instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2024-7655.
CVE ID: CVE-2024-7655 Date Updated: 2024-09-10T13:29:21.462Z Date Published: 2024-09-10T07:30:03.793Z Description: The Community by PeepSo – Social Network, Membership, Registration, User Profiles plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 6.4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/e85ee611-ae81-4736-b4f0-b9d06714da18?source=cve - https://wordpress.org/plugins/peepso-core/#developers - https://www.peepso.com/6-4-6-0/ - https://www.peepso.com/changelog/ - https://plugins.trac.wordpress.org/browser/peepso-core/tags/6.4.6.0/classes/adminconfigfields.php?rev=3147528#L17 - https://plugins.trac.wordpress.org/changeset/3147528/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-1270.
CVE ID: CVE-2016-1270 Date Updated: 2024-08-05T22:48:13.667Z Date Published: 2016-04-15T14:00:00 Description: The rpd daemon in Juniper Junos OS before 12.1X44-D60, 12.1X46 before 12.1X46-D45, 12.1X47 before 12.1X47-D30, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D20, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D40, 13.3 before 13.3R6, 14.1 before 14.1R4, and 14.2 before 14.2R2, when configured with BGP-based L2VPN or VPLS, allows remote attackers to cause a denial of service (daemon restart) via a crafted L2VPN family BGP update. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10737 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-1684.
CVE ID: CVE-2021-1684 Date Updated: 2024-08-03T16:18:11.511Z Date Published: 2021-01-12T19:42:24 Description: Windows Bluetooth Security Feature Bypass Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1684 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10007.
CVE ID: CVE-2016-10007 Date Updated: 2024-08-06T03:07:31.593Z Date Published: 2018-02-19T21:00:00 Description: SQL injection vulnerability in the "Marketing > Forms" screen in dotCMS before 3.7.2 and 4.x before 4.1.1 allows remote authenticated administrators to execute arbitrary SQL commands via the _EXT_FORM_HANDLER_orderBy parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.elarlang.eu/cve-2016-10007-and-cve-2016-10008-2-sql-injection-vulnerabilities-in-dotcms-blacklist-defence-bypass.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8001.
CVE ID: CVE-2018-8001 Date Updated: 2024-08-05T06:37:59.617Z Date Published: 2018-03-09T19:00:00 Description: In PoDoFo 0.9.5, there exists a heap-based buffer over-read vulnerability in UnescapeName() in PdfName.cpp. Remote attackers could leverage this vulnerability to cause a denial-of-service or possibly unspecified other impact via a crafted pdf file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1549469 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36401.
CVE ID: CVE-2024-36401 Date Updated: 2024-08-19T07:47:49.937Z Date Published: 2024-07-01T15:25:41.873Z Description: GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code. Versions 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv - https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w - https://github.com/geotools/geotools/pull/4797 - https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852 - https://osgeo-org.atlassian.net/browse/GEOT-7587 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-44023.
CVE ID: CVE-2023-44023 Date Updated: 2024-09-24T14:07:53.767Z Date Published: 2023-09-27T00:00:00 Description: Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/aixiao0621/Tenda/blob/main/AC10U/4/0.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-37999.
CVE ID: CVE-2022-37999 Date Updated: 2024-08-03T10:37:42.645Z Date Published: 2022-10-11T00:00:00 Description: Windows Group Policy Preference Client Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-37999 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32249.
CVE ID: CVE-2022-32249 Date Updated: 2024-08-03T07:39:49.591Z Date Published: 2022-07-12T20:31:35 Description: Under special integration scenario of SAP Business one and SAP HANA - version 10.0, an attacker can exploit HANA cockpit�s data volume to gain access to highly sensitive information (e.g., high privileged account credentials) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - https://launchpad.support.sap.com/#/notes/3212997 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-21517.
CVE ID: CVE-2020-21517 Date Updated: 2024-08-04T14:30:33.477Z Date Published: 2021-06-21T14:55:02 Description: Cross Site Scripting (XSS) vulnerability in MetInfo 7.0.0 via the gourl parameter in login.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://metinfo.com - https://github.com/lvyyevd/cms/blob/master/metinfo/metinfo7.0.0.md - https://u.mituo.cn/api/metinfo/download/7.0.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5851.
CVE ID: CVE-2019-5851 Date Updated: 2024-08-04T20:09:23.803Z Date Published: 2019-11-25T14:22:56 Description: Use after free in WebAudio in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2019/07/stable-channel-update-for-desktop_30.html - https://crbug.com/977107 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3974.
CVE ID: CVE-2008-3974 Date Updated: 2024-08-07T10:00:42.237Z Date Published: 2009-01-14T01:00:00 Description: Unspecified vulnerability in the Oracle OLAP component in Oracle Database 9.0.2.8 and 9.2.0.8DV allows remote authenticated users to affect availability, related to SYS.OLAPIMPL_T. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/33525 - http://www.securitytracker.com/id?1021561 - http://www.vupen.com/english/advisories/2009/0115 - http://www.oracle.com/technetwork/topics/security/cpujan2009-097901.html - http://www.securityfocus.com/bid/33177 - http://osvdb.org/51347 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2716.
CVE ID: CVE-2010-2716 Date Updated: 2024-08-07T02:39:37.839Z Date Published: 2010-07-13T18:00:00 Description: Multiple SQL injection vulnerabilities in PsNews 1.3 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) ndetail.php and (2) print.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/60129 - http://www.securityfocus.com/bid/41410 - http://www.exploit-db.com/exploits/14251 - http://packetstormsecurity.org/1007-exploits/psnews-sql.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-31893.
CVE ID: CVE-2023-31893 Date Updated: 2024-08-02T15:03:28.477Z Date Published: 2023-06-05T00:00:00 Description: Telefnica Brasil Vivo Play (IPTV) Firmware: 2023.04.04.01.06.15 is vulnerable to Denial of Service (DoS) via DNS Recursion. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cert.br/docs/whitepapers/dns-recursivo-aberto/ - https://medium.com/%40shooterRX/dns-recursion-leads-to-dos-attack-vivo-play-iptv-cve-2023-31893-b5ac45f38f No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27180.
CVE ID: CVE-2020-27180 Date Updated: 2024-08-04T16:11:35.927Z Date Published: 2020-10-27T04:21:30 Description: konzept-ix publiXone before 2020.015 allows attackers to download files by iterating over the IXCopy fileID parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://seclists.org/fulldisclosure/2020/Oct/28 - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-publixone/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-45228.
CVE ID: CVE-2022-45228 Date Updated: 2024-08-03T14:09:56.946Z Date Published: 2022-12-12T00:00:00 Description: Dragino Lora LG01 18ed40 IoT v4.3.4 was discovered to contain a Cross-Site Request Forgery in the logout page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sectrio.com/vulnerability-research/cve-2022-45228/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1454.
CVE ID: CVE-2018-1454 Date Updated: 2024-09-16T20:52:12.549Z Date Published: 2018-06-05T15:00:00Z Description: IBM InfoSphere Information Server 11.3, 11.5, and 11.7 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 140089. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1041038 - https://exchange.xforce.ibmcloud.com/vulnerabilities/140089 - http://www.ibm.com/support/docview.wss?uid=swg22015222 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1028.
CVE ID: CVE-2015-1028 Date Updated: 2024-08-06T04:33:19.300Z Date Published: 2015-01-21T15:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in D-Link DSL-2730B router (rev C1) with firmware GE_1.01 allow remote authenticated users to inject arbitrary web script or HTML via the (1) domainname parameter to dnsProxy.cmd (DNS Proxy Configuration Panel); the (2) brName parameter to lancfg2get.cgi (Lan Configuration Panel); the (3) wlAuthMode, (4) wl_wsc_reg, or (5) wl_wsc_mode parameter to wlsecrefresh.wl (Wireless Security Panel); or the (6) wlWpaPsk parameter to wlsecurity.wl (Wireless Password Viewer). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/35751 - http://www.exploit-db.com/exploits/35747 - http://www.xlabs.com.br/blog/?p=339 - http://www.exploit-db.com/exploits/35750 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27984.
CVE ID: CVE-2021-27984 Date Updated: 2024-08-03T21:33:17.210Z Date Published: 2021-12-10T18:40:01 Description: In Pluck-4.7.15 admin background a remote command execution vulnerability exists when uploading files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/pluck-cms/pluck/issues/98 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6671.
CVE ID: CVE-2019-6671 Date Updated: 2024-08-04T20:31:04.049Z Date Published: 2019-11-27T21:41:34 Description: On BIG-IP 15.0.0-15.0.1, 14.1.0-14.1.2, 14.0.0-14.0.1, and 13.1.0-13.1.3.1, under certain conditions tmm may leak memory when processing packet fragments, leading to resource starvation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.f5.com/csp/article/K39225055 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2808.
CVE ID: CVE-2009-2808 Date Updated: 2024-08-07T06:07:35.945Z Date Published: 2009-11-10T19:00:00 Description: Help Viewer in Apple Mac OS X before 10.6.2 does not use an HTTPS connection to retrieve Apple Help content from a web site, which allows man-in-the-middle attackers to send a crafted help:runscript link, and thereby execute arbitrary code, via a spoofed response. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/36956 - http://www.vupen.com/english/advisories/2009/3184 - http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html - http://support.apple.com/kb/HT3937 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12804.
CVE ID: CVE-2019-12804 Date Updated: 2024-08-04T23:32:55.511Z Date Published: 2019-07-10T19:38:09 Description: In Hunesion i-oneNet version 3.0.7 ~ 3.0.53 and 4.0.4 ~ 4.0.16, due to the lack of update file integrity checking in the upgrade process, an attacker can craft malicious file and use it as an update. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35073 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23752.
CVE ID: CVE-2023-23752 Date Updated: 2024-08-04T08:42:59.915Z Date Published: 2023-02-16T16:25:21.003Z Description: An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9143.
CVE ID: CVE-2020-9143 Date Updated: 2024-08-04T10:19:20.087Z Date Published: 2021-01-13T21:52:21 Description: There is a missing authentication vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability may lead to low-sensitive information exposure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2020/12/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21828.
CVE ID: CVE-2024-21828 Date Updated: 2024-08-01T22:27:36.309Z Date Published: 2024-05-16T20:47:04.497Z Description: Improper access control in some Intel(R) Ethernet Controller Administrative Tools software before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01056.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38487.
CVE ID: CVE-2023-38487 Date Updated: 2024-10-03T18:17:39.633Z Date Published: 2023-08-04T15:40:16.370Z Description: HedgeDoc is software for creating real-time collaborative markdown notes. Prior to version 1.9.9, the API of HedgeDoc 1 can be used to create notes with an alias matching the ID of existing notes. The affected existing note can then not be accessed anymore and is effectively hidden by the new one. When the freeURL feature is enabled (by setting the `allowFreeURL` config option or the `CMD_ALLOW_FREEURL` environment variable to `true`), any user with the appropriate permissions can create a note by making a POST request to the `/new/<ALIAS>` API endpoint. The `<ALIAS>` parameter can be set to the ID of an existing note. HedgeDoc did not verify whether the provided `<ALIAS>` value corresponds to a valid ID of an existing note and always allowed creation of the new note. When a visitor tried to access the existing note, HedgeDoc will first search for a note with a matching alias before it searches using the ID, therefore only the new note can be accessed. Depending on the permission settings of the HedgeDoc instance, the issue can be exploited only by logged-in users or by all (including non-logged-in) users. The exploit requires knowledge of the ID of the target note. Attackers could use this issue to present a manipulated copy of the original note to the user, e.g. by replacing the links with malicious ones. Attackers can also use this issue to prevent access to the original note, causing a denial of service. No data is lost, as the original content of the affected notes is still present in the database. This issue was fixed in version 1.9.9. As a workaround, disabling freeURL mode prevents the exploitation of this issue. The impact can be limited by restricting freeURL note creation to trusted, logged-in users by enabling `requireFreeURLAuthentication`/`CMD_REQUIRE_FREEURL_AUTHENTICATION`. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg - https://github.com/hedgedoc/hedgedoc/pull/4476/commits/781263ab84255885e1fe60c7e92e2f8d611664d2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20700.
CVE ID: CVE-2023-20700 Date Updated: 2024-08-02T09:14:40.156Z Date Published: 2023-05-15T00:00:00 Description: In widevine, there is a possible out of bounds write due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07643304; Issue ID: ALPS07643304. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/May-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2019-3704
CVE-CVE-2019-3704 is a vulnerability in VNX Control Station in Dell EMC VNX2 OE for File. It is related to the MITRE ATT&CK technique T1078: Valid Accounts. The vulnerability is classified as a exploitation_technique type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2019 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2020-9389.
CVE ID: CVE-2020-9389 Date Updated: 2024-08-04T10:26:16.189Z Date Published: 2021-02-03T19:03:47 Description: A username enumeration issue was discovered in SquaredUp before version 4.6.0. The login functionality was implemented in a way that would enable a malicious user to guess valid username due to a different response time from invalid usernames. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.squaredup.com/hc/en-us/articles/360017255858 - https://support.squaredup.com/hc/en-us/articles/360019427238-CVE-2020-9389-Username-enumeration-possible-via-a-timing-attack No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28095.
CVE ID: CVE-2023-28095 Date Updated: 2024-08-02T12:30:24.089Z Date Published: 2023-03-15T21:43:10.408Z Description: OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Versions prior to 3.1.7 and 3.2.4 have a potential issue in `msg_translator.c:2628` which might lead to a server crash. This issue was found while fuzzing the function `build_res_buf_from_sip_req` but could not be reproduced against a running instance of OpenSIPS. This issue could not be exploited against a running instance of OpenSIPS since no public function was found to make use of this vulnerable code. Even in the case of exploitation through unknown vectors, it is highly unlikely that this issue would lead to anything other than Denial of Service. This issue has been fixed in versions 3.1.7 and 3.2.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/OpenSIPS/opensips/security/advisories/GHSA-7pf3-24qg-8v9h - https://github.com/OpenSIPS/opensips/commit/9cf3dd3398719dd91207495f76d7726701c5145c - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17607.
CVE ID: CVE-2017-17607 Date Updated: 2024-08-05T20:59:16.339Z Date Published: 2017-12-13T09:00:00 Description: CMS Auditor Website 1.0 has SQL Injection via the PATH_INFO to /news-detail. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://packetstormsecurity.com/files/145293/CMS-Auditor-Website-1.0-SQL-Injection.html - https://www.exploit-db.com/exploits/43272/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20612.
CVE ID: CVE-2019-20612 Date Updated: 2024-08-05T02:46:09.983Z Date Published: 2020-03-24T19:27:49 Description: An issue was discovered on Samsung mobile devices with N(7.x) and O(8.x) (Broadcom Wi-Fi, and SEC Wi-Fi chipsets) software. Wi-Fi allows a denial of service via TCP SYN packets. The Samsung ID is SVE-2018-13162 (March 2019). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4665.
CVE ID: CVE-2010-4665 Date Updated: 2024-08-07T03:51:17.957Z Date Published: 2011-05-03T20:00:00 Description: Integer overflow in the ReadDirectory function in tiffdump.c in tiffdump in LibTIFF before 3.9.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF file containing a directory data structure with many directory entries. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://openwall.com/lists/oss-security/2011/04/12/10 - http://secunia.com/advisories/44271 - http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html - http://bugzilla.maptools.org/show_bug.cgi?id=2218 - http://www.debian.org/security/2012/dsa-2552 - https://bugzilla.redhat.com/show_bug.cgi?id=695887 - http://security.gentoo.org/glsa/glsa-201209-02.xml - http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058478.html - http://www.remotesensing.org/libtiff/v3.9.5.html - http://ubuntu.com/usn/usn-1416-1 - http://www.securityfocus.com/bid/47338 - http://secunia.com/advisories/50726 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-16153.
CVE ID: CVE-2018-16153 Date Updated: 2024-08-05T10:17:38.300Z Date Published: 2023-12-12T00:00:00 Description: An issue was discovered in Apereo Opencast 4.x through 10.x before 10.6. It sends system digest credentials during authentication attempts to arbitrary external services in some situations. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.apereo.org/projects/opencast/news - https://github.com/advisories/GHSA-hcxx-mp6g-6gr9 - https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51 - https://docs.opencast.org/r/10.x/admin/#changelog No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5656.
CVE ID: CVE-2023-5656 Date Updated: 2024-01-23T22:32:20.323Z Date Published: 2023-10-20T07:29:25.188Z Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2689.
CVE ID: CVE-2016-2689 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-3493.
CVE ID: CVE-2019-3493 Date Updated: 2024-08-04T19:12:09.509Z Date Published: 2019-04-29T15:47:08 Description: A potential security vulnerability has been identified in Micro Focus Network Automation Software 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11, and Micro Focus Network Operations Management (NOM) all versions. The vulnerability could be remotely exploited to Remote Code Execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://softwaresupport.softwaregrp.com/doc/KM03407763 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-0810.
CVE ID: CVE-2012-0810 Date Updated: 2024-08-06T18:38:14.519Z Date Published: 2020-02-12T13:14:32 Description: The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=794557 - https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git/commit/?id=e5d4e1c3ccee18c68f23d62ba77bda26e893d4f0 - https://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git/commit/?id=bcf6b1d78c0bde228929c388978ed3af9a623463 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2975.
CVE ID: CVE-2016-2975 Date Updated: 2024-09-17T00:50:57.825Z Date Published: 2017-08-29T21:00:00Z Description: IBM Sametime 8.5.2 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 113935. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=swg22006441 - https://exchange.xforce.ibmcloud.com/vulnerabilities/113935 - http://www.securityfocus.com/bid/100572 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8571.
CVE ID: CVE-2020-8571 Date Updated: 2024-08-04T10:03:46.377Z Date Published: 2020-03-13T15:10:08 Description: StorageGRID (formerly StorageGRID Webscale) versions 10.0.0 through 11.3 prior to 11.2.0.8 and 11.3.0.4 are susceptible to a vulnerability which allows an unauthenticated remote attacker to cause a Denial of Service (DoS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.netapp.com/advisory/ntap-20200313-0005/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28770.
CVE ID: CVE-2022-28770 Date Updated: 2024-08-03T06:03:52.600Z Date Published: 2022-04-12T16:11:28 Description: Due to insufficient input validation, SAPUI5 library(vbm) - versions 750, 753, 754, 755, 75, allows an unauthenticated attacker to inject a script into the URL and execute code. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - https://launchpad.support.sap.com/#/notes/3126557 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-5016.
CVE ID: CVE-2009-5016 Date Updated: 2024-08-07T07:24:54.057Z Date Published: 2010-11-12T21:00:00 Description: Integer overflow in the xml_utf8_decode function in ext/xml/xml.c in PHP before 5.2.11 makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string that uses overlong UTF-8 encoding, a different vulnerability than CVE-2010-3870. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2011/0077 - http://www.securityfocus.com/bid/44889 - http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html - http://secunia.com/advisories/42812 - http://www.redhat.com/support/errata/RHSA-2011-0195.html - http://bugs.php.net/bug.php?id=49687 - http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf - http://www.ubuntu.com/usn/USN-1042-1 - http://www.redhat.com/support/errata/RHSA-2010-0919.html - http://www.vupen.com/english/advisories/2011/0021 - http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html - http://secunia.com/advisories/42410 - http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html - http://www.vupen.com/english/advisories/2011/0020 - http://www.vupen.com/english/advisories/2010/3081 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-40658.
CVE ID: CVE-2021-40658 Date Updated: 2024-08-04T02:51:06.384Z Date Published: 2022-06-14T10:53:12 Description: Textpattern 4.8.7 is affected by a HTML injection vulnerability through “Content>Write>Body”. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tanmay26.medium.com/textpattern-4-8-7-is-affected-by-html-injection-in-the-body-parameter-1a7be2441b70 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40333.
CVE ID: CVE-2023-40333 Date Updated: 2024-09-23T12:50:16.175Z Date Published: 2023-09-27T11:25:35.617Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Qode Interactive Bridge Core plugin <= 3.0.9 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/bridge-core/wordpress-bridge-core-plugin-3-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22425.
CVE ID: CVE-2022-22425 Date Updated: 2024-08-03T03:14:54.968Z Date Published: 2022-11-03T00:00:00 Description: "IBM InfoSphere Information Server 11.7 is potentially vulnerable to CSV Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 223598." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6829953 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2020-15094
CVE-CVE-2020-15094 is a vulnerability in symfony. It is related to the MITRE ATT&CK technique T1040: Network Sniffing. The vulnerability is classified as a exploitation_technique type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2011-2218.
CVE ID: CVE-2011-2218 Date Updated: 2024-09-16T16:37:46.534Z Date Published: 2011-10-08T01:00:00Z Description: Unspecified vulnerability in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before HP3 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors, a different vulnerability than CVE-2011-2219. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.novell.com/show_bug.cgi?id=582471 - http://www.novell.com/support/viewContent.do?externalId=7006378 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20073.
CVE ID: CVE-2021-20073 Date Updated: 2024-08-03T17:30:07.437Z Date Published: 2021-02-16T19:43:13 Description: Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows for cross-site request forgeries. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2021-04 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43136.
CVE ID: CVE-2021-43136 Date Updated: 2024-08-04T03:47:13.599Z Date Published: 2021-11-10T11:09:18 Description: An authentication bypass issue in FormaLMS <= 2.4.4 allows an attacker to bypass the authentication mechanism and obtain a valid access to the platform. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.hacktivesecurity.com - https://formalms.org - https://blog.hacktivesecurity.com/index.php/2021/10/05/cve-2021-43136-formalms-the-evil-default-value-that-leads-to-authentication-bypass/ - http://packetstormsecurity.com/files/164930/FormaLMS-2.4.4-Authentication-Bypass.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-22357.
CVE ID: CVE-2024-22357 Date Updated: 2024-08-09T15:18:06.282Z Date Published: 2024-04-12T02:28:22.476Z Description: IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 280894. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7148010 - https://exchange.xforce.ibmcloud.com/vulnerabilities/280894 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3903.
CVE ID: CVE-2018-3903 Date Updated: 2024-09-17T01:02:01.708Z Date Published: 2018-08-23T15:00:00Z Description: On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17, the video-core process incorrectly extracts fields from a user-controlled JSON payload, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability. The memcpy call overflows the destination buffer, which has a size of 512 bytes. An attacker can send an arbitrarily long "url" value in order to overwrite the saved-PC with 0x42424242. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0574 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-31014.
CVE ID: CVE-2023-31014 Date Updated: 2024-09-24T18:08:55.964Z Date Published: 2023-09-20T01:13:46.226Z Description: NVIDIA GeForce Now for Android contains a vulnerability in the game launcher component, where a malicious application on the same device can process the implicit intent meant for the streamer component. A successful exploit of this vulnerability may lead to limited information disclosure, denial of service, and code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nvidia.custhelp.com/app/answers/detail/a_id/5476 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3252.
CVE ID: CVE-2016-3252 Date Updated: 2024-08-05T23:47:59.127Z Date Published: 2016-07-13T01:00:00 Description: The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-3249, CVE-2016-3254, and CVE-2016-3286. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/91614 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-090 - http://www.securitytracker.com/id/1036288 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-3797.
CVE ID: CVE-2019-3797 Date Updated: 2024-09-16T17:33:03.727Z Date Published: 2019-05-06T15:21:37.081031Z Description: This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ‘startingWith’, ‘endingWith’ or ‘containing’ could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pivotal.io/security/cve-2019-3797 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0583.
CVE ID: CVE-2019-0583 Date Updated: 2024-08-04T17:51:26.921Z Date Published: 2019-01-08T21:00:00 Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0584. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/106435 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0583 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11486.
CVE ID: CVE-2018-11486 Date Updated: 2024-08-05T08:10:14.709Z Date Published: 2018-06-01T15:00:00 Description: An issue was discovered in the MULTIDOTS Advance Search for WooCommerce plugin 1.0.9 and earlier for WordPress. This plugin is vulnerable to a stored Cross-site scripting (XSS) vulnerability. A non-authenticated user can save the plugin settings and inject malicious JavaScript code in the Custom CSS textarea field, which will be loaded on every site page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://labs.threatpress.com/stored-cross-site-scripting-xss-in-advance-search-for-woocommerce-plugin/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34795.
CVE ID: CVE-2023-34795 Date Updated: 2024-08-02T16:17:04.169Z Date Published: 2023-06-16T00:00:00 Description: xlsxio v0.1.2 to v0.2.34 was discovered to contain a free of uninitialized pointer in the xlsxioread_sheetlist_close() function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted XLSX file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/brechtsanders/xlsxio/issues/121 - https://github.com/brechtsanders/xlsxio/commit/d653f1604b54532f11b45dca1fa164b4a1f15e2d - https://github.com/xf1les/cve-advisories/blob/main/2023/CVE-2023-34795.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-3616.
CVE ID: CVE-2021-3616 Date Updated: 2024-08-03T17:01:07.695Z Date Published: 2021-08-17T16:25:27 Description: A vulnerability was reported in Lenovo Smart Camera X3, X5, and C2E that could allow an unauthorized user to view device information, alter firmware content and device configuration. This vulnerability is the same as CNVD-2020-68651. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://iknow.lenovo.com.cn/detail/dc_198417.html - https://www.cnvd.org.cn/flaw/show/CNVD-2020-68651 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3869.
CVE ID: CVE-2008-3869 Date Updated: 2024-08-07T09:53:00.423Z Date Published: 2009-05-26T21:00:00 Description: Heap-based buffer overflow in sadmind in Sun Solaris 8 and 9 allows remote attackers to execute arbitrary code via a crafted RPC request, related to improper decoding of request parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32473 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5347 - http://www.vupen.com/english/advisories/2009/1409 - http://www.securitytracker.com/id?1022275 - http://support.avaya.com/elmodocs2/security/ASA-2009-195.htm - http://www.osvdb.org/54663 - http://sunsolve.sun.com/search/document.do?assetkey=1-21-116455-02-1 - http://www.securityfocus.com/archive/1/503771/100/0/threaded - http://secunia.com/advisories/35191 - http://secunia.com/secunia_research/2008-45/ - http://sunsolve.sun.com/search/document.do?assetkey=1-66-259468-1 - http://www.securityfocus.com/bid/35083 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-10055.
CVE ID: CVE-2015-10055 Date Updated: 2024-08-06T08:58:25.303Z Date Published: 2023-01-16T17:58:05.323Z Description: A vulnerability was found in PictureThisWebServer and classified as critical. This issue affects the function router.post of the file routes/user.js. The manipulation of the argument username/password leads to sql injection. The patch is named 68b9dc346e88b494df00d88c7d058e96820e1479. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218399. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.218399 - https://vuldb.com/?ctiid.218399 - https://github.com/jan-rodriguez/PictureThisWebServer/pull/1 - https://github.com/jan-rodriguez/PictureThisWebServer/commit/68b9dc346e88b494df00d88c7d058e96820e1479 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6071.
CVE ID: CVE-2024-6071 Date Updated: 2024-08-01T21:25:03.240Z Date Published: 2024-06-27T23:05:03.183Z Description: PTC Creo Elements/Direct License Server exposes a web interface which can be used by unauthenticated remote attackers to execute arbitrary OS commands on the server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/news-events/ics-advisories/icsa-24-177-02 - https://www.ptc.com/en/support/article/CS417607 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-47504.
CVE ID: CVE-2023-47504 Date Updated: 2024-08-02T21:09:37.352Z Date Published: 2024-04-24T15:49:48.943Z Description: Improper Authentication vulnerability in Elementor Elementor Website Builder allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Elementor Website Builder: from n/a through 3.16.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/elementor/wordpress-elementor-plugin-3-16-4-contributor-arbitrary-attachment-read-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27673.
CVE ID: CVE-2021-27673 Date Updated: 2024-08-03T21:26:10.804Z Date Published: 2021-04-15T13:51:40 Description: Cross Site Scripting (XSS) in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to execute arbitrary code by injecting arbitrary HTML into the "cID" parameter when creating a new HTML component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://deadsh0t.medium.com/blind-error-based-authenticated-sql-injection-on-zenario-8-8-52729-cms-d4705534df38 - http://packetstormsecurity.com/files/163083/Zenario-CMS-8.8.52729-SQL-Injection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0324.
CVE ID: CVE-2008-0324 Date Updated: 2024-08-07T07:39:34.986Z Date Published: 2008-01-17T02:00:00 Description: Cisco Systems VPN Client IPSec Driver (CVPNDRVA.sys) 5.0.02.0090 allows local users to cause a denial of service (crash) by calling the 0x80002038 IOCTL with a small size value, which triggers memory corruption. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/39694 - http://www.vupen.com/english/advisories/2008/0170 - http://www.securitytracker.com/id?1019240 - http://secunia.com/advisories/28472 - https://www.exploit-db.com/exploits/4911 - http://www.securityfocus.com/bid/27289 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10294.
CVE ID: CVE-2019-10294 Date Updated: 2024-08-04T22:17:19.843Z Date Published: 2019-04-04T15:38:50 Description: Jenkins Kmap Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/107790 - http://www.openwall.com/lists/oss-security/2019/04/12/2 - https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1056 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0813.
CVE ID: CVE-2008-0813 Date Updated: 2024-08-07T08:01:39.012Z Date Published: 2008-02-19T01:00:00 Description: Directory traversal vulnerability in Download.php in XPWeb 3.0.1, 3.3.2, and possibly other versions, allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2008/0584 - https://www.exploit-db.com/exploits/5137 - http://www.securityfocus.com/bid/27838 - http://secunia.com/advisories/29006 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27638.
CVE ID: CVE-2020-27638 Date Updated: 2024-08-04T16:18:45.492Z Date Published: 2020-10-22T12:27:04 Description: receive.c in fastd before v21 allows denial of service (assertion failure) when receiving packets with an invalid type code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fastd.readthedocs.io/en/stable/releases/v21.html - https://github.com/NeoRaider/fastd/commit/737925113363b6130879729cdff9ccc46c33eaea - https://bugs.debian.org/972521 - https://lists.debian.org/debian-lts-announce/2020/10/msg00025.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GUZ3AGTAXH7OOP45F5WXBVRQ3IDWUR7M/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WSMH65GHKHMJAK2VMPROIPIUS4IA63CW/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2LNSF2LI4RQ7BVGHTJQUJWP7RVGHDTK/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-48204.
CVE ID: CVE-2023-48204 Date Updated: 2024-08-29T15:23:03.793Z Date Published: 2023-11-15T00:00:00 Description: An issue in PublicCMS v.4.0.202302.e allows a remote attacker to obtain sensitive information via the appToken and Parameters parameter of the api/method/getHtml component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/sanluan/PublicCMS/issues/77 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-9281.
CVE ID: CVE-2017-9281 Date Updated: 2024-08-05T17:02:44.160Z Date Published: 2017-09-21T21:00:00 Description: An integer overflow (CWE-190) potentially causing an out-of-bounds read (CWE-125) vulnerability in Micro Focus VisiBroker 8.5 can lead to a denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://community.microfocus.com/microfocus/corba/visibroker_-_world_class_middleware/w/knowledge_base/29171/visibroker-8-5-service-pack-4-hotfix-3-security-fixes No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5189.
CVE ID: CVE-2017-5189 Date Updated: 2024-09-17T03:59:02.559Z Date Published: 2018-03-02T20:00:00Z Description: NetIQ iManager before 3.0.3 delivered a SSL private key in a Java application (JAR file) for authentication to Sentinel, allowing attackers to extract and establish their own connections to the Sentinel appliance. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.suse.com/show_bug.cgi?id=1021637 - https://www.netiq.com/support/kb/doc.php?id=7016795 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12568.
CVE ID: CVE-2019-12568 Date Updated: 2024-08-04T23:24:38.898Z Date Published: 2019-12-23T22:45:54 Description: Stack-based overflow vulnerability in the logMess function in Open TFTP Server SP 1.66 and earlier allows remote attackers to perform a denial of service or execute arbitrary code via a long TFTP error packet, a different vulnerability than CVE-2018-10387 and CVE-2019-12567. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sourceforge.net/p/tftp-server/discussion/550564/thread/a586ce62/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-10929.
CVE ID: CVE-2020-10929 Date Updated: 2024-08-04T11:21:12.968Z Date Published: 2020-07-28T17:10:38 Description: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of string table file uploads. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the admin user. Was ZDI-CAN-9768. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-20-709/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2341.
CVE ID: CVE-2014-2341 Date Updated: 2024-08-06T10:14:25.083Z Date Published: 2014-04-21T14:00:00 Description: Session fixation vulnerability in CubeCart before 5.2.9 allows remote attackers to hijack web sessions via the PHPSESSID parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/57856 - http://www.securityfocus.com/bid/66805 - http://forums.cubecart.com/topic/48427-cubecart-529-relased/ - http://www.osvdb.org/105784 - http://www.securitytracker.com/id/1030086 - http://www.exploit-db.com/exploits/32830 - https://exchange.xforce.ibmcloud.com/vulnerabilities/92526 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-18229.
CVE ID: CVE-2020-18229 Date Updated: 2024-08-04T14:00:49.133Z Date Published: 2021-05-27T15:20:24 Description: Cross Site Scripting (XSS) in PHPMyWind v5.5 allows remote attackers to execute arbitrary code by injecting scripts into the parameter "$cfg_copyright" of component " /admin/web_config.php". No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/PearlyNautilus/Security-Code-Review/issues/4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6800.
CVE ID: CVE-2017-6800 Date Updated: 2024-08-05T15:41:17.516Z Date Published: 2017-03-10T10:29:00 Description: An issue was discovered in ytnef before 1.9.2. An invalid memory access (heap-based buffer over-read) can occur during handling of LONG data types, related to MAPIPrint() in libytnef. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Yeraze/ytnef/issues/28 - http://www.debian.org/security/2017/dsa-3846 - https://github.com/Yeraze/ytnef/commit/f98f5d4adc1c4bd4033638f6167c1bb95d642f89 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LFJWMUEUC4ILH2HEOCYVVLQT654ZMCGQ/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-7089.
CVE ID: CVE-2008-7089 Date Updated: 2024-08-07T11:56:14.098Z Date Published: 2009-08-26T14:00:00 Description: Cross-site scripting (XSS) vulnerability in Pligg 9.9 and earlier allows remote attackers to inject arbitrary web script or HTML via the keyword parameter in a search action to user.php and other unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.gulftech.org/?node=research&article_id=00120-07312008 - https://exchange.xforce.ibmcloud.com/vulnerabilities/44187 - http://www.securityfocus.com/archive/1/494987/100/0/threaded - http://www.securityfocus.com/bid/30458 - http://www.osvdb.org/50186 - https://www.exploit-db.com/exploits/6173 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5626.
CVE ID: CVE-2015-5626 Date Updated: 2024-08-06T06:59:02.787Z Date Published: 2020-02-05T18:46:05 Description: Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-15-253-01 - http://www.yokogawa.com/dcs/security/ysar/YSAR-15-0003E.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3161.
CVE ID: CVE-2009-3161 Date Updated: 2024-08-07T06:14:56.482Z Date Published: 2009-09-10T18:00:00 Description: The server in IBM WebSphere MQ 7.0.0.1, 7.0.0.2, and 7.0.1.0 allows attackers to cause a denial of service (trap) or possibly have unspecified other impact via malformed data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2009/2578 - http://www-01.ibm.com/support/docview.wss?uid=swg24024153 - http://www.securityfocus.com/bid/36310 - http://www-1.ibm.com/support/docview.wss?uid=swg1IC62164 - http://secunia.com/advisories/36647 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2764.
CVE ID: CVE-2008-2764 Date Updated: 2024-08-07T09:14:14.951Z Date Published: 2008-06-18T22:00:00 Description: Cross-site scripting (XSS) vulnerability in admin/search.asp in Xigla Absolute Live Support XE 5.1 allows remote authenticated administrators to inject arbitrary web script or HTML via unspecified vectors ("all fields"). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://bugreport.ir/index.php?/41 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43049 - http://www.securityfocus.com/bid/29672 - http://marc.info/?l=bugtraq&m=121322052622903&w=2 - http://securityreason.com/securityalert/3950 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23134.
CVE ID: CVE-2024-23134 Date Updated: 2024-08-01T22:59:31.292Z Date Published: 2024-02-22T04:27:15.155Z Description: A maliciously crafted IGS file in tbb.dll when parsed through Autodesk AutoCAD can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 - https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 - https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-13289.
CVE ID: CVE-2017-13289 Date Updated: 2024-09-16T22:45:22.814Z Date Published: 2018-04-04T16:00:00Z Description: In writeToParcel and createFromParcel of RttManager.java, there is a permission bypass due to a write size mismatch. This could lead to a local escalation of privileges where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-70398564. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2018-04-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-22669.
CVE ID: CVE-2020-22669 Date Updated: 2024-08-04T14:51:10.946Z Date Published: 2022-09-02T00:00:00 Description: Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability. Attackers can use the comment characters and variable assignments in the SQL syntax to bypass Modsecurity WAF protection and implement SQL injection attacks on Web applications. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1727 - https://github.com/coreruleset/coreruleset/pull/1793 - https://lists.debian.org/debian-lts-announce/2023/01/msg00033.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1013.
CVE ID: CVE-2020-1013 Date Updated: 2024-08-04T06:25:00.644Z Date Published: 2020-09-11T17:08:51 Description: <p>An elevation of privilege vulnerability exists when Microsoft Windows processes group policy updates. An attacker who successfully exploited this vulnerability could potentially escalate permissions or perform additional privileged actions on the target machine.</p> <p>To exploit this vulnerability, an attacker would need to launch a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and the target machine. An attacker could then create a group policy to grant administrator rights to a standard user.</p> <p>The security update addresses the vulnerability by enforcing Kerberos authentication for certain calls over LDAP.</p> No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1013 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42841.
CVE ID: CVE-2021-42841 Date Updated: 2024-08-04T03:38:50.162Z Date Published: 2022-01-06T20:04:34 Description: Insta HMS before 12.4.10 is vulnerable to XSS because of improper validation of user-supplied input by multiple scripts. A remote attacker could exploit this vulnerability via a crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/210416 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22964.
CVE ID: CVE-2021-22964 Date Updated: 2024-08-03T18:58:26.128Z Date Published: 2021-10-14T14:50:07 Description: A redirect vulnerability in the `fastify-static` module version >= 4.2.4 and < 4.4.1 allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e`.A DOS vulnerability is possible if the URL contains invalid characters `curl --path-as-is "http://localhost:3000//^/.."`The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/1361804 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15577.
CVE ID: CVE-2017-15577 Date Updated: 2024-08-05T19:57:27.038Z Date Published: 2017-10-18T02:00:00 Description: Redmine before 3.2.6 and 3.3.x before 3.3.3 mishandles the rendering of wiki links, which allows remote attackers to obtain sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.redmine.org/projects/redmine/wiki/Security_Advisories - https://www.debian.org/security/2018/dsa-4191 - https://www.redmine.org/issues/23793 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2957.
CVE ID: CVE-2018-2957 Date Updated: 2024-10-02T20:14:09.876Z Date Published: 2018-07-18T13:00:00 Description: Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: Logging). The supported version that is affected is 5.5.x. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - http://www.securityfocus.com/bid/104809 - http://www.securitytracker.com/id/1041300 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26734.
CVE ID: CVE-2022-26734 Date Updated: 2023-05-08T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2924.
CVE ID: CVE-2015-2924 Date Updated: 2024-08-06T05:32:20.672Z Date Published: 2015-11-16T21:00:00 Description: The receive_ra function in rdisc/nm-lndp-rdisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in NetworkManager 1.x allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message, a similar issue to CVE-2015-2922. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://openwall.com/lists/oss-security/2015/04/04/2 - https://security.gentoo.org/glsa/201509-05 - http://www.securityfocus.com/bid/76879 - http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158103.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157803.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7508.
CVE ID: CVE-2017-7508 Date Updated: 2024-08-05T16:04:11.917Z Date Published: 2017-06-27T13:00:00 Description: OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 - http://www.securitytracker.com/id/1038768 - http://www.securityfocus.com/bid/99230 - http://www.debian.org/security/2017/dsa-3900 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-40996.
CVE ID: CVE-2021-40996 Date Updated: 2024-08-04T02:59:31.207Z Date Published: 2021-10-15T14:05:13 Description: A remote authentication bypass vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0780.
CVE ID: CVE-2024-0780 Date Updated: 2024-08-28T15:36:07.595Z Date Published: 2024-03-18T19:05:41.368Z Description: The Enjoy Social Feed plugin for WordPress website WordPress plugin through 6.2.2 does not have authorisation when resetting its database, allowing any authenticated users, such as subscriber to perform such action No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/be3045b1-72e6-450a-8dd2-4702a9328447/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1710.
CVE ID: CVE-2015-1710 Date Updated: 2024-08-06T04:54:15.275Z Date Published: 2015-05-13T10:00:00 Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1694. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1032282 - http://www.securityfocus.com/bid/74513 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1312.
CVE ID: CVE-2009-1312 Date Updated: 2024-08-07T05:04:49.647Z Date Published: 2009-04-22T18:00:00 Description: Mozilla Firefox before 3.0.9 and SeaMonkey 1.1.17 do not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header. NOTE: it was later reported that Firefox 3.6 a1 pre and Mozilla 1.7.x and earlier are also affected. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mandriva.com/security/advisories?name=MDVSA-2009:111 - https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00683.html - http://secunia.com/advisories/34894 - http://www.vupen.com/english/advisories/2009/1125 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9818 - http://secunia.com/advisories/34758 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6131 - http://www.mozilla.org/security/announce/2009/mfsa2009-22.html - http://websecurity.com.ua/3386/ - http://www.securitytracker.com/id?1022096 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6064 - http://secunia.com/advisories/34844 - http://ha.ckers.org/blog/20070309/firefox-header-redirection-javascript-execution/ - https://bugzilla.mozilla.org/show_bug.cgi?id=475636 - http://websecurity.com.ua/3275/ - http://secunia.com/advisories/35065 - http://www.securityfocus.com/archive/1/504723/100/0/threaded - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6731 - https://usn.ubuntu.com/764-1/ - http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html - http://www.securityfocus.com/bid/34656 - http://www.securityfocus.com/archive/1/504718/100/0/threaded - http://secunia.com/advisories/34843 - http://rhn.redhat.com/errata/RHSA-2009-0437.html - http://www.redhat.com/support/errata/RHSA-2009-0436.html - http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4430.
CVE ID: CVE-2019-4430 Date Updated: 2024-09-17T03:02:02.249Z Date Published: 2019-07-17T14:05:21.048749Z Description: IBM Maximo Asset Management 7.6 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 162887. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/docview.wss?uid=ibm10959173 - https://exchange.xforce.ibmcloud.com/vulnerabilities/162887 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29676.
CVE ID: CVE-2021-29676 Date Updated: 2024-09-17T02:47:53.688Z Date Published: 2021-06-25T17:40:28.694701Z Description: IBM Security Verify (IBM Security Verify Privilege Vault 10.9.66) is vulnerable to link injection. By persuading a victim to click on a specially-crafted URL link, a remote attacker could exploit this vulnerability to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6467045 - https://exchange.xforce.ibmcloud.com/vulnerabilities/199575 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3984.
CVE ID: CVE-2022-3984 Date Updated: 2024-08-03T01:27:54.384Z Date Published: 2022-12-19T13:41:46.964Z Description: The Flowplayer Video Player WordPress plugin before 1.0.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/b4694e9d-3f38-4295-929d-0ad37b3cbbaa No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6507.
CVE ID: CVE-2015-6507 Date Updated: 2024-08-06T07:22:22.167Z Date Published: 2015-10-15T20:00:00 Description: The hdbsql client 1.00.091.00 Build 1418659308-1530 in SAP HANA allows local users to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors, aka SAP Security Note 2140700. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/133760/SAP-HANA-hdbsql-Memory-Corruption.html - http://seclists.org/fulldisclosure/2015/Sep/109 - https://www.onapsis.com/research/security-advisories/sap-hana-multiple-memory-corruption-vulnerabilities - https://www.onapsis.com/blog/analyzing-sap-security-notes-april-2015-edition No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20136.
CVE ID: CVE-2023-20136 Date Updated: 2024-08-02T08:57:36.064Z Date Published: 2023-06-28T00:00:00 Description: A vulnerability in the OpenAPI of Cisco Secure Workload could allow an authenticated, remote attacker with the privileges of a read-only user to execute operations that should require Administrator privileges. The attacker would need valid user credentials. This vulnerability is due to improper role-based access control (RBAC) of certain OpenAPI operations. An attacker could exploit this vulnerability by issuing a crafted OpenAPI function call with valid credentials. A successful exploit could allow the attacker to execute OpenAPI operations that are reserved for the Administrator user, including the creation and deletion of user labels. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csw-auth-openapi-kTndjdNX No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10062.
CVE ID: CVE-2017-10062 Date Updated: 2024-08-05T17:25:00.480Z Date Published: 2017-08-08T15:00:00 Description: Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Oracle Java Web Console). The supported version that is affected is 10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data as well as unauthorized read access to a subset of Solaris accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/99845 - http://www.securitytracker.com/id/1038938 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.