instruction stringlengths 49 63 ⌀ | input stringlengths 0 69 | output stringlengths 221 18.7k |
|---|---|---|
Provide information about the following MITRE ATT&CK technique: | T1078.002 : Domain Accounts | Name: Domain Accounts
ID: T1078.002
URL: https://attack.mitre.org/techniques/T1078/002
Platforms: Linux, macOS, Windows
Kill Chain Phases: Defense Evasion, Persistence, Privilege Escalation, Initial Access
Description: Adversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.(Citation: TechNet Credential Theft) Domain accounts are those managed by Active Directory Domain Services where access and permissions are configured across systems and services that are part of that domain. Domain accounts can cover users, administrators, and services.(Citation: Microsoft AD Accounts)
Adversaries may compromise domain accounts, some with a high level of privileges, through various means such as [OS Credential Dumping](T1003) or password reuse, allowing access to privileged resources of the domain.
Data Sources: User Account: User Account Authentication, Logon Session: Logon Session Creation, Logon Session: Logon Session Metadata
Detection: Configure robust, consistent account activity audit policies across the enterprise and with externally accessible services.(Citation: TechNet Audit Policy) Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultaneously; multiple accounts logged into the same machine simultaneously; accounts logged in at odd times or outside of business hours. Activity may be from interactive login sessions or process ownership from accounts being used to execute binaries on a remote system as a particular account. Correlate other security systems with login information (e.g., a user has an active login session but has not entered the building or does not have VPN access).
On Linux, check logs and other artifacts created by use of domain authentication services, such as the System Security Services Daemon (sssd).(Citation: Ubuntu SSSD Docs)
Perform regular audits of domain accounts to detect accounts that may have been created by an adversary for persistence. |
Provide detailed information about CVE-2020-26768. | CVE ID: CVE-2020-26768
Date Updated: 2024-08-04T16:03:22.593Z
Date Published: 2021-01-07T12:43:12
Description:
Formstone <=1.4.16 is vulnerable to a Reflected Cross-Site Scripting (XSS) vulnerability caused by improper validation of user supplied input in the upload-target.php and upload-chunked.php files. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim's Web browser within the security context of the hosting Web site once the URL is clicked or visited. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials, force malware execution, user redirection and others.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/Formstone/Formstone/issues/286
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-1435. | CVE ID: CVE-2024-1435
Date Updated: 2024-08-01T18:40:21.037Z
Date Published: 2024-02-29T05:03:10.181Z
Description:
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Tainacan.Org Tainacan.This issue affects Tainacan: from n/a through 0.20.6.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-20-6-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-16821. | CVE ID: CVE-2019-16821
Date Updated: 2022-12-02T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-34832. | CVE ID: CVE-2023-34832
Date Updated: 2024-08-02T16:17:04.259Z
Date Published: 2023-06-16T00:00:00
Description:
TP-Link Archer AX10(EU)_V1.2_230220 was discovered to contain a buffer overflow via the function FUN_131e8 - 0x132B4.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://tp-link.com
- http://archer.com
- https://gist.github.com/jhacker91/2026e080a42514255e758d64b465d1d5
- http://packetstormsecurity.com/files/172989/TP-Link-Archer-AX10-EU-_V1.2_230220-Buffer-Overflow.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-4000. | CVE ID: CVE-2015-4000
Date Updated: 2024-08-06T06:04:02.725Z
Date Published: 2015-05-21T00:00:00
Description:
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1243.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html
- http://www.securitytracker.com/id/1033208
- http://www.securitytracker.com/id/1032637
- http://marc.info/?l=bugtraq&m=144050121701297&w=2
- http://www.debian.org/security/2016/dsa-3688
- http://www.debian.org/security/2015/dsa-3287
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- http://www.securitytracker.com/id/1032865
- http://marc.info/?l=bugtraq&m=143557934009303&w=2
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://www.securitytracker.com/id/1034728
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html
- http://www.securitytracker.com/id/1032656
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://openwall.com/lists/oss-security/2015/05/20/8
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html
- http://marc.info/?l=bugtraq&m=143628304012255&w=2
- http://marc.info/?l=bugtraq&m=144060576831314&w=2
- http://www.securitytracker.com/id/1032475
- http://www.securitytracker.com/id/1032960
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html
- http://www.securitytracker.com/id/1032653
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html
- http://www.securitytracker.com/id/1033385
- https://security.gentoo.org/glsa/201512-10
- http://rhn.redhat.com/errata/RHSA-2015-1229.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html
- http://www.securitytracker.com/id/1032864
- http://www.securitytracker.com/id/1032910
- http://www.securitytracker.com/id/1032645
- http://www.ubuntu.com/usn/USN-2706-1
- https://security.gentoo.org/glsa/201701-46
- http://rhn.redhat.com/errata/RHSA-2015-1526.html
- http://www.securitytracker.com/id/1033760
- http://rhn.redhat.com/errata/RHSA-2015-1485.html
- http://rhn.redhat.com/errata/RHSA-2015-1197.html
- http://marc.info/?l=bugtraq&m=144104533800819&w=2
- http://www.securitytracker.com/id/1032699
- http://www.securitytracker.com/id/1032476
- http://www.securitytracker.com/id/1032649
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=143637549705650&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1544.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196
- http://www.securitytracker.com/id/1032688
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://www.securitytracker.com/id/1032652
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html
- http://rhn.redhat.com/errata/RHSA-2015-1185.html
- http://marc.info/?l=bugtraq&m=143558092609708&w=2
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html
- http://marc.info/?l=bugtraq&m=144069189622016&w=2
- http://www.securitytracker.com/id/1032648
- http://www.securitytracker.com/id/1032759
- http://rhn.redhat.com/errata/RHSA-2015-1228.html
- http://marc.info/?l=bugtraq&m=144060606031437&w=2
- http://www.debian.org/security/2015/dsa-3316
- http://www.securitytracker.com/id/1033209
- http://www.securitytracker.com/id/1032871
- http://www.debian.org/security/2015/dsa-3324
- http://www.securitytracker.com/id/1032655
- http://www.securitytracker.com/id/1033210
- http://marc.info/?l=bugtraq&m=144061542602287&w=2
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://marc.info/?l=bugtraq&m=145409266329539&w=2
- http://www.ubuntu.com/usn/USN-2673-1
- http://www.securitytracker.com/id/1034884
- http://marc.info/?l=bugtraq&m=143506486712441&w=2
- https://security.gentoo.org/glsa/201603-11
- http://www.securitytracker.com/id/1033064
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html
- http://www.securitytracker.com/id/1032778
- http://www.securitytracker.com/id/1032474
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- http://marc.info/?l=bugtraq&m=144102017024820&w=2
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html
- http://www.securitytracker.com/id/1032784
- http://www.securitytracker.com/id/1032777
- http://www.securitytracker.com/id/1033416
- http://www.securitytracker.com/id/1033991
- http://www.securitytracker.com/id/1032647
- http://www.securitytracker.com/id/1032654
- http://www.securitytracker.com/id/1033341
- http://rhn.redhat.com/errata/RHSA-2015-1486.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html
- http://www.securitytracker.com/id/1033433
- http://www.ubuntu.com/usn/USN-2696-1
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
- http://www.securitytracker.com/id/1032702
- http://www.debian.org/security/2015/dsa-3339
- http://www.securitytracker.com/id/1032727
- http://rhn.redhat.com/errata/RHSA-2015-1242.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html
- https://security.gentoo.org/glsa/201506-02
- http://www.securityfocus.com/bid/91787
- http://rhn.redhat.com/errata/RHSA-2016-1624.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
- http://rhn.redhat.com/errata/RHSA-2015-1488.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
- http://www.securitytracker.com/id/1033430
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2015-1241.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1230.html
- http://www.securityfocus.com/bid/74733
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html
- http://www.securitytracker.com/id/1032651
- http://www.securitytracker.com/id/1033065
- http://www.ubuntu.com/usn/USN-2656-1
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://www.securitytracker.com/id/1033222
- http://www.securitytracker.com/id/1036218
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html
- http://marc.info/?l=bugtraq&m=143655800220052&w=2
- http://www.securitytracker.com/id/1040630
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://www.securitytracker.com/id/1034087
- http://www.securitytracker.com/id/1033513
- http://www.securitytracker.com/id/1032884
- http://rhn.redhat.com/errata/RHSA-2015-1604.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html
- http://www.securitytracker.com/id/1032932
- http://www.securitytracker.com/id/1033891
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html
- http://www.securitytracker.com/id/1032783
- http://www.securitytracker.com/id/1032856
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://www.debian.org/security/2015/dsa-3300
- http://www.ubuntu.com/usn/USN-2656-2
- http://www.securitytracker.com/id/1033067
- http://www.securitytracker.com/id/1033019
- http://rhn.redhat.com/errata/RHSA-2015-1072.html
- http://www.securitytracker.com/id/1032650
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681
- http://www-01.ibm.com/support/docview.wss?uid=swg21962739
- https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- http://support.apple.com/kb/HT204941
- http://www-304.ibm.com/support/docview.wss?uid=swg21962816
- http://www-01.ibm.com/support/docview.wss?uid=swg21959812
- https://www-304.ibm.com/support/docview.wss?uid=swg21959745
- https://weakdh.org/imperfect-forward-secrecy.pdf
- http://www-304.ibm.com/support/docview.wss?uid=swg21959132
- https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/
- http://www-01.ibm.com/support/docview.wss?uid=swg21959539
- https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/
- http://www-01.ibm.com/support/docview.wss?uid=swg21959325
- https://openssl.org/news/secadv/20150611.txt
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
- http://www-304.ibm.com/support/docview.wss?uid=swg21967893
- http://www-304.ibm.com/support/docview.wss?uid=swg21958984
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21959517
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21959195
- http://www-01.ibm.com/support/docview.wss?uid=swg21961717
- http://www-304.ibm.com/support/docview.wss?uid=swg21960041
- http://www-304.ibm.com/support/docview.wss?uid=swg21960194
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes
- http://www-01.ibm.com/support/docview.wss?uid=swg21959453
- https://security.netapp.com/advisory/ntap-20150619-0001/
- http://www-01.ibm.com/support/docview.wss?uid=swg21959111
- http://www-304.ibm.com/support/docview.wss?uid=swg21960418
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
- https://www.suse.com/security/cve/CVE-2015-4000.html
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722
- http://support.citrix.com/article/CTX201114
- http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery
- http://www-304.ibm.com/support/docview.wss?uid=swg21960380
- http://support.apple.com/kb/HT204942
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083
- http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- http://www-01.ibm.com/support/docview.wss?uid=swg21959530
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21960191
- http://www-01.ibm.com/support/docview.wss?uid=swg21959636
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://puppet.com/security/cve/CVE-2015-4000
- http://www.mozilla.org/security/announce/2015/mfsa2015-70.html
- http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
- https://support.citrix.com/article/CTX216642
- https://weakdh.org/
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
- http://www-01.ibm.com/support/docview.wss?uid=swg21959481
- https://bto.bluecoat.com/security-advisory/sa98
- https://bugzilla.mozilla.org/show_bug.cgi?id=1138554
- http://www-01.ibm.com/support/docview.wss?uid=swg21962455
- https://www.openssl.org/news/secadv_20150611.txt
- http://www.fortiguard.com/advisory/2015-05-20-logjam-attack
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-11986. | CVE ID: CVE-2020-11986
Date Updated: 2024-08-04T11:48:57.611Z
Date Published: 2020-09-09T15:28:59
Description:
To be able to analyze gradle projects, the build scripts need to be executed. Apache NetBeans follows this pattern. This causes the code of the build script to be invoked at load time of the project. Apache NetBeans up to and including 12.0 did not request consent from the user for the analysis of the project at load time. This in turn will run potentially malicious code, from an external source, without the consent of the user.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.apache.org/thread.html/rbb8ea1b684e73107a0a6a30245ad6112bec2e6e171368c808e69217e%40%3Cannounce.netbeans.apache.org%3E
- https://lists.apache.org/thread.html/r0fb2ba21a0469f64c2dff945dbe68f7b1122e1bff2b2b46271682406%40%3Cnotifications.netbeans.apache.org%3E
- https://lists.apache.org/thread.html/ra81cdcf325bf4ea085c178f95ed6b50d4f1c095be50577b2f9b88984%40%3Cnotifications.netbeans.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-1010. | CVE ID: CVE-2010-1010
Date Updated: 2024-09-17T00:01:37.907Z
Date Published: 2010-03-19T18:35:00Z
Description:
SQL injection vulnerability in the MK Wastebasket (mk_wastebasket) extension 2.1.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/
- http://www.securityfocus.com/bid/38792
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-28525. | CVE ID: CVE-2023-28525
Date Updated: 2024-08-02T13:43:23.134Z
Date Published: 2024-03-01T01:41:48.557Z
Description:
IBM Engineering Requirements Management 9.7.2.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 251052.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/7124058
- https://exchange.xforce.ibmcloud.com/vulnerabilities/251052
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-1882. | CVE ID: CVE-2011-1882
Date Updated: 2024-08-06T22:46:00.826Z
Date Published: 2011-07-13T23:00:00
Description:
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Use After Free Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://osvdb.org/73782
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-054
- http://support.avaya.com/css/P8/documents/100144947
- http://www.us-cert.gov/cas/techalerts/TA11-193A.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12738
- http://secunia.com/advisories/45186
- http://www.securitytracker.com/id?1025761
- http://www.securityfocus.com/bid/48594
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-11861. | CVE ID: CVE-2020-11861
Date Updated: 2024-08-04T11:42:00.241Z
Date Published: 2020-09-18T20:07:34
Description:
Unauthorized escalation of local privileges vulnerability on Micro Focus Operation Agent, affecting all versions prior to versions 12.11. The vulnerability could be exploited to escalate the local privileges and gain root access on the system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://softwaresupport.softwaregrp.com/doc/KM03709900
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-0992. | CVE ID: CVE-2023-0992
Date Updated: 2024-08-02T05:32:46.035Z
Date Published: 2023-06-09T05:33:11.185Z
Description:
The Shield Security plugin for WordPress is vulnerable to stored Cross-Site Scripting in versions up to, and including, 17.0.17 via the 'User-Agent' header. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/162dff28-94ea-4a47-a6cb-a13317cf1a04?source=cve
- https://wordpress.org/plugins/wp-simple-firewall/#developers
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2883864%40wp-simple-firewall%2Ftrunk&old=2883536%40wp-simple-firewall%2Ftrunk&sfp_email=&sfph_mail=
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-20618. | CVE ID: CVE-2023-20618
Date Updated: 2024-08-02T09:05:45.857Z
Date Published: 2023-02-06T00:00:00
Description:
In vcu, there is a possible memory corruption due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519184; Issue ID: ALPS07519184.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://corp.mediatek.com/product-security-bulletin/February-2023
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-1309. | CVE ID: CVE-2020-1309
Date Updated: 2024-08-04T06:32:01.194Z
Date Published: 2020-06-09T19:44:03
Description:
An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Microsoft Store Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1222.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1309
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-11250. | CVE ID: CVE-2020-11250
Date Updated: 2024-08-04T11:28:13.827Z
Date Published: 2021-06-09T05:00:45
Description:
Use after free due to race condition when reopening the device driver repeatedly in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-40146. | CVE ID: CVE-2023-40146
Date Updated: 2024-08-22T18:03:10.122Z
Date Published: 2024-04-17T12:55:47.083Z
Description:
A privilege escalation vulnerability exists in the /bin/login functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted command line argument can lead to a limited-shell escape and elevated capabilities. An attacker can authenticate with hard-coded credentials and execute unblocked default busybox functionality to trigger this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1868
- https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-24314. | CVE ID: CVE-2022-24314
Date Updated: 2024-08-03T04:07:02.443Z
Date Published: 2022-02-09T22:05:00
Description:
A CWE-125: Out-of-bounds Read vulnerability exists that could cause memory leaks potentially resulting in denial of service when an attacker repeatedly sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-25150. | CVE ID: CVE-2022-25150
Date Updated: 2024-08-03T04:29:01.795Z
Date Published: 2022-02-14T18:50:01
Description:
In Malwarebytes Binisoft Windows Firewall Control before 6.8.1.0, programs executed from the Tools tab can be used to escalate privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://hackerone.com/bugs?report_id=1205932
- https://binisoft.org/changelog.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-4490. | CVE ID: CVE-2014-4490
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-1041. | CVE ID: CVE-2013-1041
Date Updated: 2024-08-06T14:49:20.534Z
Date Published: 2013-09-19T10:00:00
Description:
WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
- http://www.securitytracker.com/id/1029054
- http://support.apple.com/kb/HT6001
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00003.html
- http://secunia.com/advisories/54886
- http://support.apple.com/kb/HT5934
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-0165. | CVE ID: CVE-2016-0165
Date Updated: 2024-08-05T22:08:13.324Z
Date Published: 2016-04-12T23:00:00
Description:
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0143 and CVE-2016-0167.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1035529
- https://www.exploit-db.com/exploits/44480/
- http://www.securitytracker.com/id/1035532
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-039
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-41835. | CVE ID: CVE-2022-41835
Date Updated: 2024-09-16T21:08:00.681Z
Date Published: 2022-10-19T21:24:53.599766Z
Description:
In F5OS-A version 1.x before 1.1.0 and F5OS-C version 1.x before 1.5.0, excessive file permissions in F5OS allows an authenticated local attacker to execute limited set of commands in a container and impact the F5OS controller.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.f5.com/csp/article/K33484483
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-25267. | CVE ID: CVE-2022-25267
Date Updated: 2024-08-03T04:36:06.570Z
Date Published: 2022-03-23T22:06:24
Description:
Passwork On-Premise Edition before 4.6.13 allows migration/uploadExportFile Directory Traversal (to upload files).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://passwork.me
- https://gist.github.com/garakh/e0e2fe6d6e234f0595dea6a8141568f2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-22160. | CVE ID: CVE-2021-22160
Date Updated: 2024-08-03T18:37:18.090Z
Date Published: 2021-05-26T12:22:31
Description:
If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.apache.org/thread.html/r347650d15a3e9c5f58b83e918b6ad6dedc2a63d3eb63da8e6a7be87e%40%3Cusers.pulsar.apache.org%3E
- https://lists.apache.org/thread.html/rf2e90942996dceebac8296abf39257cfeb5ae918f82f7af3d37a48c5%40%3Cdev.pulsar.apache.org%3E
- https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550%40%3Cdev.pulsar.apache.org%3E
- https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550%40%3Cusers.pulsar.apache.org%3E
- https://lists.apache.org/thread.html/r8e545559781231a83bf0644548c660255859e52feb86bbfcd42590da%40%3Cdev.pulsar.apache.org%3E
- https://lists.apache.org/thread.html/r9a12b4da2f26ce9b8f7e7117a879efaa973dab7e54717bbc7923fab1%40%3Cdev.pulsar.apache.org%3E
- https://lists.apache.org/thread.html/rbe845aa1573a61769b9c5916c62971f4b10de87c2ea5f38a97f0cf84%40%3Cdev.pulsar.apache.org%3E
- https://lists.apache.org/thread.html/rca54f4b26ba5e6f2e39732b47ec51640e89f57e3b6a38ac3bab314df%40%3Cdev.pulsar.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-1160. | CVE ID: CVE-2017-1160
Date Updated: 2024-08-05T13:25:17.312Z
Date Published: 2017-04-17T21:00:00
Description:
IBM Financial Transaction Manager for ACH Services for Multi-Platform 3.0.0.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 122892.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/97666
- http://www.ibm.com/support/docview.wss?uid=swg22001574
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-17100. | CVE ID: CVE-2019-17100
Date Updated: 2024-09-17T03:17:55.533Z
Date Published: 2020-01-27T13:55:17.731390Z
Description:
An Untrusted Search Path vulnerability in bdserviceshost.exe as used in Bitdefender Total Security 2020 allows an attacker to execute arbitrary code. This issue does not affect: Bitdefender Total Security versions prior to 24.0.12.69.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.bitdefender.com/support/security-advisories/untrusted-search-path-vulnerability-bitdefender-total-security-2020-va-5895/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-2099. | CVE ID: CVE-2009-2099
Date Updated: 2024-08-07T05:36:21.005Z
Date Published: 2009-06-17T17:00:00
Description:
SQL injection vulnerability in the iJoomla RSS Feeder (com_ijoomla_rss) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in an xml action to index.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/35379
- https://www.exploit-db.com/exploits/8959
- http://osvdb.org/55113
- http://secunia.com/advisories/35454
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-6297. | CVE ID: CVE-2012-6297
Date Updated: 2024-08-06T21:28:39.621Z
Date Published: 2020-02-06T17:01:25
Description:
Command Injection vulnerability exists via a CSRF in DD-WRT 24-sp2 from specially crafted configuration values containing shell meta-characters, which could let a remote malicious user cause a Denial of Service.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://packetstormsecurity.com/files/cve/CVE-2012-6297
- https://vuldb.com/?id.9527
- https://seclists.org/fulldisclosure/2013/Oct/241
- https://lists.openwall.net/bugtraq/2013/07/12/2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-7193. | CVE ID: CVE-2008-7193
Date Updated: 2024-08-07T11:56:14.445Z
Date Published: 2009-09-09T19:00:00
Description:
PHPKIT 1.6.4 PL1 includes the session ID in the URL, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks by reading the PHPKITSID parameter from the HTTP Referer and using it in a request to (1) modify the user profile via upload_files/include.php or (2) create a new administrator via upload_files/pk/include.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40033
- http://www.securityfocus.com/archive/1/487249/100/200/threaded
- http://osvdb.org/50998
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-4302. | CVE ID: CVE-2024-4302
Date Updated: 2024-08-01T20:33:53.106Z
Date Published: 2024-04-29T05:46:52.134Z
Description:
Super 8 Live Chat online customer service platform fails to properly filter user input, allowing unauthenticated remote attackers to insert JavaScript code into the chat box. When the message recipient views the message, they become susceptible to Cross-site Scripting (XSS) attacks.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.twcert.org.tw/tw/cp-132-7779-35562-1.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-7217. | CVE ID: CVE-2019-7217
Date Updated: 2024-08-04T20:46:44.689Z
Date Published: 2019-05-13T18:08:17
Description:
Citrix ShareFile before 19.12 allows User Enumeration. It is possible to enumerate application username based on different server responses using the request to check the otp code. No authentication is required.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.sk-it.com/en/cve.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-47304. | CVE ID: CVE-2023-47304
Date Updated: 2024-08-02T21:09:36.139Z
Date Published: 2023-12-05T00:00:00
Description:
An issue was discovered in Vonage Box Telephone Adapter VDV23 version VDV21-3.2.11-0.5.1, allows local attackers to bypass UART authentication controls and read/write arbitrary values to the memory of the device.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://trojanhorsey.substack.com/p/cve-2023-47304-unsecured-uart-in
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-7231. | CVE ID: CVE-2020-7231
Date Updated: 2024-08-04T09:25:48.429Z
Date Published: 2020-01-19T19:45:47
Description:
Evoko Home 1.31 devices provide different error messages for failed login requests depending on whether the username is valid.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://sku11army.blogspot.com/2020/01/evoko-otra-sala-por-favor.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-6722. | CVE ID: CVE-2023-6722
Date Updated: 2024-08-02T08:35:14.917Z
Date Published: 2023-12-13T10:09:02.058Z
Description:
A path traversal vulnerability has been detected in Repox, which allows an attacker to read arbitrary files on the running server, resulting in a disclosure of sensitive information. An attacker could access files such as application code or data, backend credentials, operating system files...
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-repox
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-35099. | CVE ID: CVE-2024-35099
Date Updated: 2024-08-20T16:20:11.768Z
Date Published: N/A
Description:
TOTOLINK LR350 V9.3.5u.6698_B20230810 was discovered to contain a stack overflow via the password parameter in the function loginAuth.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/V9.3.5u.6698_B20230810/README.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-3321. | CVE ID: CVE-2015-3321
Date Updated: 2024-08-06T05:47:56.270Z
Date Published: 2017-10-02T18:00:00
Description:
Services and files in Lenovo Fingerprint Manager before 8.01.42 have incorrect ACLs, which allows local users to invalidate local checks and gain privileges via standard filesystem operations.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.lenovo.com/us/en/product_security/lenovo_fpr
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-34962. | CVE ID: CVE-2022-34962
Date Updated: 2024-08-03T09:22:10.883Z
Date Published: 2022-07-25T17:17:53
Description:
OpenTeknik LLC OSSN OPEN SOURCE SOCIAL NETWORK v6.3 LTS was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Group Timeline module.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.opensource-socialnetwork.org/
- https://github.com/opensource-socialnetwork/opensource-socialnetwork/releases/tag/6.3
- https://www.openteknik.com/contact?channel=ossn
- https://grimthereaperteam.medium.com/cve-2022-34962-ossn-6-3-lts-stored-xss-vulnerability-at-group-timeline-6ebe28dd6034
- https://github.com/bypazs/CVE-2022-34962
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-27247. | CVE ID: CVE-2022-27247
Date Updated: 2024-08-03T05:25:32.257Z
Date Published: 2022-05-13T14:25:12
Description:
onlinetolls in cdSoft Onlinetools-Smart Winhotel.MX 2021 allows an attacker to download sensitive information about any customer (e.g., data of birth, full address, mail information, and phone number) via GastKont Insecure Direct Object Reference.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://myses.de/#about
- https://myses.de/pdf/CVE2022-27247.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-44020. | CVE ID: CVE-2022-44020
Date Updated: 2024-08-03T13:47:05.330Z
Date Published: 2022-10-29T00:00:00
Description:
An issue was discovered in OpenStack Sushy-Tools through 0.21.0 and VirtualBMC through 2.2.2. Changing the boot device configuration with these packages removes password protection from the managed libvirt XML domain. NOTE: this only affects an "unsupported, production-like configuration."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://storyboard.openstack.org/#%21/story/2010382
- https://review.opendev.org/c/openstack/virtualbmc/+/862620
- https://review.opendev.org/c/openstack/sushy-tools/+/862625
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEQVJF3OQGSDCSQTQQSC54JEGLMSNB4Q/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAD7QJIUWPCKJIGYP7PPHH5DILOEONFE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMSUGS4B6EBRHBJMTRXL5RIKJTZTEMJC/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-1946. | CVE ID: CVE-2018-1946
Date Updated: 2024-09-16T17:23:45.265Z
Date Published: 2019-02-21T17:00:00Z
Description:
IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties. IBM X-Force ID: 153388.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/docview.wss?uid=ibm10872142
- https://exchange.xforce.ibmcloud.com/vulnerabilities/153388
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-4672. | CVE ID: CVE-2016-4672
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-46445. | CVE ID: CVE-2021-46445
Date Updated: 2024-08-04T05:10:33.851Z
Date Published: 2022-01-28T21:29:31
Description:
H.H.G Multistore v5.1.0 and below was discovered to contain a SQL injection vulnerability via /admin/categories.php?box_group_id.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.hhg-multistore.com/
- https://github.com/blockomat2100/PoCs/blob/main/hhg_multistore/exploit_hhg_multistore.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-5316. | CVE ID: CVE-2014-5316
Date Updated: 2024-08-06T11:41:48.317Z
Date Published: 2014-09-22T01:00:00
Description:
Cross-site scripting (XSS) vulnerability in Dotclear before 2.6.4 allows remote attackers to inject arbitrary web script or HTML via a crafted page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://jvn.jp/en/jp/JVN61637002/index.html
- http://www.securityfocus.com/bid/69985
- http://jvndb.jvn.jp/jvndb/JVNDB-2014-000110
- http://dotclear.org/blog/post/2014/08/18/Dotclear-2.6.4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-32126. | CVE ID: CVE-2022-32126
Date Updated: 2024-08-03T07:32:55.961Z
Date Published: 2022-06-22T18:42:03
Description:
74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/PAINCLOWN/74cmsSE-Arbitrary-File-Reading/issues/3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-3941. | CVE ID: CVE-2019-3941
Date Updated: 2024-08-04T19:26:27.534Z
Date Published: 2019-04-09T15:06:37
Description:
Advantech WebAccess 8.3.4 allows unauthenticated, remote attackers to delete arbitrary files via IOCTL 10005 RPC.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.tenable.com/security/research/tra-2019-15
- http://www.securityfocus.com/bid/107847
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-2809. | CVE ID: CVE-2024-2809
Date Updated: 2024-08-01T20:52:37.087Z
Date Published: 2024-03-22T05:31:04.573Z
Description:
A vulnerability, which was classified as critical, was found in Tenda AC15 15.03.05.18/15.03.20_multi. Affected is the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.257664
- https://vuldb.com/?ctiid.257664
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formSetFirewallCfg.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-33648. | CVE ID: CVE-2022-33648
Date Updated: 2024-08-03T08:09:22.201Z
Date Published: 2022-08-09T19:50:33
Description:
Microsoft Excel Remote Code Execution Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33648
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-30307. | CVE ID: CVE-2022-30307
Date Updated: 2024-08-03T06:48:35.769Z
Date Published: 2022-11-02T00:00:00
Description:
A key management error vulnerability [CWE-320] affecting the RSA SSH host key in FortiOS 7.2.0 and below, 7.0.6 and below, 6.4.9 and below may allow an unauthenticated attacker to perform a man in the middle attack.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://fortiguard.com/psirt/FG-IR-22-228
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-1686. | CVE ID: CVE-2011-1686
Date Updated: 2024-08-06T22:37:25.461Z
Date Published: 2011-04-22T10:00:00
Description:
Multiple SQL injection vulnerabilities in Best Practical Solutions RT 2.0.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors, as demonstrated by reading data.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2011/1071
- http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000188.html
- https://bugzilla.redhat.com/show_bug.cgi?id=696795
- http://blog.bestpractical.com/2011/04/security-vulnerabilities-in-rt.html
- http://www.securityfocus.com/bid/47383
- http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000187.html
- http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000189.html
- http://www.debian.org/security/2011/dsa-2220
- http://secunia.com/advisories/44189
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66792
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-24917. | CVE ID: CVE-2021-24917
Date Updated: 2024-08-03T19:49:13.491Z
Date Published: 2021-12-06T15:55:30
Description:
The WPS Hide Login WordPress plugin before 1.9.1 has a bug which allows to get the secret login page by setting a random referer string and making a request to /wp-admin/options.php as an unauthenticated user.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/15bb711a-7d70-4891-b7a2-c473e3e8b375
- https://wordpress.org/support/topic/bypass-security-issue/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-7873. | CVE ID: CVE-2020-7873
Date Updated: 2024-08-04T09:41:01.883Z
Date Published: 2021-09-09T12:48:43
Description:
Download of code without integrity check vulnerability in ActiveX control of Younglimwon Co., Ltd allows the attacker to cause a arbitrary file download and execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36233
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-45583. | CVE ID: CVE-2023-45583
Date Updated: 2024-08-02T20:21:16.756Z
Date Published: 2024-05-14T16:19:18.797Z
Description:
A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7.0.0 through 7.0.11, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 FortiPAM versions 1.1.0, 1.0.0 through 1.0.3 FortiOS versions 7.4.0, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15 FortiSwitchManager versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.2 allows attacker to execute unauthorized code or commands via specially crafted cli commands and http requests.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://fortiguard.com/psirt/FG-IR-23-137
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-3836. | CVE ID: CVE-2021-3836
Date Updated: 2024-08-03T17:09:09.506Z
Date Published: 2021-12-14T15:20:13
Description:
dbeaver is vulnerable to Improper Restriction of XML External Entity Reference
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.dev/bounties/a98264fb-1930-4c7c-b774-af24c0175fd4
- https://github.com/dbeaver/dbeaver/commit/4debf8f25184b7283681ed3fb5e9e887d9d4fe22
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-46788. | CVE ID: CVE-2021-46788
Date Updated: 2024-08-04T05:17:42.325Z
Date Published: 2022-05-13T15:02:51
Description:
Third-party pop-up window coverage vulnerability in the iConnect module.Successful exploitation of this vulnerability may cause system pop-up window may be covered to mislead users to perform incorrect operations.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://consumer.huawei.com/en/support/bulletin/2022/5/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-5168. | CVE ID: CVE-2008-5168
Date Updated: 2024-08-07T10:40:17.302Z
Date Published: 2008-11-19T18:00:00
Description:
SQL injection vulnerability in tip.php in Tips Complete Website 1.2.0 allows remote attackers to execute arbitrary SQL commands via the tipid parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/30861
- http://www.securityfocus.com/bid/29967
- http://securityreason.com/securityalert/4614
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43401
- https://www.exploit-db.com/exploits/5947
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-16819. | CVE ID: CVE-2017-16819
Date Updated: 2024-08-05T20:35:21.215Z
Date Published: 2017-11-17T17:00:00
Description:
A stored cross-site scripting vulnerability in the Icon Time Systems RTC-1000 v2.5.7458 and earlier time clock allows remote attackers to inject arbitrary JavaScript in the nameFirst (aka First Name) field for the employee details page (/employee.html) that is then reflected in multiple pages where that field data is utilized, resulting in session hijacking and possible elevation of privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/43158/
- https://www.keiththome.com/rtc-1000-vuln/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-48272. | CVE ID: CVE-2023-48272
Date Updated: 2024-08-02T21:23:39.482Z
Date Published: 2023-11-30T16:37:39.965Z
Description:
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in yonifre Maspik – Spam Blacklist allows Stored XSS.This issue affects Maspik – Spam Blacklist: from n/a through 0.9.2.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/contact-forms-anti-spam/wordpress-maspik-spam-blacklist-plugin-0-9-2-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-1020014. | CVE ID: CVE-2019-1020014
Date Updated: 2024-08-05T03:14:16.187Z
Date Published: 2019-07-29T12:20:21
Description:
docker-credential-helpers before 0.6.3 has a double free in the List functions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/docker/docker-credential-helpers/commit/1c9f7ede70a5ab9851f4c9cb37d317fd89cd318a
- https://github.com/docker/docker-credential-helpers/releases/tag/v0.6.3
- https://usn.ubuntu.com/4103-1/
- https://usn.ubuntu.com/4103-2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6VVFB6UWUK2GQQN7DVUU6GRRAL637A73/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-16979. | CVE ID: CVE-2018-16979
Date Updated: 2024-09-16T22:30:02.366Z
Date Published: 2018-09-12T23:00:00Z
Description:
Monstra CMS V3.0.4 allows HTTP header injection in the plugins/captcha/crypt/cryptographp.php cfg parameter, a related issue to CVE-2012-2943.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/howchen/howchen/issues/4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-12386. | CVE ID: CVE-2020-12386
Date Updated: 2024-08-04T11:56:51.679Z
Date Published: 2021-02-17T13:52:14
Description:
Out-of-bounds write in some Intel(R) Graphics Drivers before version 15.36.39.5143 may allow an authenticated user to potentially enable denial of service via local access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-7018. | CVE ID: CVE-2024-7018
Date Updated: 2024-09-24T19:57:44.817Z
Date Published: 2024-09-23T21:56:29.423Z
Description:
Heap buffer overflow in PDF in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://issues.chromium.org/issues/333414305
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-43188. | CVE ID: CVE-2024-43188
Date Updated: 2024-09-18T16:40:53.717Z
Date Published: 2024-09-18T11:39:22.958Z
Description:
IBM Business Automation Workflow
22.0.2, 23.0.1, 23.0.2, and 24.0.0
could allow a privileged user to perform unauthorized activities due to improper client side validation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/7168769
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-43803. | CVE ID: CVE-2023-43803
Date Updated: 2024-09-12T20:05:16.159Z
Date Published: 2023-10-18T20:36:29.697Z
Description:
Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can delete arbitrary files or folders belonging to the user that runs the Arduino Create Agent via a crafted HTTP POST request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/arduino/arduino-create-agent/security/advisories/GHSA-m5jc-r4gf-c6p8
- https://github.com/arduino/arduino-create-agent/releases/tag/1.3.3
- https://www.nozominetworks.com/blog/security-flaws-affect-a-component-of-the-arduino-create-cloud-ide
- https://lists.debian.org/debian-lts-announce/2023/11/msg00005.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-8523. | CVE ID: CVE-2016-8523
Date Updated: 2024-09-16T17:32:45.617Z
Date Published: 2018-02-15T22:00:00Z
Description:
A Remote Arbitrary Code Execution vulnerability in HPE Smart Storage Administrator version before v2.60.18.0 was found.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05382349
- http://www.securityfocus.com/bid/95868
- https://www.exploit-db.com/exploits/41297/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-7169. | CVE ID: CVE-2016-7169
Date Updated: 2024-08-06T01:50:47.517Z
Date Published: 2017-01-05T02:00:00
Description:
Directory traversal vulnerability in the File_Upload_Upgrader class in wp-admin/includes/class-file-upload-upgrader.php in the upgrade package uploader in WordPress before 4.6.1 allows remote authenticated users to access arbitrary files via a crafted urlholder parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/WordPress/WordPress/commit/54720a14d85bc1197ded7cb09bd3ea790caa0b6e
- http://www.securityfocus.com/bid/92841
- https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
- https://codex.wordpress.org/Version_4.6.1
- https://wpvulndb.com/vulnerabilities/8616
- http://www.debian.org/security/2016/dsa-3681
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-1930. | CVE ID: CVE-2023-1930
Date Updated: 2024-08-02T06:05:26.787Z
Date Published: 2023-04-06T20:05:30.159Z
Description:
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the wpfc_clear_cache_of_allsites_callback function in versions up to, and including, 1.1.2. This makes it possible for authenticated attackers with subscriber-level access to delete caches.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/bae67a68-4bd1-4b52-b3dd-af0eef014028?source=cve
- https://plugins.trac.wordpress.org/changeset/2893158/wp-fastest-cache/trunk/wpFastestCache.php?contextall=1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-6707. | CVE ID: CVE-2014-6707
Date Updated: 2024-08-06T12:24:35.189Z
Date Published: 2014-09-25T01:00:00
Description:
The 7Sage LSAT Prep - Proctor (aka com.sevensage.lsat) application 2.1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/140297
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-2482. | CVE ID: CVE-2010-2482
Date Updated: 2024-08-07T02:32:16.790Z
Date Published: 2010-07-06T14:00:00
Description:
LibTIFF 3.9.4 and earlier does not properly handle an invalid td_stripbytecount field, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted TIFF file, a different vulnerability than CVE-2010-2443.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://marc.info/?l=oss-security&m=127736307002102&w=2
- https://bugs.launchpad.net/bugs/597246
- https://bugzilla.redhat.com/show_bug.cgi?id=608010
- http://www.debian.org/security/2012/dsa-2552
- http://security.gentoo.org/glsa/glsa-201209-02.xml
- https://bugzilla.redhat.com/show_bug.cgi?id=603024
- http://secunia.com/advisories/40422
- http://bugzilla.maptools.org/show_bug.cgi?id=1996
- http://marc.info/?l=oss-security&m=127738540902757&w=2
- http://marc.info/?l=oss-security&m=127797353202873&w=2
- http://www.openwall.com/lists/oss-security/2010/06/30/22
- http://secunia.com/advisories/50726
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-20425. | CVE ID: CVE-2019-20425
Date Updated: 2024-08-05T02:39:09.924Z
Date Published: 2020-01-27T04:21:15
Description:
In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. In the function lustre_msg_string, there is no validation of a certain length value derived from lustre_msg_buflen_v2.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://wiki.lustre.org/Lustre_2.12.3_Changelog
- http://lustre.org/
- https://jira.whamcloud.com/browse/LU-12613
- https://review.whamcloud.com/#/c/36209/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-15610. | CVE ID: CVE-2020-15610
Date Updated: 2024-08-04T13:22:30.547Z
Date Published: 2020-07-28T17:01:15
Description:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_php_pecl.php. When parsing the modulo parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9728.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-20-757/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-42276. | CVE ID: CVE-2021-42276
Date Updated: 2024-08-04T03:30:38.053Z
Date Published: 2021-11-10T00:47:00
Description:
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42276
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-5742. | CVE ID: CVE-2024-5742
Date Updated: 2024-09-25T05:49:51.693Z
Date Published: 2024-06-12T08:53:02.256Z
Description:
A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://access.redhat.com/errata/RHSA-2024:6986
- https://access.redhat.com/security/cve/CVE-2024-5742
- https://bugzilla.redhat.com/show_bug.cgi?id=2278574
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-4427. | CVE ID: CVE-2023-4427
Date Updated: 2024-10-01T19:45:22.216Z
Date Published: 2023-08-22T23:56:13.616Z
Description:
Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html
- https://crbug.com/1470668
- https://www.debian.org/security/2023/dsa-5483
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
- http://packetstormsecurity.com/files/174951/Chrome-ReduceJSLoadPropertyWithEnumeratedKey-Out-Of-Bounds-Access.html
- https://security.gentoo.org/glsa/202401-34
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-1585. | CVE ID: CVE-2010-1585
Date Updated: 2024-08-07T01:28:41.795Z
Date Published: 2010-04-28T22:00:00
Description:
The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFragmentSink protection mechanism in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 does not properly sanitize HTML in a chrome document, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://downloads.avaya.com/css/P8/documents/100133195
- https://bugzilla.mozilla.org/show_bug.cgi?id=562547
- http://www.securityfocus.com/archive/1/510883/100/0/threaded
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:041
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12532
- http://www.security-assessment.com/files/whitepapers/Cross_Context_Scripting_with_Firefox.pdf
- http://www.mozilla.org/security/announce/2011/mfsa2011-08.html
- http://wizzrss.blat.co.za/2009/11/17/so-much-for-nsiscriptableunescapehtmlparsefragment/
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:042
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-2642. | CVE ID: CVE-2016-2642
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-12748. | CVE ID: CVE-2019-12748
Date Updated: 2024-08-04T23:32:54.948Z
Date Published: 2019-07-09T14:22:00
Description:
TYPO3 8.3.0 through 8.7.26 and 9.0.0 through 9.5.7 allows XSS.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://typo3.org/security/advisory/typo3-core-sa-2019-015/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-30866. | CVE ID: CVE-2024-30866
Date Updated: 2024-08-02T01:39:00.940Z
Date Published: 2024-04-01T00:00:00
Description:
netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /3g/menu.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-menu.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-2100. | CVE ID: CVE-2011-2100
Date Updated: 2024-08-06T22:53:15.986Z
Date Published: 2011-06-16T23:00:00
Description:
Untrusted search path vulnerability in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14057
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68014
- http://www.securityfocus.com/bid/48252
- http://www.adobe.com/support/security/bulletins/apsb11-16.html
- http://www.us-cert.gov/cas/techalerts/TA11-166A.html
- http://www.securitytracker.com/id?1025658
- http://osvdb.org/73062
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-1000419. | CVE ID: CVE-2018-1000419
Date Updated: 2024-08-05T12:40:46.917Z
Date Published: 2019-01-09T23:00:00
Description:
An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to obtain credentials IDs for credentials stored in Jenkins.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/106532
- https://jenkins.io/security/advisory/2018-09-25/#SECURITY-984%20%282%29
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-0783. | CVE ID: CVE-2017-0783
Date Updated: 2024-09-17T04:18:51.494Z
Date Published: 2017-09-14T19:00:00Z
Description:
A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63145701.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://source.android.com/security/bulletin/2017-09-01
- http://www.securityfocus.com/bid/100811
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-11829. | CVE ID: CVE-2020-11829
Date Updated: 2024-08-04T11:42:00.232Z
Date Published: 2020-11-19T15:51:07
Description:
Dynamic loading of services in the backup and restore SDK leads to elevated privileges, affected product is com.coloros.codebook V2.0.0_5493e40_200722.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.oppo.com/en/noticedetails.html?noticeId=NOTICE-1328876061836189696
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-43020. | CVE ID: CVE-2022-43020
Date Updated: 2024-08-03T13:26:02.662Z
Date Published: 2022-10-19T00:00:00
Description:
OpenCATS v0.9.6 was discovered to contain a SQL injection vulnerability via the tag_id variable in the Tag update function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_in_Tag_Updates.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-10549. | CVE ID: CVE-2019-10549
Date Updated: 2024-08-04T22:24:18.826Z
Date Published: 2020-03-05T08:56:03
Description:
Null pointer dereference issue can happen due to improper validation of CSEQ header response received from network in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, Nicobar, QCM2150, QM215, Rennell, SC8180X, SDM429, SDM429W, SDM439, SDM450, SDM632, SDX24, SDX55, SM6150, SM7150, SM8150
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-7911. | CVE ID: CVE-2017-7911
Date Updated: 2024-08-05T16:19:28.663Z
Date Published: 2017-05-06T00:00:00
Description:
A Code Injection issue was discovered in CyberVision Kaa IoT Platform, Version 0.7.4. An insufficient-encapsulation vulnerability has been identified, which may allow remote code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.tenable.com/security/research/tra-2017-19
- http://www.securityfocus.com/bid/98256
- https://ics-cert.us-cert.gov/advisories/ICSA-17-122-02
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-1183. | CVE ID: CVE-2023-1183
Date Updated: 2024-08-02T05:40:58.213Z
Date Published: 2023-07-10T15:04:30.740Z
Description:
A flaw was found in the Libreoffice package. An attacker can craft an odb containing a "database/script" file with a SCRIPT command where the contents of the file could be written to a new file whose location was determined by the attacker.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://access.redhat.com/security/cve/CVE-2023-1183
- https://bugzilla.redhat.com/show_bug.cgi?id=2208506
- https://www.libreoffice.org/about-us/security/advisories/cve-2023-1183/
- http://www.openwall.com/lists/oss-security/2023/12/28/4
- http://www.openwall.com/lists/oss-security/2024/01/03/4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-6243. | CVE ID: CVE-2018-6243
Date Updated: 2024-08-05T06:01:47.692Z
Date Published: 2019-05-07T19:36:19
Description:
NVIDIA Tegra TLK Widevine Trust Application contains a vulnerability in which missing the input parameter checking of video metadata count may lead to Arbitrary Code Execution, Denial of Service or Escalation of Privileges. Android ID: A-72315075. Severity Rating: High. Version: N/A.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/2019-05-01
- http://www.securityfocus.com/bid/108287
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-19507. | CVE ID: CVE-2019-19507
Date Updated: 2024-08-05T02:16:48.050Z
Date Published: 2019-12-02T16:17:45
Description:
In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/manvel-khnkoyan/jpv/issues/6
- https://www.npmjs.com/package/jpv
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-20091. | CVE ID: CVE-2021-20091
Date Updated: 2024-08-03T17:30:07.625Z
Date Published: 2021-04-29T14:29:09
Description:
The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly sanitize user input. An authenticated remote attacker could leverage this vulnerability to alter device configuration, potentially gaining remote code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.tenable.com/security/research/tra-2021-13
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-16227. | CVE ID: CVE-2019-16227
Date Updated: 2024-08-05T01:10:41.562Z
Date Published: 2019-09-11T14:47:02
Description:
An issue was discovered in py-lmdb 0.97. For certain values of mn_flags, mdb_cursor_set triggers a memcpy with an invalid write operation within mdb_xcursor_init1. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20memcpy%20illegal%20dst
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-16713. | CVE ID: CVE-2020-16713
Date Updated: 2021-12-20T22:50:35
Date Published: 2021-12-20T22:50:35
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-12782. | CVE ID: CVE-2018-12782
Date Updated: 2024-08-05T08:45:02.071Z
Date Published: 2018-07-20T19:00:00
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Double Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/acrobat/apsb18-21.html
- http://www.securitytracker.com/id/1041250
- http://www.securityfocus.com/bid/104701
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-2507. | CVE ID: CVE-2020-2507
Date Updated: 2024-09-16T19:40:15.957Z
Date Published: 2021-02-03T15:51:16.772551Z
Description:
The vulnerability have been reported to affect earlier versions of QTS. If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. This issue affects: QNAP Systems Inc. Helpdesk versions prior to 3.0.3.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qnap.com/zh-tw/security-advisory/qsa-20-08
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-13590. | CVE ID: CVE-2019-13590
Date Updated: 2024-08-04T23:57:39.466Z
Date Published: 2019-07-14T00:00:00
Description:
An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://sourceforge.net/p/sox/bugs/325/
- https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-11406. | CVE ID: CVE-2019-11406
Date Updated: 2024-08-04T22:55:40.913Z
Date Published: 2019-05-08T17:27:38
Description:
Subrion CMS 4.2.1 allows _core/en/contacts/ XSS via the name, email, or phone parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/intelliants/subrion/commits/develop
- https://github.com/intelliants/subrion/issues/821
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-20191. | CVE ID: CVE-2021-20191
Date Updated: 2024-08-03T17:30:07.571Z
Date Published: 2021-05-26T00:00:00
Description:
A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1916813
- https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-4041. | CVE ID: CVE-2020-4041
Date Updated: 2024-08-04T07:52:20.827Z
Date Published: 2020-06-08T22:05:14
Description:
In Bolt CMS before version 3.7.1, the filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it. Additionally, the measures to prevent renaming the file to disallowed filename extensions could be circumvented. This is fixed in Bolt 3.7.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/bolt/bolt/pull/7853
- https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f
- https://github.com/bolt/bolt/security/advisories/GHSA-68q3-7wjp-7q3j
- http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html
- http://seclists.org/fulldisclosure/2020/Jul/4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-18635. | CVE ID: CVE-2019-18635
Date Updated: 2024-08-05T01:54:14.550Z
Date Published: 2019-10-30T21:58:14
Description:
An issue was discovered in Mooltipass Moolticute through v0.42.1 and v0.42.x-testing through v0.42.5-testing. There is a NULL pointer dereference in MPDevice_win.cpp.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://securiteam.io/2019/10/27/a-null-pointer-dereference/
- https://github.com/mooltipass/moolticute/pull/483
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-35787. | CVE ID: CVE-2024-35787
Date Updated: 2024-08-02T03:21:47.386Z
Date Published: 2024-05-17T12:24:35.137Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
md/md-bitmap: fix incorrect usage for sb_index
Commit d7038f951828 ("md-bitmap: don't use ->index for pages backing the
bitmap file") removed page->index from bitmap code, but left wrong code
logic for clustered-md. current code never set slot offset for cluster
nodes, will sometimes cause crash in clustered env.
Call trace (partly):
md_bitmap_file_set_bit+0x110/0x1d8 [md_mod]
md_bitmap_startwrite+0x13c/0x240 [md_mod]
raid1_make_request+0x6b0/0x1c08 [raid1]
md_handle_request+0x1dc/0x368 [md_mod]
md_submit_bio+0x80/0xf8 [md_mod]
__submit_bio+0x178/0x300
submit_bio_noacct_nocheck+0x11c/0x338
submit_bio_noacct+0x134/0x614
submit_bio+0x28/0xdc
submit_bh_wbc+0x130/0x1cc
submit_bh+0x1c/0x28
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/736ad6c577a367834118f57417038d45bb5e0a31
- https://git.kernel.org/stable/c/55e55eb65fd5e09faf5a0e49ffcdd37905aaf4da
- https://git.kernel.org/stable/c/5a95815b17428ce2f56ec18da5e0d1b2a1a15240
- https://git.kernel.org/stable/c/ecbd8ebb51bf7e4939d83b9e6022a55cac44ef06
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-5642. | CVE ID: CVE-2012-5642
Date Updated: 2024-08-06T21:14:16.279Z
Date Published: 2012-12-31T11:00:00
Description:
server/action.py in Fail2ban before 0.8.8 does not properly handle the content of the matches tag, which might allow remote attackers to trigger unsafe behavior in a custom action file via unspecified symbols in this content.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2012/12/17/2
- https://github.com/fail2ban/fail2ban/commit/83109bc
- http://sourceforge.net/mailarchive/message.php?msg_id=30193056
- https://raw.github.com/fail2ban/fail2ban/master/ChangeLog
- https://bugs.gentoo.org/show_bug.cgi?id=447572
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00002.html
- https://bugzilla.redhat.com/show_bug.cgi?id=887914
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:078
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00001.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-29136. | CVE ID: CVE-2024-29136
Date Updated: 2024-08-08T18:31:05.631Z
Date Published: 2024-03-19T13:48:09.169Z
Description:
Deserialization of Untrusted Data vulnerability in Themefic Tourfic.This issue affects Tourfic: from n/a through 2.11.17.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/tourfic/wordpress-tourfic-plugin-2-11-17-php-object-injection-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.