Airsonic 10.2.1, RecoverController.java generates passwords via org.apache.commons.lang.RandomStringUtils, which uses java.util.Random internally. This PRNG has a 48-bit seed that can easily be bruteforced, leading to trivial privilege escalation attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/airsonic/airsonic/commit/61c842923a6d60d4aedd126445a8437b53b752c8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-17049.
CVE ID: CVE-2019-17049 Date Updated: 2024-08-05T01:33:16.282Z Date Published: 2019-09-30T18:37:21 Description: NETGEAR SRX5308 4.3.5-3 devices allow SQL Injection, as exploited in the wild in September 2019 to add a new user account. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://community.netgear.com/t5/Hardware-VPN-Firewalls-and/Successful-hack-of-our-SRX5308/m-p/1805846 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49329.
CVE ID: CVE-2023-49329 Date Updated: 2024-08-02T21:53:44.952Z Date Published: 2024-01-19T00:00:00 Description: Anomali Match before 4.6.2 allows OS Command Injection. An authenticated admin user can inject and execute operating system commands. This arises from improper handling of untrusted input, enabling an attacker to elevate privileges, execute system commands, and potentially compromise the underlying operating system. The fixed versions are 4.4.5, 4.5.4, and 4.6.2. The earliest affected version is 4.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.anomali.com/collaborate/ciso-blog - https://www.anomali.com/security-advisory/anml-2023-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4561.
CVE ID: CVE-2011-4561 Date Updated: 2024-08-07T00:09:18.944Z Date Published: 2011-11-28T21:00:00 Description: Cross-site scripting (XSS) vulnerability in admin.php in Phorum 5.2.18 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to admin/index.php. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/49920 - http://osvdb.org/76026 - http://www.rul3z.de/advisories/SSCHADV2011-023.txt - http://www.securityfocus.com/archive/1/519991/100/0/threaded - http://secunia.com/advisories/46282 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0464.
CVE ID: CVE-2024-0464 Date Updated: 2024-08-01T18:04:49.782Z Date Published: 2024-01-12T18:31:03.783Z Description: A vulnerability classified as critical has been found in code-projects Online Faculty Clearance 1.0. This affects an unknown part of the file delete_faculty.php of the component HTTP GET Request Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250569 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.250569 - https://vuldb.com/?ctiid.250569 - https://github.com/BxYQ/vul/blob/main/3ONLINE_FACULTY_CLEARANCE_SYSTEM%20has%20SQL4.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-45621.
CVE ID: CVE-2024-45621 Date Updated: 2024-09-03T15:11:25.803Z Date Published: 2024-09-02T00:00:00 Description: The Electron desktop application of Rocket.Chat through 6.3.4 allows stored XSS via links in an uploaded file, related to failure to use a separate browser upon encountering third-party external actions from PDF documents. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/1967109 - https://github.com/RocketChat/Rocket.Chat/releases/tag/6.3.4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1010018.
CVE ID: CVE-2019-1010018 Date Updated: 2024-08-05T03:07:18.312Z Date Published: 2019-07-16T12:35:14 Description: Zammad GmbH Zammad 2.3.0 and earlier is affected by: Cross Site Scripting (XSS) - CWE-80. The impact is: Execute java script code on users browser. The component is: web app. The attack vector is: the victim must open a ticket. The fixed version is: 2.3.1, 2.2.2 and 2.1.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/zammad/zammad/compare/ea50d0c...238784d - https://github.com/zammad/zammad/compare/5c983f6...1a9af7d - https://github.com/zammad/zammad/issues/1869 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5067.
CVE ID: CVE-2008-5067 Date Updated: 2024-09-17T03:59:49.718Z Date Published: 2008-11-13T17:00:00Z Description: Cross-site scripting (XSS) vulnerability in search.php in Kmita Catalogue 2.x allows remote attackers to inject arbitrary web script or HTML via the q parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.osvdb.org/49441 - http://www.securityfocus.com/bid/31968 - http://secunia.com/advisories/32457 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13628.
CVE ID: CVE-2020-13628 Date Updated: 2024-08-04T12:25:16.366Z Date Published: 2020-05-27T15:12:39 Description: Cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the widgetId parameter to host-monitoring/src/toolbar.php. This vulnerability is fixed in versions 1.6.4, 18.10.3, 19.04.3, and 19.0.1 of the Centreon host-monitoring widget; 1.6.4, 18.10.5, 19.04.3, 19.10.2 of the Centreon service-monitoring widget; and 1.0.3, 18.10.1, 19.04.1, 19.10.1 of the Centreon tactical-overview widget. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sysdream.com/news/lab/2020-05-13-cve-2020-10946-several-cross-site-scripting-xss-vulnerabilities-in-centreon/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9671.
CVE ID: CVE-2016-9671 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4969.
CVE ID: CVE-2016-4969 Date Updated: 2024-08-06T00:46:39.912Z Date Published: 2016-09-21T14:00:00 Description: Cross-site scripting (XSS) vulnerability in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote attackers to inject arbitrary web script or HTML via the IP parameter to script/statistics/getconn.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/92779 - http://docs.fortinet.com/uploaded/files/3236/fortiwan-v4.2.5-release-notes.pdf - https://www.kb.cert.org/vuls/id/724487 - http://fortiguard.com/advisory/fortiwan-multiple-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2702.
CVE ID: CVE-2023-2702 Date Updated: 2024-08-02T06:33:04.304Z Date Published: 2023-05-23T19:14:36.748Z Description: Authorization Bypass Through User-Controlled Key vulnerability in Finex Media Competition Management System allows Authentication Abuse, Authentication Bypass.This issue affects Competition Management System: before 23.07. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.usom.gov.tr/bildirim/tr-23-0283 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30836.
CVE ID: CVE-2021-30836 Date Updated: 2024-08-03T22:48:12.605Z Date Published: 2021-10-28T18:17:16 Description: An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted audio file may disclose restricted memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT212807 - https://support.apple.com/kb/HT212816 - https://support.apple.com/en-us/HT212814 - https://support.apple.com/en-us/HT212819 - https://support.apple.com/en-us/HT212815 - https://support.apple.com/kb/HT212869 - http://www.openwall.com/lists/oss-security/2021/12/20/6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38950.
CVE ID: CVE-2021-38950 Date Updated: 2024-09-16T20:06:32.121Z Date Published: 2021-12-14T16:20:10.693997Z Description: IBM MQ on HPE NonStop 8.0.4 and 8.1.0 is vulnerable to a privilege escalation attack when SharedBindingsUserId is set to effective. IBM X-ForceID: 211404. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6525810 - https://exchange.xforce.ibmcloud.com/vulnerabilities/211404 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2668.
CVE ID: CVE-2014-2668 Date Updated: 2024-08-06T10:21:36.028Z Date Published: 2014-03-28T16:00:00 Description: Apache CouchDB 1.5.0 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via the count parameter to /_uuids. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/92161 - http://www.securityfocus.com/bid/66474 - http://secunia.com/advisories/57572 - http://lists.opensuse.org/opensuse-updates/2014-04/msg00039.html - http://www.exploit-db.com/exploits/32519 - http://www.securitytracker.com/id/1029967 - http://packetstormsecurity.com/files/125889 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7780.
CVE ID: CVE-2014-7780 Date Updated: 2024-08-06T13:03:27.397Z Date Published: 2014-10-21T10:00:00 Description: The Pakistan Cricket News (aka com.conduit.app_cf18df8bdf454eb0a836e2d29886bc40.app) application 1.21.38.6504 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing - http://www.kb.cert.org/vuls/id/680969 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27711.
CVE ID: CVE-2024-27711 Date Updated: 2024-08-21T13:43:21.495Z Date Published: 2024-07-05T00:00:00 Description: An issue in Eskooly Free Online School management Software v.3.0 and before allows a remote attacker to escalate privileges via the Sin-up process function in the account settings. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.be-hacktive.com/eskooly-cve/eskooly-broken-authentication/cve-2024-27711-user-enumeration-via-sign-up-process-in-eskooly-web-product-less-than-v3.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14609.
CVE ID: CVE-2019-14609 Date Updated: 2024-08-05T00:19:41.365Z Date Published: 2019-12-16T19:11:36 Description: Improper input validation in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4530.
CVE ID: CVE-2017-4530 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4580.
CVE ID: CVE-2010-4580 Date Updated: 2024-08-07T03:51:17.534Z Date Published: 2010-12-22T01:00:00 Description: Opera before 11.00 does not clear WAP WML form fields after manual navigation to a new web site, which allows remote attackers to obtain sensitive information via an input field that has the same name as an input field on a previously visited web site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/42653 - http://www.opera.com/docs/changelogs/unix/1100/ - http://www.opera.com/docs/changelogs/windows/1100/ - http://www.opera.com/docs/changelogs/mac/1100/ - http://www.opera.com/support/kb/view/979/ - http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1896.
CVE ID: CVE-2024-1896 Date Updated: 2024-08-01T18:56:22.572Z Date Published: 2024-05-02T16:51:47.353Z Description: The Photo Gallery – Responsive Photo Gallery, Image Gallery, Portfolio Gallery, Logo Gallery And Team Gallery plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.1 via deserialization via shortcode of untrusted input from the 'awl_lg_settings_' attribute. This makes it possible for authenticated attackers, with contributor access and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/14894c36-f657-4368-bc7f-60121ec08c13?source=cve - https://plugins.trac.wordpress.org/browser/new-photo-gallery/tags/1.4.0/shortcode.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-29747.
CVE ID: CVE-2023-29747 Date Updated: 2024-08-02T14:14:39.706Z Date Published: 2023-05-31T00:00:00 Description: Story Saver for Instragram - Video Downloader 1.0.6 for Android exists exposed component, the component provides the method to modify the SharedPreference file. The attacker can use the method to modify the data in any SharedPreference file, these data will be loaded into the memory when the application is opened. Depending on how the data is used, this can result in various attack consequences, such as ad display exceptions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://apksos.com/app/story.saver.downloader.photo.video.repost.byrk - https://www.instagram.com/nihans_macrame/ - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29747/CVE%20detail.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5965.
CVE ID: CVE-2018-5965 Date Updated: 2024-08-05T05:47:56.168Z Date Published: 2018-01-25T16:00:00 Description: CMS Made Simple (CMSMS) 2.2.5 has XSS in admin/moduleinterface.php via the m1_errors parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kyawminthein901497298.wordpress.com/2018/01/22/cms-made-simple-2-2-5-reflected-cross-site-scripting/ - http://packetstormsecurity.com/files/146035/CMS-Made-Simple-2.2.5-moduleinterface.php-m1_errors-Cross-Site-Scripting.html - http://seclists.org/fulldisclosure/2018/Jan/83 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2469.
CVE ID: CVE-2023-2469 Date Updated: 2023-05-17T07:35:35.479Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2959.
CVE ID: CVE-2017-2959 Date Updated: 2024-08-05T14:09:17.790Z Date Published: 2017-01-11T04:40:00 Description: Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable heap overflow vulnerability in the image conversion engine, related to parsing of color profile metadata. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/95344 - http://www.securitytracker.com/id/1037574 - http://www.zerodayinitiative.com/advisories/ZDI-17-023 - https://helpx.adobe.com/security/products/acrobat/apsb17-01.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-39945.
CVE ID: CVE-2022-39945 Date Updated: 2024-08-03T12:07:42.982Z Date Published: 2022-11-02T00:00:00 Description: An improper access control vulnerability [CWE-284] in FortiMail 7.2.0, 7.0.0 through 7.0.3, 6.4 all versions, 6.2 all versions, 6.0 all versions may allow an authenticated admin user assigned to a specific domain to access and modify other domains information via insecure direct object references (IDOR). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/psirt/FG-IR-22-066 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6136.
CVE ID: CVE-2012-6136 Date Updated: 2024-08-06T21:28:38.963Z Date Published: 2019-11-20T14:16:24 Description: tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security-tracker.debian.org/tracker/CVE-2012-6136 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6136 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-45401.
CVE ID: CVE-2022-45401 Date Updated: 2024-08-03T14:09:57.038Z Date Published: 2022-11-15T00:00:00 Description: Jenkins Associated Files Plugin 0.2.1 and earlier does not escape names of associated files, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2947 - http://www.openwall.com/lists/oss-security/2022/11/15/4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-43373.
CVE ID: CVE-2024-43373 Date Updated: 2024-08-15T15:55:26.684Z Date Published: 2024-08-15T14:31:34.120Z Description: webcrack is a tool for reverse engineering javascript. An arbitrary file write vulnerability exists in the webcrack module when processing specifically crafted malicious code on Windows systems. This vulnerability is triggered when using the unpack bundles feature in conjunction with the saving feature. If a module name includes a path traversal sequence with Windows path separators, an attacker can exploit this to overwrite files on the host system. This vulnerability allows an attacker to write arbitrary `.js` files to the host system, which can be leveraged to hijack legitimate Node.js modules to gain arbitrary code execution. This vulnerability has been patched in version 2.14.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/j4k0xb/webcrack/security/advisories/GHSA-ccqh-278p-xq6w - https://github.com/j4k0xb/webcrack/commit/4bc5c6f353012ee7edc2cb39d01a728ab7426999 - https://github.com/j4k0xb/webcrack/blob/241f9469e6401f3dabc6373233d85a5e76966b54/packages/webcrack/src/unpack/bundle.ts#L79 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34462.
CVE ID: CVE-2024-34462 Date Updated: 2024-08-02T02:51:11.585Z Date Published: 2024-05-04T00:00:00 Description: Alinto SOGo through 5.10.0 allows XSS during attachment preview. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Alinto/sogo/commit/2e37e59ed140d4aee0ff2fba579ca5f83f2c5920 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26860.
CVE ID: CVE-2022-26860 Date Updated: 2024-09-17T04:04:28.424Z Date Published: 2022-09-06T20:15:19.312759Z Description: Dell BIOS versions contain a stack-based buffer overflow vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI to bypass security checks resulting in arbitrary code execution in SMM. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/000202194 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10804.
CVE ID: CVE-2019-10804 Date Updated: 2024-08-04T22:32:02.057Z Date Published: 2020-02-28T20:31:41 Description: serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/es128/serial-number/blob/master/index.js#L106 - https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6006.
CVE ID: CVE-2008-6006 Date Updated: 2024-08-07T11:13:13.696Z Date Published: 2009-01-30T18:03:00 Description: Multiple PHP remote file inclusion vulnerabilities in Micronation Banking System (minba) 1.5.0 allow remote attackers to execute arbitrary PHP code via a URL in the minsoft_path parameter to (1) utdb_access.php and (2) utgn_message.php in utility/. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/45529 - http://www.securityfocus.com/bid/31492 - https://www.exploit-db.com/exploits/6632 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34994.
CVE ID: CVE-2023-34994 Date Updated: 2024-09-26T19:50:34.565Z Date Published: 2023-09-05T16:15:03.744Z Description: An improper resource allocation vulnerability exists in the OAS Engine configuration management functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to creation of an arbitrary directory. An attacker can send a sequence of requests to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1773 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1773 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-42038.
CVE ID: CVE-2024-42038 Date Updated: 2024-08-08T15:22:32.499Z Date Published: 2024-08-08T09:31:40.594Z Description: Vulnerability of PIN enhancement failures in the screen lock module Impact: Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2024/8/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34661.
CVE ID: CVE-2024-34661 Date Updated: 2024-09-04T12:44:31.149Z Date Published: 2024-09-04T05:32:47.507Z Description: Improper handling of insufficient permissions in Samsung Assistant prior to version 9.1.00.7 allows remote attackers to access location data. User interaction is required for triggering this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=09 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-4975.
CVE ID: CVE-2020-4975 Date Updated: 2024-09-16T21:07:17.435Z Date Published: 2021-03-04T19:05:42.516646Z Description: IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192435. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6417585 - https://exchange.xforce.ibmcloud.com/vulnerabilities/192435 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0161.
CVE ID: CVE-2021-0161 Date Updated: 2024-08-03T15:32:09.654Z Date Published: 2022-02-09T22:04:19 Description: Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3398.
CVE ID: CVE-2013-3398 Date Updated: 2024-09-16T19:00:06.944Z Date Published: 2013-06-26T21:00:00Z Description: The web framework in Cisco Prime Central for Hosted Collaboration Solution (HCS) Assurance provides different responses to requests for arbitrary pathnames depending on whether the pathname exists, which allows remote attackers to enumerate directories and files via a series of crafted requests, aka Bug ID CSCuh64574. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3398 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21304.
CVE ID: CVE-2024-21304 Date Updated: 2024-08-01T22:13:42.727Z Date Published: 2024-02-13T18:02:26.978Z Description: Trusted Compute Base Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21304 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7885.
CVE ID: CVE-2014-7885 Date Updated: 2024-08-06T13:03:27.655Z Date Published: 2015-03-14T01:00:00 Description: Multiple unspecified vulnerabilities in HP ArcSight Enterprise Security Manager (ESM) before 6.8c have unknown impact and remote attack vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04562193 - http://www.kb.cert.org/vuls/id/868948 - https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04562193 - http://www.securitytracker.com/id/1031921 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8644.
CVE ID: CVE-2020-8644 Date Updated: 2024-08-04T10:03:46.324Z Date Published: 2020-02-05T21:03:11 Description: PlaySMS before 1.4.3 does not sanitize inputs from a malicious string. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://playsms.org/2020/02/05/playsms-1-4-3-has-been-released/ - https://forum.playsms.org/t/playsms-1-4-3-has-been-released/2704 - https://research.nccgroup.com/2020/02/11/technical-advisory-playsms-pre-authentication-remote-code-execution-cve-2020-8644/ - http://packetstormsecurity.com/files/157106/PlaySMS-index.php-Unauthenticated-Template-Injection-Code-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20322.
CVE ID: CVE-2019-20322 Date Updated: 2022-09-29T16:52:00 Date Published: 2020-01-02T20:33:08 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2390.
CVE ID: CVE-2018-2390 Date Updated: 2024-08-05T04:14:39.755Z Date Published: 2018-02-14T12:00:00 Description: Under certain conditions a malicious user can prevent legitimate users from accessing the SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, via IGS Chart service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.support.sap.com/#/notes/2525222 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3356.
CVE ID: CVE-2024-3356 Date Updated: 2024-08-19T18:59:28.335Z Date Published: 2024-04-05T21:00:05.019Z Description: A vulnerability was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin/mod_settings/controller.php?action=add. The manipulation of the argument type leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259460. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.259460 - https://vuldb.com/?ctiid.259460 - https://vuldb.com/?submit.310225 - https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-10 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3443.
CVE ID: CVE-2013-3443 Date Updated: 2024-08-06T16:07:38.000Z Date Published: 2013-07-31T19:00:00 Description: The web service framework in Cisco WAAS Software 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1 in a Central Manager (CM) configuration allows remote attackers to execute arbitrary code via a crafted POST request, aka Bug ID CSCuh26626. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1028851 - http://secunia.com/advisories/54367 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130731-waascm - http://www.securityfocus.com/bid/61542 - http://secunia.com/advisories/54372 - https://exchange.xforce.ibmcloud.com/vulnerabilities/86121 - http://osvdb.org/95877 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4650.
CVE ID: CVE-2013-4650 Date Updated: 2024-09-16T23:11:11.616Z Date Published: 2013-07-04T10:00:00Z Description: MongoDB 2.4.x before 2.4.5 and 2.5.x before 2.5.1 allows remote authenticated users to obtain internal system privileges by leveraging a username of __system in an arbitrary database. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jira.mongodb.org/browse/SERVER-9983 - http://www.mongodb.org/about/alerts/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15397.
CVE ID: CVE-2017-15397 Date Updated: 2024-08-05T19:57:25.920Z Date Published: 2018-02-07T23:00:00 Description: Inappropriate implementation in ChromeVox in Google Chrome OS prior to 62.0.3202.74 allowed a remote attacker in a privileged network position to observe or tamper with certain cleartext HTTP requests by leveraging that position. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wwws.nightwatchcybersecurity.com/2018/01/01/chromeos-doesnt-always-use-ssl-during-startup-cve-2017-15397/ - http://www.securityfocus.com/bid/102435 - https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-chrome-os_27.html - https://crbug.com/627300 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29771.
CVE ID: CVE-2021-29771 Date Updated: 2024-09-16T17:53:11.405Z Date Published: 2021-11-02T16:00:29.020693Z Description: IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6509614 - https://exchange.xforce.ibmcloud.com/vulnerabilities/202773 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5817.
CVE ID: CVE-2018-5817 Date Updated: 2024-09-16T19:15:52.663Z Date Published: 2019-02-20T18:00:00Z Description: A type confusion error within the "unpacked_load_raw()" function within LibRaw versions prior to 0.19.1 (internal/dcraw_common.cpp) can be exploited to trigger an infinite loop. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://secuniaresearch.flexerasoftware.com/secunia_research/2018-27/ - https://www.libraw.org/news/libraw-0-19-2-release - https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html - https://usn.ubuntu.com/3989-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.