instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide information about the following MITRE ATT&CK technique:
T1078.002 : Domain Accounts
Name: Domain Accounts ID: T1078.002 URL: https://attack.mitre.org/techniques/T1078/002 Platforms: Linux, macOS, Windows Kill Chain Phases: Defense Evasion, Persistence, Privilege Escalation, Initial Access Description: Adversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.(Citation: TechNet Credential Theft) Domain accounts are those managed by Active Directory Domain Services where access and permissions are configured across systems and services that are part of that domain. Domain accounts can cover users, administrators, and services.(Citation: Microsoft AD Accounts) Adversaries may compromise domain accounts, some with a high level of privileges, through various means such as [OS Credential Dumping](T1003) or password reuse, allowing access to privileged resources of the domain. Data Sources: User Account: User Account Authentication, Logon Session: Logon Session Creation, Logon Session: Logon Session Metadata Detection: Configure robust, consistent account activity audit policies across the enterprise and with externally accessible services.(Citation: TechNet Audit Policy) Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultaneously; multiple accounts logged into the same machine simultaneously; accounts logged in at odd times or outside of business hours. Activity may be from interactive login sessions or process ownership from accounts being used to execute binaries on a remote system as a particular account. Correlate other security systems with login information (e.g., a user has an active login session but has not entered the building or does not have VPN access). On Linux, check logs and other artifacts created by use of domain authentication services, such as the System Security Services Daemon (sssd).(Citation: Ubuntu SSSD Docs) Perform regular audits of domain accounts to detect accounts that may have been created by an adversary for persistence.
Provide detailed information about CVE-2020-26768.
CVE ID: CVE-2020-26768 Date Updated: 2024-08-04T16:03:22.593Z Date Published: 2021-01-07T12:43:12 Description: Formstone <=1.4.16 is vulnerable to a Reflected Cross-Site Scripting (XSS) vulnerability caused by improper validation of user supplied input in the upload-target.php and upload-chunked.php files. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim's Web browser within the security context of the hosting Web site once the URL is clicked or visited. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials, force malware execution, user redirection and others. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Formstone/Formstone/issues/286 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1435.
CVE ID: CVE-2024-1435 Date Updated: 2024-08-01T18:40:21.037Z Date Published: 2024-02-29T05:03:10.181Z Description: Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Tainacan.Org Tainacan.This issue affects Tainacan: from n/a through 0.20.6. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-20-6-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16821.
CVE ID: CVE-2019-16821 Date Updated: 2022-12-02T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34832.
CVE ID: CVE-2023-34832 Date Updated: 2024-08-02T16:17:04.259Z Date Published: 2023-06-16T00:00:00 Description: TP-Link Archer AX10(EU)_V1.2_230220 was discovered to contain a buffer overflow via the function FUN_131e8 - 0x132B4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tp-link.com - http://archer.com - https://gist.github.com/jhacker91/2026e080a42514255e758d64b465d1d5 - http://packetstormsecurity.com/files/172989/TP-Link-Archer-AX10-EU-_V1.2_230220-Buffer-Overflow.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4000.
CVE ID: CVE-2015-4000 Date Updated: 2024-08-06T06:04:02.725Z Date Published: 2015-05-21T00:00:00 Description: The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html - http://marc.info/?l=bugtraq&m=143880121627664&w=2 - http://rhn.redhat.com/errata/RHSA-2015-1243.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html - http://www.securitytracker.com/id/1033208 - http://www.securitytracker.com/id/1032637 - http://marc.info/?l=bugtraq&m=144050121701297&w=2 - http://www.debian.org/security/2016/dsa-3688 - http://www.debian.org/security/2015/dsa-3287 - http://marc.info/?l=bugtraq&m=144493176821532&w=2 - http://www.securitytracker.com/id/1032865 - http://marc.info/?l=bugtraq&m=143557934009303&w=2 - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html - http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html - http://www.securitytracker.com/id/1034728 - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html - http://www.securitytracker.com/id/1032656 - http://rhn.redhat.com/errata/RHSA-2016-2056.html - http://openwall.com/lists/oss-security/2015/05/20/8 - http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html - http://marc.info/?l=bugtraq&m=143628304012255&w=2 - http://marc.info/?l=bugtraq&m=144060576831314&w=2 - http://www.securitytracker.com/id/1032475 - http://www.securitytracker.com/id/1032960 - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html - http://www.securitytracker.com/id/1032653 - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html - http://www.securitytracker.com/id/1033385 - https://security.gentoo.org/glsa/201512-10 - http://rhn.redhat.com/errata/RHSA-2015-1229.html - http://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html - http://www.securitytracker.com/id/1032864 - http://www.securitytracker.com/id/1032910 - http://www.securitytracker.com/id/1032645 - http://www.ubuntu.com/usn/USN-2706-1 - https://security.gentoo.org/glsa/201701-46 - http://rhn.redhat.com/errata/RHSA-2015-1526.html - http://www.securitytracker.com/id/1033760 - http://rhn.redhat.com/errata/RHSA-2015-1485.html - http://rhn.redhat.com/errata/RHSA-2015-1197.html - http://marc.info/?l=bugtraq&m=144104533800819&w=2 - http://www.securitytracker.com/id/1032699 - http://www.securitytracker.com/id/1032476 - http://www.securitytracker.com/id/1032649 - http://marc.info/?l=bugtraq&m=144043644216842&w=2 - http://marc.info/?l=bugtraq&m=143637549705650&w=2 - http://rhn.redhat.com/errata/RHSA-2015-1544.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159314.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html - https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04718196 - http://www.securitytracker.com/id/1032688 - http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html - http://www.securitytracker.com/id/1032652 - http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159351.html - http://rhn.redhat.com/errata/RHSA-2015-1185.html - http://marc.info/?l=bugtraq&m=143558092609708&w=2 - http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160117.html - http://marc.info/?l=bugtraq&m=144069189622016&w=2 - http://www.securitytracker.com/id/1032648 - http://www.securitytracker.com/id/1032759 - http://rhn.redhat.com/errata/RHSA-2015-1228.html - http://marc.info/?l=bugtraq&m=144060606031437&w=2 - http://www.debian.org/security/2015/dsa-3316 - http://www.securitytracker.com/id/1033209 - http://www.securitytracker.com/id/1032871 - http://www.debian.org/security/2015/dsa-3324 - http://www.securitytracker.com/id/1032655 - http://www.securitytracker.com/id/1033210 - http://marc.info/?l=bugtraq&m=144061542602287&w=2 - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html - http://marc.info/?l=bugtraq&m=145409266329539&w=2 - http://www.ubuntu.com/usn/USN-2673-1 - http://www.securitytracker.com/id/1034884 - http://marc.info/?l=bugtraq&m=143506486712441&w=2 - https://security.gentoo.org/glsa/201603-11 - http://www.securitytracker.com/id/1033064 - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html - http://www.securitytracker.com/id/1032778 - http://www.securitytracker.com/id/1032474 - http://marc.info/?l=bugtraq&m=144493176821532&w=2 - http://marc.info/?l=bugtraq&m=144102017024820&w=2 - http://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html - http://www.securitytracker.com/id/1032784 - http://www.securitytracker.com/id/1032777 - http://www.securitytracker.com/id/1033416 - http://www.securitytracker.com/id/1033991 - http://www.securitytracker.com/id/1032647 - http://www.securitytracker.com/id/1032654 - http://www.securitytracker.com/id/1033341 - http://rhn.redhat.com/errata/RHSA-2015-1486.html - http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html - http://www.securitytracker.com/id/1033433 - http://www.ubuntu.com/usn/USN-2696-1 - http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html - http://www.securitytracker.com/id/1032702 - http://www.debian.org/security/2015/dsa-3339 - http://www.securitytracker.com/id/1032727 - http://rhn.redhat.com/errata/RHSA-2015-1242.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html - https://security.gentoo.org/glsa/201506-02 - http://www.securityfocus.com/bid/91787 - http://rhn.redhat.com/errata/RHSA-2016-1624.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html - http://rhn.redhat.com/errata/RHSA-2015-1488.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html - http://www.securitytracker.com/id/1033430 - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html - http://rhn.redhat.com/errata/RHSA-2015-1241.html - http://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html - http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html - http://marc.info/?l=bugtraq&m=143880121627664&w=2 - http://rhn.redhat.com/errata/RHSA-2015-1230.html - http://www.securityfocus.com/bid/74733 - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html - http://www.securitytracker.com/id/1032651 - http://www.securitytracker.com/id/1033065 - http://www.ubuntu.com/usn/USN-2656-1 - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html - http://www.securitytracker.com/id/1033222 - http://www.securitytracker.com/id/1036218 - http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html - http://marc.info/?l=bugtraq&m=143655800220052&w=2 - http://www.securitytracker.com/id/1040630 - http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html - http://www.securitytracker.com/id/1034087 - http://www.securitytracker.com/id/1033513 - http://www.securitytracker.com/id/1032884 - http://rhn.redhat.com/errata/RHSA-2015-1604.html - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html - http://www.securitytracker.com/id/1032932 - http://www.securitytracker.com/id/1033891 - http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html - http://www.securitytracker.com/id/1032783 - http://www.securitytracker.com/id/1032856 - http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc - http://www.debian.org/security/2015/dsa-3300 - http://www.ubuntu.com/usn/USN-2656-2 - http://www.securitytracker.com/id/1033067 - http://www.securitytracker.com/id/1033019 - http://rhn.redhat.com/errata/RHSA-2015-1072.html - http://www.securitytracker.com/id/1032650 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - https://www.oracle.com/security-alerts/cpujan2021.html - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10681 - http://www-01.ibm.com/support/docview.wss?uid=swg21962739 - https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098403 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04923929 - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html - https://kc.mcafee.com/corporate/index?page=content&id=SB10122 - http://support.apple.com/kb/HT204941 - http://www-304.ibm.com/support/docview.wss?uid=swg21962816 - http://www-01.ibm.com/support/docview.wss?uid=swg21959812 - https://www-304.ibm.com/support/docview.wss?uid=swg21959745 - https://weakdh.org/imperfect-forward-secrecy.pdf - http://www-304.ibm.com/support/docview.wss?uid=swg21959132 - https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/ - http://www-01.ibm.com/support/docview.wss?uid=swg21959539 - https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/ - http://www-01.ibm.com/support/docview.wss?uid=swg21959325 - https://openssl.org/news/secadv/20150611.txt - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04740527 - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html - http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04949778 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190 - http://www-304.ibm.com/support/docview.wss?uid=swg21967893 - http://www-304.ibm.com/support/docview.wss?uid=swg21958984 - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html - http://www-01.ibm.com/support/docview.wss?uid=swg21959517 - http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html - http://www-01.ibm.com/support/docview.wss?uid=swg21959195 - http://www-01.ibm.com/support/docview.wss?uid=swg21961717 - http://www-304.ibm.com/support/docview.wss?uid=swg21960041 - http://www-304.ibm.com/support/docview.wss?uid=swg21960194 - https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes - http://www-01.ibm.com/support/docview.wss?uid=swg21959453 - https://security.netapp.com/advisory/ntap-20150619-0001/ - http://www-01.ibm.com/support/docview.wss?uid=swg21959111 - http://www-304.ibm.com/support/docview.wss?uid=swg21960418 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 - https://www.suse.com/security/cve/CVE-2015-4000.html - https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04953655 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128722 - http://support.citrix.com/article/CTX201114 - http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery - http://www-304.ibm.com/support/docview.wss?uid=swg21960380 - http://support.apple.com/kb/HT204942 - http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04876402 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193083 - http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241 - http://www-01.ibm.com/support/docview.wss?uid=swg21959530 - http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html - http://www-01.ibm.com/support/docview.wss?uid=swg21960191 - http://www-01.ibm.com/support/docview.wss?uid=swg21959636 - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04918839 - http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 - https://puppet.com/security/cve/CVE-2015-4000 - http://www.mozilla.org/security/announce/2015/mfsa2015-70.html - http://www.solarwinds.com/documentation/storage/storagemanager/docs/ReleaseNotes/releaseNotes.htm - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789 - https://support.citrix.com/article/CTX216642 - https://weakdh.org/ - https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119 - http://www-01.ibm.com/support/docview.wss?uid=swg21959481 - https://bto.bluecoat.com/security-advisory/sa98 - https://bugzilla.mozilla.org/show_bug.cgi?id=1138554 - http://www-01.ibm.com/support/docview.wss?uid=swg21962455 - https://www.openssl.org/news/secadv_20150611.txt - http://www.fortiguard.com/advisory/2015-05-20-logjam-attack - https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11986.
CVE ID: CVE-2020-11986 Date Updated: 2024-08-04T11:48:57.611Z Date Published: 2020-09-09T15:28:59 Description: To be able to analyze gradle projects, the build scripts need to be executed. Apache NetBeans follows this pattern. This causes the code of the build script to be invoked at load time of the project. Apache NetBeans up to and including 12.0 did not request consent from the user for the analysis of the project at load time. This in turn will run potentially malicious code, from an external source, without the consent of the user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread.html/rbb8ea1b684e73107a0a6a30245ad6112bec2e6e171368c808e69217e%40%3Cannounce.netbeans.apache.org%3E - https://lists.apache.org/thread.html/r0fb2ba21a0469f64c2dff945dbe68f7b1122e1bff2b2b46271682406%40%3Cnotifications.netbeans.apache.org%3E - https://lists.apache.org/thread.html/ra81cdcf325bf4ea085c178f95ed6b50d4f1c095be50577b2f9b88984%40%3Cnotifications.netbeans.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1010.
CVE ID: CVE-2010-1010 Date Updated: 2024-09-17T00:01:37.907Z Date Published: 2010-03-19T18:35:00Z Description: SQL injection vulnerability in the MK Wastebasket (mk_wastebasket) extension 2.1.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/ - http://www.securityfocus.com/bid/38792 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28525.
CVE ID: CVE-2023-28525 Date Updated: 2024-08-02T13:43:23.134Z Date Published: 2024-03-01T01:41:48.557Z Description: IBM Engineering Requirements Management 9.7.2.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 251052. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7124058 - https://exchange.xforce.ibmcloud.com/vulnerabilities/251052 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1882.
CVE ID: CVE-2011-1882 Date Updated: 2024-08-06T22:46:00.826Z Date Published: 2011-07-13T23:00:00 Description: Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other CVEs listed in MS11-054, aka "Win32k Use After Free Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/73782 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-054 - http://support.avaya.com/css/P8/documents/100144947 - http://www.us-cert.gov/cas/techalerts/TA11-193A.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12738 - http://secunia.com/advisories/45186 - http://www.securitytracker.com/id?1025761 - http://www.securityfocus.com/bid/48594 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11861.
CVE ID: CVE-2020-11861 Date Updated: 2024-08-04T11:42:00.241Z Date Published: 2020-09-18T20:07:34 Description: Unauthorized escalation of local privileges vulnerability on Micro Focus Operation Agent, affecting all versions prior to versions 12.11. The vulnerability could be exploited to escalate the local privileges and gain root access on the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://softwaresupport.softwaregrp.com/doc/KM03709900 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0992.
CVE ID: CVE-2023-0992 Date Updated: 2024-08-02T05:32:46.035Z Date Published: 2023-06-09T05:33:11.185Z Description: The Shield Security plugin for WordPress is vulnerable to stored Cross-Site Scripting in versions up to, and including, 17.0.17 via the 'User-Agent' header. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/162dff28-94ea-4a47-a6cb-a13317cf1a04?source=cve - https://wordpress.org/plugins/wp-simple-firewall/#developers - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2883864%40wp-simple-firewall%2Ftrunk&old=2883536%40wp-simple-firewall%2Ftrunk&sfp_email=&sfph_mail= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20618.
CVE ID: CVE-2023-20618 Date Updated: 2024-08-02T09:05:45.857Z Date Published: 2023-02-06T00:00:00 Description: In vcu, there is a possible memory corruption due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519184; Issue ID: ALPS07519184. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/February-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1309.
CVE ID: CVE-2020-1309 Date Updated: 2024-08-04T06:32:01.194Z Date Published: 2020-06-09T19:44:03 Description: An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Microsoft Store Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1222. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1309 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11250.
CVE ID: CVE-2020-11250 Date Updated: 2024-08-04T11:28:13.827Z Date Published: 2021-06-09T05:00:45 Description: Use after free due to race condition when reopening the device driver repeatedly in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-40146.
CVE ID: CVE-2023-40146 Date Updated: 2024-08-22T18:03:10.122Z Date Published: 2024-04-17T12:55:47.083Z Description: A privilege escalation vulnerability exists in the /bin/login functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted command line argument can lead to a limited-shell escape and elevated capabilities. An attacker can authenticate with hard-coded credentials and execute unblocked default busybox functionality to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1868 - https://forum.peplink.com/t/peplink-security-advisory-smart-reader-firmware-1-2-0-cve-2023-43491-cve-2023-45209-cve-2023-39367-cve-2023-45744-cve-2023-40146/47256 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24314.
CVE ID: CVE-2022-24314 Date Updated: 2024-08-03T04:07:02.443Z Date Published: 2022-02-09T22:05:00 Description: A CWE-125: Out-of-bounds Read vulnerability exists that could cause memory leaks potentially resulting in denial of service when an attacker repeatedly sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25150.
CVE ID: CVE-2022-25150 Date Updated: 2024-08-03T04:29:01.795Z Date Published: 2022-02-14T18:50:01 Description: In Malwarebytes Binisoft Windows Firewall Control before 6.8.1.0, programs executed from the Tools tab can be used to escalate privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/bugs?report_id=1205932 - https://binisoft.org/changelog.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4490.
CVE ID: CVE-2014-4490 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1041.
CVE ID: CVE-2013-1041 Date Updated: 2024-08-06T14:49:20.534Z Date Published: 2013-09-19T10:00:00 Description: WebKit, as used in Apple iOS before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-09-18-2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html - http://www.securitytracker.com/id/1029054 - http://support.apple.com/kb/HT6001 - http://lists.apple.com/archives/security-announce/2013/Oct/msg00003.html - http://secunia.com/advisories/54886 - http://support.apple.com/kb/HT5934 - http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0165.
CVE ID: CVE-2016-0165 Date Updated: 2024-08-05T22:08:13.324Z Date Published: 2016-04-12T23:00:00 Description: The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0143 and CVE-2016-0167. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1035529 - https://www.exploit-db.com/exploits/44480/ - http://www.securitytracker.com/id/1035532 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-039 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41835.
CVE ID: CVE-2022-41835 Date Updated: 2024-09-16T21:08:00.681Z Date Published: 2022-10-19T21:24:53.599766Z Description: In F5OS-A version 1.x before 1.1.0 and F5OS-C version 1.x before 1.5.0, excessive file permissions in F5OS allows an authenticated local attacker to execute limited set of commands in a container and impact the F5OS controller. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.f5.com/csp/article/K33484483 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25267.
CVE ID: CVE-2022-25267 Date Updated: 2024-08-03T04:36:06.570Z Date Published: 2022-03-23T22:06:24 Description: Passwork On-Premise Edition before 4.6.13 allows migration/uploadExportFile Directory Traversal (to upload files). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://passwork.me - https://gist.github.com/garakh/e0e2fe6d6e234f0595dea6a8141568f2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22160.
CVE ID: CVE-2021-22160 Date Updated: 2024-08-03T18:37:18.090Z Date Published: 2021-05-26T12:22:31 Description: If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread.html/r347650d15a3e9c5f58b83e918b6ad6dedc2a63d3eb63da8e6a7be87e%40%3Cusers.pulsar.apache.org%3E - https://lists.apache.org/thread.html/rf2e90942996dceebac8296abf39257cfeb5ae918f82f7af3d37a48c5%40%3Cdev.pulsar.apache.org%3E - https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550%40%3Cdev.pulsar.apache.org%3E - https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550%40%3Cusers.pulsar.apache.org%3E - https://lists.apache.org/thread.html/r8e545559781231a83bf0644548c660255859e52feb86bbfcd42590da%40%3Cdev.pulsar.apache.org%3E - https://lists.apache.org/thread.html/r9a12b4da2f26ce9b8f7e7117a879efaa973dab7e54717bbc7923fab1%40%3Cdev.pulsar.apache.org%3E - https://lists.apache.org/thread.html/rbe845aa1573a61769b9c5916c62971f4b10de87c2ea5f38a97f0cf84%40%3Cdev.pulsar.apache.org%3E - https://lists.apache.org/thread.html/rca54f4b26ba5e6f2e39732b47ec51640e89f57e3b6a38ac3bab314df%40%3Cdev.pulsar.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1160.
CVE ID: CVE-2017-1160 Date Updated: 2024-08-05T13:25:17.312Z Date Published: 2017-04-17T21:00:00 Description: IBM Financial Transaction Manager for ACH Services for Multi-Platform 3.0.0.x is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 122892. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/97666 - http://www.ibm.com/support/docview.wss?uid=swg22001574 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-17100.
CVE ID: CVE-2019-17100 Date Updated: 2024-09-17T03:17:55.533Z Date Published: 2020-01-27T13:55:17.731390Z Description: An Untrusted Search Path vulnerability in bdserviceshost.exe as used in Bitdefender Total Security 2020 allows an attacker to execute arbitrary code. This issue does not affect: Bitdefender Total Security versions prior to 24.0.12.69. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.bitdefender.com/support/security-advisories/untrusted-search-path-vulnerability-bitdefender-total-security-2020-va-5895/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2099.
CVE ID: CVE-2009-2099 Date Updated: 2024-08-07T05:36:21.005Z Date Published: 2009-06-17T17:00:00 Description: SQL injection vulnerability in the iJoomla RSS Feeder (com_ijoomla_rss) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in an xml action to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/35379 - https://www.exploit-db.com/exploits/8959 - http://osvdb.org/55113 - http://secunia.com/advisories/35454 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6297.
CVE ID: CVE-2012-6297 Date Updated: 2024-08-06T21:28:39.621Z Date Published: 2020-02-06T17:01:25 Description: Command Injection vulnerability exists via a CSRF in DD-WRT 24-sp2 from specially crafted configuration values containing shell meta-characters, which could let a remote malicious user cause a Denial of Service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://packetstormsecurity.com/files/cve/CVE-2012-6297 - https://vuldb.com/?id.9527 - https://seclists.org/fulldisclosure/2013/Oct/241 - https://lists.openwall.net/bugtraq/2013/07/12/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-7193.
CVE ID: CVE-2008-7193 Date Updated: 2024-08-07T11:56:14.445Z Date Published: 2009-09-09T19:00:00 Description: PHPKIT 1.6.4 PL1 includes the session ID in the URL, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks by reading the PHPKITSID parameter from the HTTP Referer and using it in a request to (1) modify the user profile via upload_files/include.php or (2) create a new administrator via upload_files/pk/include.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/40033 - http://www.securityfocus.com/archive/1/487249/100/200/threaded - http://osvdb.org/50998 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4302.
CVE ID: CVE-2024-4302 Date Updated: 2024-08-01T20:33:53.106Z Date Published: 2024-04-29T05:46:52.134Z Description: Super 8 Live Chat online customer service platform fails to properly filter user input, allowing unauthenticated remote attackers to insert JavaScript code into the chat box. When the message recipient views the message, they become susceptible to Cross-site Scripting (XSS) attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.twcert.org.tw/tw/cp-132-7779-35562-1.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7217.
CVE ID: CVE-2019-7217 Date Updated: 2024-08-04T20:46:44.689Z Date Published: 2019-05-13T18:08:17 Description: Citrix ShareFile before 19.12 allows User Enumeration. It is possible to enumerate application username based on different server responses using the request to check the otp code. No authentication is required. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.sk-it.com/en/cve.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-47304.
CVE ID: CVE-2023-47304 Date Updated: 2024-08-02T21:09:36.139Z Date Published: 2023-12-05T00:00:00 Description: An issue was discovered in Vonage Box Telephone Adapter VDV23 version VDV21-3.2.11-0.5.1, allows local attackers to bypass UART authentication controls and read/write arbitrary values to the memory of the device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://trojanhorsey.substack.com/p/cve-2023-47304-unsecured-uart-in No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7231.
CVE ID: CVE-2020-7231 Date Updated: 2024-08-04T09:25:48.429Z Date Published: 2020-01-19T19:45:47 Description: Evoko Home 1.31 devices provide different error messages for failed login requests depending on whether the username is valid. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sku11army.blogspot.com/2020/01/evoko-otra-sala-por-favor.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6722.
CVE ID: CVE-2023-6722 Date Updated: 2024-08-02T08:35:14.917Z Date Published: 2023-12-13T10:09:02.058Z Description: A path traversal vulnerability has been detected in Repox, which allows an attacker to read arbitrary files on the running server, resulting in a disclosure of sensitive information. An attacker could access files such as application code or data, backend credentials, operating system files... No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-repox No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-35099.
CVE ID: CVE-2024-35099 Date Updated: 2024-08-20T16:20:11.768Z Date Published: N/A Description: TOTOLINK LR350 V9.3.5u.6698_B20230810 was discovered to contain a stack overflow via the password parameter in the function loginAuth. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/V9.3.5u.6698_B20230810/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3321.
CVE ID: CVE-2015-3321 Date Updated: 2024-08-06T05:47:56.270Z Date Published: 2017-10-02T18:00:00 Description: Services and files in Lenovo Fingerprint Manager before 8.01.42 have incorrect ACLs, which allows local users to invalidate local checks and gain privileges via standard filesystem operations. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.lenovo.com/us/en/product_security/lenovo_fpr No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34962.
CVE ID: CVE-2022-34962 Date Updated: 2024-08-03T09:22:10.883Z Date Published: 2022-07-25T17:17:53 Description: OpenTeknik LLC OSSN OPEN SOURCE SOCIAL NETWORK v6.3 LTS was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Group Timeline module. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.opensource-socialnetwork.org/ - https://github.com/opensource-socialnetwork/opensource-socialnetwork/releases/tag/6.3 - https://www.openteknik.com/contact?channel=ossn - https://grimthereaperteam.medium.com/cve-2022-34962-ossn-6-3-lts-stored-xss-vulnerability-at-group-timeline-6ebe28dd6034 - https://github.com/bypazs/CVE-2022-34962 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-27247.
CVE ID: CVE-2022-27247 Date Updated: 2024-08-03T05:25:32.257Z Date Published: 2022-05-13T14:25:12 Description: onlinetolls in cdSoft Onlinetools-Smart Winhotel.MX 2021 allows an attacker to download sensitive information about any customer (e.g., data of birth, full address, mail information, and phone number) via GastKont Insecure Direct Object Reference. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://myses.de/#about - https://myses.de/pdf/CVE2022-27247.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-44020.
CVE ID: CVE-2022-44020 Date Updated: 2024-08-03T13:47:05.330Z Date Published: 2022-10-29T00:00:00 Description: An issue was discovered in OpenStack Sushy-Tools through 0.21.0 and VirtualBMC through 2.2.2. Changing the boot device configuration with these packages removes password protection from the managed libvirt XML domain. NOTE: this only affects an "unsupported, production-like configuration." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://storyboard.openstack.org/#%21/story/2010382 - https://review.opendev.org/c/openstack/virtualbmc/+/862620 - https://review.opendev.org/c/openstack/sushy-tools/+/862625 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEQVJF3OQGSDCSQTQQSC54JEGLMSNB4Q/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAD7QJIUWPCKJIGYP7PPHH5DILOEONFE/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMSUGS4B6EBRHBJMTRXL5RIKJTZTEMJC/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1946.
CVE ID: CVE-2018-1946 Date Updated: 2024-09-16T17:23:45.265Z Date Published: 2019-02-21T17:00:00Z Description: IBM Security Identity Governance and Intelligence 5.2 through 5.2.4.1 Virtual Appliance supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties. IBM X-Force ID: 153388. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/docview.wss?uid=ibm10872142 - https://exchange.xforce.ibmcloud.com/vulnerabilities/153388 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4672.
CVE ID: CVE-2016-4672 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46445.
CVE ID: CVE-2021-46445 Date Updated: 2024-08-04T05:10:33.851Z Date Published: 2022-01-28T21:29:31 Description: H.H.G Multistore v5.1.0 and below was discovered to contain a SQL injection vulnerability via /admin/categories.php?box_group_id. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.hhg-multistore.com/ - https://github.com/blockomat2100/PoCs/blob/main/hhg_multistore/exploit_hhg_multistore.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5316.
CVE ID: CVE-2014-5316 Date Updated: 2024-08-06T11:41:48.317Z Date Published: 2014-09-22T01:00:00 Description: Cross-site scripting (XSS) vulnerability in Dotclear before 2.6.4 allows remote attackers to inject arbitrary web script or HTML via a crafted page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jvn.jp/en/jp/JVN61637002/index.html - http://www.securityfocus.com/bid/69985 - http://jvndb.jvn.jp/jvndb/JVNDB-2014-000110 - http://dotclear.org/blog/post/2014/08/18/Dotclear-2.6.4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32126.
CVE ID: CVE-2022-32126 Date Updated: 2024-08-03T07:32:55.961Z Date Published: 2022-06-22T18:42:03 Description: 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/PAINCLOWN/74cmsSE-Arbitrary-File-Reading/issues/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-3941.
CVE ID: CVE-2019-3941 Date Updated: 2024-08-04T19:26:27.534Z Date Published: 2019-04-09T15:06:37 Description: Advantech WebAccess 8.3.4 allows unauthenticated, remote attackers to delete arbitrary files via IOCTL 10005 RPC. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2019-15 - http://www.securityfocus.com/bid/107847 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2809.
CVE ID: CVE-2024-2809 Date Updated: 2024-08-01T20:52:37.087Z Date Published: 2024-03-22T05:31:04.573Z Description: A vulnerability, which was classified as critical, was found in Tenda AC15 15.03.05.18/15.03.20_multi. Affected is the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.257664 - https://vuldb.com/?ctiid.257664 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formSetFirewallCfg.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33648.
CVE ID: CVE-2022-33648 Date Updated: 2024-08-03T08:09:22.201Z Date Published: 2022-08-09T19:50:33 Description: Microsoft Excel Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33648 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30307.
CVE ID: CVE-2022-30307 Date Updated: 2024-08-03T06:48:35.769Z Date Published: 2022-11-02T00:00:00 Description: A key management error vulnerability [CWE-320] affecting the RSA SSH host key in FortiOS 7.2.0 and below, 7.0.6 and below, 6.4.9 and below may allow an unauthenticated attacker to perform a man in the middle attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/psirt/FG-IR-22-228 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1686.
CVE ID: CVE-2011-1686 Date Updated: 2024-08-06T22:37:25.461Z Date Published: 2011-04-22T10:00:00 Description: Multiple SQL injection vulnerabilities in Best Practical Solutions RT 2.0.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors, as demonstrated by reading data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2011/1071 - http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000188.html - https://bugzilla.redhat.com/show_bug.cgi?id=696795 - http://blog.bestpractical.com/2011/04/security-vulnerabilities-in-rt.html - http://www.securityfocus.com/bid/47383 - http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000187.html - http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000189.html - http://www.debian.org/security/2011/dsa-2220 - http://secunia.com/advisories/44189 - https://exchange.xforce.ibmcloud.com/vulnerabilities/66792 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24917.
CVE ID: CVE-2021-24917 Date Updated: 2024-08-03T19:49:13.491Z Date Published: 2021-12-06T15:55:30 Description: The WPS Hide Login WordPress plugin before 1.9.1 has a bug which allows to get the secret login page by setting a random referer string and making a request to /wp-admin/options.php as an unauthenticated user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/15bb711a-7d70-4891-b7a2-c473e3e8b375 - https://wordpress.org/support/topic/bypass-security-issue/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7873.
CVE ID: CVE-2020-7873 Date Updated: 2024-08-04T09:41:01.883Z Date Published: 2021-09-09T12:48:43 Description: Download of code without integrity check vulnerability in ActiveX control of Younglimwon Co., Ltd allows the attacker to cause a arbitrary file download and execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=36233 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-45583.
CVE ID: CVE-2023-45583 Date Updated: 2024-08-02T20:21:16.756Z Date Published: 2024-05-14T16:19:18.797Z Description: A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7.0.0 through 7.0.11, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 FortiPAM versions 1.1.0, 1.0.0 through 1.0.3 FortiOS versions 7.4.0, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15 FortiSwitchManager versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.2 allows attacker to execute unauthorized code or commands via specially crafted cli commands and http requests. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/psirt/FG-IR-23-137 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-3836.
CVE ID: CVE-2021-3836 Date Updated: 2024-08-03T17:09:09.506Z Date Published: 2021-12-14T15:20:13 Description: dbeaver is vulnerable to Improper Restriction of XML External Entity Reference No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/a98264fb-1930-4c7c-b774-af24c0175fd4 - https://github.com/dbeaver/dbeaver/commit/4debf8f25184b7283681ed3fb5e9e887d9d4fe22 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46788.
CVE ID: CVE-2021-46788 Date Updated: 2024-08-04T05:17:42.325Z Date Published: 2022-05-13T15:02:51 Description: Third-party pop-up window coverage vulnerability in the iConnect module.Successful exploitation of this vulnerability may cause system pop-up window may be covered to mislead users to perform incorrect operations. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2022/5/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5168.
CVE ID: CVE-2008-5168 Date Updated: 2024-08-07T10:40:17.302Z Date Published: 2008-11-19T18:00:00 Description: SQL injection vulnerability in tip.php in Tips Complete Website 1.2.0 allows remote attackers to execute arbitrary SQL commands via the tipid parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/30861 - http://www.securityfocus.com/bid/29967 - http://securityreason.com/securityalert/4614 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43401 - https://www.exploit-db.com/exploits/5947 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16819.
CVE ID: CVE-2017-16819 Date Updated: 2024-08-05T20:35:21.215Z Date Published: 2017-11-17T17:00:00 Description: A stored cross-site scripting vulnerability in the Icon Time Systems RTC-1000 v2.5.7458 and earlier time clock allows remote attackers to inject arbitrary JavaScript in the nameFirst (aka First Name) field for the employee details page (/employee.html) that is then reflected in multiple pages where that field data is utilized, resulting in session hijacking and possible elevation of privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/43158/ - https://www.keiththome.com/rtc-1000-vuln/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-48272.
CVE ID: CVE-2023-48272 Date Updated: 2024-08-02T21:23:39.482Z Date Published: 2023-11-30T16:37:39.965Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in yonifre Maspik – Spam Blacklist allows Stored XSS.This issue affects Maspik – Spam Blacklist: from n/a through 0.9.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/contact-forms-anti-spam/wordpress-maspik-spam-blacklist-plugin-0-9-2-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1020014.
CVE ID: CVE-2019-1020014 Date Updated: 2024-08-05T03:14:16.187Z Date Published: 2019-07-29T12:20:21 Description: docker-credential-helpers before 0.6.3 has a double free in the List functions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/docker/docker-credential-helpers/commit/1c9f7ede70a5ab9851f4c9cb37d317fd89cd318a - https://github.com/docker/docker-credential-helpers/releases/tag/v0.6.3 - https://usn.ubuntu.com/4103-1/ - https://usn.ubuntu.com/4103-2/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6VVFB6UWUK2GQQN7DVUU6GRRAL637A73/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-16979.
CVE ID: CVE-2018-16979 Date Updated: 2024-09-16T22:30:02.366Z Date Published: 2018-09-12T23:00:00Z Description: Monstra CMS V3.0.4 allows HTTP header injection in the plugins/captcha/crypt/cryptographp.php cfg parameter, a related issue to CVE-2012-2943. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/howchen/howchen/issues/4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12386.
CVE ID: CVE-2020-12386 Date Updated: 2024-08-04T11:56:51.679Z Date Published: 2021-02-17T13:52:14 Description: Out-of-bounds write in some Intel(R) Graphics Drivers before version 15.36.39.5143 may allow an authenticated user to potentially enable denial of service via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-7018.
CVE ID: CVE-2024-7018 Date Updated: 2024-09-24T19:57:44.817Z Date Published: 2024-09-23T21:56:29.423Z Description: Heap buffer overflow in PDF in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://issues.chromium.org/issues/333414305 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-43188.
CVE ID: CVE-2024-43188 Date Updated: 2024-09-18T16:40:53.717Z Date Published: 2024-09-18T11:39:22.958Z Description: IBM Business Automation Workflow 22.0.2, 23.0.1, 23.0.2, and 24.0.0 could allow a privileged user to perform unauthorized activities due to improper client side validation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7168769 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-43803.
CVE ID: CVE-2023-43803 Date Updated: 2024-09-12T20:05:16.159Z Date Published: 2023-10-18T20:36:29.697Z Description: Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can delete arbitrary files or folders belonging to the user that runs the Arduino Create Agent via a crafted HTTP POST request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/arduino/arduino-create-agent/security/advisories/GHSA-m5jc-r4gf-c6p8 - https://github.com/arduino/arduino-create-agent/releases/tag/1.3.3 - https://www.nozominetworks.com/blog/security-flaws-affect-a-component-of-the-arduino-create-cloud-ide - https://lists.debian.org/debian-lts-announce/2023/11/msg00005.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8523.
CVE ID: CVE-2016-8523 Date Updated: 2024-09-16T17:32:45.617Z Date Published: 2018-02-15T22:00:00Z Description: A Remote Arbitrary Code Execution vulnerability in HPE Smart Storage Administrator version before v2.60.18.0 was found. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05382349 - http://www.securityfocus.com/bid/95868 - https://www.exploit-db.com/exploits/41297/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7169.
CVE ID: CVE-2016-7169 Date Updated: 2024-08-06T01:50:47.517Z Date Published: 2017-01-05T02:00:00 Description: Directory traversal vulnerability in the File_Upload_Upgrader class in wp-admin/includes/class-file-upload-upgrader.php in the upgrade package uploader in WordPress before 4.6.1 allows remote authenticated users to access arbitrary files via a crafted urlholder parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/WordPress/WordPress/commit/54720a14d85bc1197ded7cb09bd3ea790caa0b6e - http://www.securityfocus.com/bid/92841 - https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/ - https://codex.wordpress.org/Version_4.6.1 - https://wpvulndb.com/vulnerabilities/8616 - http://www.debian.org/security/2016/dsa-3681 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1930.
CVE ID: CVE-2023-1930 Date Updated: 2024-08-02T06:05:26.787Z Date Published: 2023-04-06T20:05:30.159Z Description: The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the wpfc_clear_cache_of_allsites_callback function in versions up to, and including, 1.1.2. This makes it possible for authenticated attackers with subscriber-level access to delete caches. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/bae67a68-4bd1-4b52-b3dd-af0eef014028?source=cve - https://plugins.trac.wordpress.org/changeset/2893158/wp-fastest-cache/trunk/wpFastestCache.php?contextall=1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6707.
CVE ID: CVE-2014-6707 Date Updated: 2024-08-06T12:24:35.189Z Date Published: 2014-09-25T01:00:00 Description: The 7Sage LSAT Prep - Proctor (aka com.sevensage.lsat) application 2.1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/140297 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2482.
CVE ID: CVE-2010-2482 Date Updated: 2024-08-07T02:32:16.790Z Date Published: 2010-07-06T14:00:00 Description: LibTIFF 3.9.4 and earlier does not properly handle an invalid td_stripbytecount field, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted TIFF file, a different vulnerability than CVE-2010-2443. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://marc.info/?l=oss-security&m=127736307002102&w=2 - https://bugs.launchpad.net/bugs/597246 - https://bugzilla.redhat.com/show_bug.cgi?id=608010 - http://www.debian.org/security/2012/dsa-2552 - http://security.gentoo.org/glsa/glsa-201209-02.xml - https://bugzilla.redhat.com/show_bug.cgi?id=603024 - http://secunia.com/advisories/40422 - http://bugzilla.maptools.org/show_bug.cgi?id=1996 - http://marc.info/?l=oss-security&m=127738540902757&w=2 - http://marc.info/?l=oss-security&m=127797353202873&w=2 - http://www.openwall.com/lists/oss-security/2010/06/30/22 - http://secunia.com/advisories/50726 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20425.
CVE ID: CVE-2019-20425 Date Updated: 2024-08-05T02:39:09.924Z Date Published: 2020-01-27T04:21:15 Description: In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. In the function lustre_msg_string, there is no validation of a certain length value derived from lustre_msg_buflen_v2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://wiki.lustre.org/Lustre_2.12.3_Changelog - http://lustre.org/ - https://jira.whamcloud.com/browse/LU-12613 - https://review.whamcloud.com/#/c/36209/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15610.
CVE ID: CVE-2020-15610 Date Updated: 2024-08-04T13:22:30.547Z Date Published: 2020-07-28T17:01:15 Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_php_pecl.php. When parsing the modulo parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9728. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-20-757/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42276.
CVE ID: CVE-2021-42276 Date Updated: 2024-08-04T03:30:38.053Z Date Published: 2021-11-10T00:47:00 Description: Microsoft Windows Media Foundation Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42276 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5742.
CVE ID: CVE-2024-5742 Date Updated: 2024-09-25T05:49:51.693Z Date Published: 2024-06-12T08:53:02.256Z Description: A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2024:6986 - https://access.redhat.com/security/cve/CVE-2024-5742 - https://bugzilla.redhat.com/show_bug.cgi?id=2278574 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4427.
CVE ID: CVE-2023-4427 Date Updated: 2024-10-01T19:45:22.216Z Date Published: 2023-08-22T23:56:13.616Z Description: Out of bounds memory access in V8 in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html - https://crbug.com/1470668 - https://www.debian.org/security/2023/dsa-5483 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/ - http://packetstormsecurity.com/files/174951/Chrome-ReduceJSLoadPropertyWithEnumeratedKey-Out-Of-Bounds-Access.html - https://security.gentoo.org/glsa/202401-34 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1585.
CVE ID: CVE-2010-1585 Date Updated: 2024-08-07T01:28:41.795Z Date Published: 2010-04-28T22:00:00 Description: The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFragmentSink protection mechanism in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 does not properly sanitize HTML in a chrome document, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://downloads.avaya.com/css/P8/documents/100133195 - https://bugzilla.mozilla.org/show_bug.cgi?id=562547 - http://www.securityfocus.com/archive/1/510883/100/0/threaded - http://www.mandriva.com/security/advisories?name=MDVSA-2011:041 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12532 - http://www.security-assessment.com/files/whitepapers/Cross_Context_Scripting_with_Firefox.pdf - http://www.mozilla.org/security/announce/2011/mfsa2011-08.html - http://wizzrss.blat.co.za/2009/11/17/so-much-for-nsiscriptableunescapehtmlparsefragment/ - http://www.mandriva.com/security/advisories?name=MDVSA-2011:042 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2642.
CVE ID: CVE-2016-2642 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12748.
CVE ID: CVE-2019-12748 Date Updated: 2024-08-04T23:32:54.948Z Date Published: 2019-07-09T14:22:00 Description: TYPO3 8.3.0 through 8.7.26 and 9.0.0 through 9.5.7 allows XSS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://typo3.org/security/advisory/typo3-core-sa-2019-015/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-30866.
CVE ID: CVE-2024-30866 Date Updated: 2024-08-02T01:39:00.940Z Date Published: 2024-04-01T00:00:00 Description: netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /3g/menu.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-menu.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2100.
CVE ID: CVE-2011-2100 Date Updated: 2024-08-06T22:53:15.986Z Date Published: 2011-06-16T23:00:00 Description: Untrusted search path vulnerability in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14057 - https://exchange.xforce.ibmcloud.com/vulnerabilities/68014 - http://www.securityfocus.com/bid/48252 - http://www.adobe.com/support/security/bulletins/apsb11-16.html - http://www.us-cert.gov/cas/techalerts/TA11-166A.html - http://www.securitytracker.com/id?1025658 - http://osvdb.org/73062 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1000419.
CVE ID: CVE-2018-1000419 Date Updated: 2024-08-05T12:40:46.917Z Date Published: 2019-01-09T23:00:00 Description: An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to obtain credentials IDs for credentials stored in Jenkins. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/106532 - https://jenkins.io/security/advisory/2018-09-25/#SECURITY-984%20%282%29 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0783.
CVE ID: CVE-2017-0783 Date Updated: 2024-09-17T04:18:51.494Z Date Published: 2017-09-14T19:00:00Z Description: A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63145701. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - https://source.android.com/security/bulletin/2017-09-01 - http://www.securityfocus.com/bid/100811 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11829.
CVE ID: CVE-2020-11829 Date Updated: 2024-08-04T11:42:00.232Z Date Published: 2020-11-19T15:51:07 Description: Dynamic loading of services in the backup and restore SDK leads to elevated privileges, affected product is com.coloros.codebook V2.0.0_5493e40_200722. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.oppo.com/en/noticedetails.html?noticeId=NOTICE-1328876061836189696 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43020.
CVE ID: CVE-2022-43020 Date Updated: 2024-08-03T13:26:02.662Z Date Published: 2022-10-19T00:00:00 Description: OpenCATS v0.9.6 was discovered to contain a SQL injection vulnerability via the tag_id variable in the Tag update function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_in_Tag_Updates.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10549.
CVE ID: CVE-2019-10549 Date Updated: 2024-08-04T22:24:18.826Z Date Published: 2020-03-05T08:56:03 Description: Null pointer dereference issue can happen due to improper validation of CSEQ header response received from network in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, Nicobar, QCM2150, QM215, Rennell, SC8180X, SDM429, SDM429W, SDM439, SDM450, SDM632, SDX24, SDX55, SM6150, SM7150, SM8150 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7911.
CVE ID: CVE-2017-7911 Date Updated: 2024-08-05T16:19:28.663Z Date Published: 2017-05-06T00:00:00 Description: A Code Injection issue was discovered in CyberVision Kaa IoT Platform, Version 0.7.4. An insufficient-encapsulation vulnerability has been identified, which may allow remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2017-19 - http://www.securityfocus.com/bid/98256 - https://ics-cert.us-cert.gov/advisories/ICSA-17-122-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1183.
CVE ID: CVE-2023-1183 Date Updated: 2024-08-02T05:40:58.213Z Date Published: 2023-07-10T15:04:30.740Z Description: A flaw was found in the Libreoffice package. An attacker can craft an odb containing a "database/script" file with a SCRIPT command where the contents of the file could be written to a new file whose location was determined by the attacker. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/security/cve/CVE-2023-1183 - https://bugzilla.redhat.com/show_bug.cgi?id=2208506 - https://www.libreoffice.org/about-us/security/advisories/cve-2023-1183/ - http://www.openwall.com/lists/oss-security/2023/12/28/4 - http://www.openwall.com/lists/oss-security/2024/01/03/4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6243.
CVE ID: CVE-2018-6243 Date Updated: 2024-08-05T06:01:47.692Z Date Published: 2019-05-07T19:36:19 Description: NVIDIA Tegra TLK Widevine Trust Application contains a vulnerability in which missing the input parameter checking of video metadata count may lead to Arbitrary Code Execution, Denial of Service or Escalation of Privileges. Android ID: A-72315075. Severity Rating: High. Version: N/A. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2019-05-01 - http://www.securityfocus.com/bid/108287 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19507.
CVE ID: CVE-2019-19507 Date Updated: 2024-08-05T02:16:48.050Z Date Published: 2019-12-02T16:17:45 Description: In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/manvel-khnkoyan/jpv/issues/6 - https://www.npmjs.com/package/jpv No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20091.
CVE ID: CVE-2021-20091 Date Updated: 2024-08-03T17:30:07.625Z Date Published: 2021-04-29T14:29:09 Description: The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly sanitize user input. An authenticated remote attacker could leverage this vulnerability to alter device configuration, potentially gaining remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2021-13 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16227.
CVE ID: CVE-2019-16227 Date Updated: 2024-08-05T01:10:41.562Z Date Published: 2019-09-11T14:47:02 Description: An issue was discovered in py-lmdb 0.97. For certain values of mn_flags, mdb_cursor_set triggers a memcpy with an invalid write operation within mdb_xcursor_init1. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/TeamSeri0us/pocs/tree/master/lmdb/lmdb%20memcpy%20illegal%20dst No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16713.
CVE ID: CVE-2020-16713 Date Updated: 2021-12-20T22:50:35 Date Published: 2021-12-20T22:50:35 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12782.
CVE ID: CVE-2018-12782 Date Updated: 2024-08-05T08:45:02.071Z Date Published: 2018-07-20T19:00:00 Description: Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Double Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb18-21.html - http://www.securitytracker.com/id/1041250 - http://www.securityfocus.com/bid/104701 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-2507.
CVE ID: CVE-2020-2507 Date Updated: 2024-09-16T19:40:15.957Z Date Published: 2021-02-03T15:51:16.772551Z Description: The vulnerability have been reported to affect earlier versions of QTS. If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. This issue affects: QNAP Systems Inc. Helpdesk versions prior to 3.0.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qnap.com/zh-tw/security-advisory/qsa-20-08 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-13590.
CVE ID: CVE-2019-13590 Date Updated: 2024-08-04T23:57:39.466Z Date Published: 2019-07-14T00:00:00 Description: An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sourceforge.net/p/sox/bugs/325/ - https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11406.
CVE ID: CVE-2019-11406 Date Updated: 2024-08-04T22:55:40.913Z Date Published: 2019-05-08T17:27:38 Description: Subrion CMS 4.2.1 allows _core/en/contacts/ XSS via the name, email, or phone parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/intelliants/subrion/commits/develop - https://github.com/intelliants/subrion/issues/821 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20191.
CVE ID: CVE-2021-20191 Date Updated: 2024-08-03T17:30:07.571Z Date Published: 2021-05-26T00:00:00 Description: A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1916813 - https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-4041.
CVE ID: CVE-2020-4041 Date Updated: 2024-08-04T07:52:20.827Z Date Published: 2020-06-08T22:05:14 Description: In Bolt CMS before version 3.7.1, the filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it. Additionally, the measures to prevent renaming the file to disallowed filename extensions could be circumvented. This is fixed in Bolt 3.7.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/bolt/bolt/pull/7853 - https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f - https://github.com/bolt/bolt/security/advisories/GHSA-68q3-7wjp-7q3j - http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html - http://seclists.org/fulldisclosure/2020/Jul/4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18635.
CVE ID: CVE-2019-18635 Date Updated: 2024-08-05T01:54:14.550Z Date Published: 2019-10-30T21:58:14 Description: An issue was discovered in Mooltipass Moolticute through v0.42.1 and v0.42.x-testing through v0.42.5-testing. There is a NULL pointer dereference in MPDevice_win.cpp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://securiteam.io/2019/10/27/a-null-pointer-dereference/ - https://github.com/mooltipass/moolticute/pull/483 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-35787.
CVE ID: CVE-2024-35787 Date Updated: 2024-08-02T03:21:47.386Z Date Published: 2024-05-17T12:24:35.137Z Description: In the Linux kernel, the following vulnerability has been resolved: md/md-bitmap: fix incorrect usage for sb_index Commit d7038f951828 ("md-bitmap: don't use ->index for pages backing the bitmap file") removed page->index from bitmap code, but left wrong code logic for clustered-md. current code never set slot offset for cluster nodes, will sometimes cause crash in clustered env. Call trace (partly): md_bitmap_file_set_bit+0x110/0x1d8 [md_mod] md_bitmap_startwrite+0x13c/0x240 [md_mod] raid1_make_request+0x6b0/0x1c08 [raid1] md_handle_request+0x1dc/0x368 [md_mod] md_submit_bio+0x80/0xf8 [md_mod] __submit_bio+0x178/0x300 submit_bio_noacct_nocheck+0x11c/0x338 submit_bio_noacct+0x134/0x614 submit_bio+0x28/0xdc submit_bh_wbc+0x130/0x1cc submit_bh+0x1c/0x28 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/736ad6c577a367834118f57417038d45bb5e0a31 - https://git.kernel.org/stable/c/55e55eb65fd5e09faf5a0e49ffcdd37905aaf4da - https://git.kernel.org/stable/c/5a95815b17428ce2f56ec18da5e0d1b2a1a15240 - https://git.kernel.org/stable/c/ecbd8ebb51bf7e4939d83b9e6022a55cac44ef06 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5642.
CVE ID: CVE-2012-5642 Date Updated: 2024-08-06T21:14:16.279Z Date Published: 2012-12-31T11:00:00 Description: server/action.py in Fail2ban before 0.8.8 does not properly handle the content of the matches tag, which might allow remote attackers to trigger unsafe behavior in a custom action file via unspecified symbols in this content. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2012/12/17/2 - https://github.com/fail2ban/fail2ban/commit/83109bc - http://sourceforge.net/mailarchive/message.php?msg_id=30193056 - https://raw.github.com/fail2ban/fail2ban/master/ChangeLog - https://bugs.gentoo.org/show_bug.cgi?id=447572 - http://lists.opensuse.org/opensuse-updates/2013-04/msg00002.html - https://bugzilla.redhat.com/show_bug.cgi?id=887914 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:078 - http://lists.opensuse.org/opensuse-updates/2013-04/msg00001.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-29136.
CVE ID: CVE-2024-29136 Date Updated: 2024-08-08T18:31:05.631Z Date Published: 2024-03-19T13:48:09.169Z Description: Deserialization of Untrusted Data vulnerability in Themefic Tourfic.This issue affects Tourfic: from n/a through 2.11.17. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/tourfic/wordpress-tourfic-plugin-2-11-17-php-object-injection-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.