instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2023-3626.
CVE ID: CVE-2023-3626 Date Updated: 2024-08-02T07:01:57.076Z Date Published: 2023-07-11T18:00:04.259Z Description: A vulnerability, which was classified as critical, has been found in Suncreate Mountain Flood Disaster Prevention Monitoring and Early Warning System up to 20230706. This issue affects some unknown processing of the file /Duty/AjaxHandle/UpLoadFloodPlanFile.ashx of the component UpLoadFloodPlanFile. The manipulation of the argument Filedata leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233579. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.233579 - https://vuldb.com/?ctiid.233579 - https://github.com/MoeMion233/cve/blob/main/2.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25084.
CVE ID: CVE-2022-25084 Date Updated: 2024-08-03T04:29:01.919Z Date Published: 2022-02-22T22:44:12 Description: TOTOLink T6 V5.9c.4085_B20190428 was discovered to contain a command injection vulnerability in the "Main" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/T6/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24256.
CVE ID: CVE-2021-24256 Date Updated: 2024-08-03T19:28:22.736Z Date Published: 2021-05-05T18:28:45 Description: The “Elementor – Header, Footer & Blocks Template” WordPress Plugin before 1.5.8 has two widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/blog/2021/04/recent-patches-rock-the-elementor-ecosystem/ - https://wpscan.com/vulnerability/a9412fed-aed3-4931-a504-1a86f876892e No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-9033.
CVE ID: CVE-2015-9033 Date Updated: 2024-08-06T08:36:31.433Z Date Published: 2017-06-13T20:00:00 Description: In all Android releases from CAF using the Linux kernel, a QTEE system call fails to validate a pointer. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-06-01 - http://www.securityfocus.com/bid/98874 - http://www.securitytracker.com/id/1038623 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46482.
CVE ID: CVE-2021-46482 Date Updated: 2024-08-04T05:10:34.998Z Date Published: 2022-01-25T00:24:07 Description: Jsish v3.5.0 was discovered to contain a heap buffer overflow via NumberConstructor at src/jsiNumber.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/pcmacdon/jsish/issues/66 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6713.
CVE ID: CVE-2019-6713 Date Updated: 2024-08-04T20:31:04.046Z Date Published: 2019-01-23T21:00:00 Description: app\admin\controller\RouteController.php in ThinkCMF 5.0.190111 allows remote attackers to execute arbitrary PHP code by using vectors involving portal/List/index and list/:id to inject this code into data\conf\route.php, as demonstrated by a file_put_contents call. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ttk7.cn/post-108.html - https://www.thinkcmf.com/download.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1665.
CVE ID: CVE-2010-1665 Date Updated: 2024-08-07T01:28:42.642Z Date Published: 2010-04-30T17:00:00 Description: Google Chrome before 4.1.249.1064 does not properly handle fonts, which allows remote attackers to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 - http://www.vupen.com/english/advisories/2010/2722 - http://code.google.com/p/chromium/issues/detail?id=42294 - http://www.ubuntu.com/usn/USN-1006-1 - http://secunia.com/advisories/41856 - http://secunia.com/advisories/39651 - http://googlechromereleases.blogspot.com/2010/04/stable-update-bug-and-security-fixes.html - http://www.vupen.com/english/advisories/2010/1016 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7034 - http://www.vupen.com/english/advisories/2011/0552 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0802.
CVE ID: CVE-2023-0802 Date Updated: 2024-08-02T05:24:34.508Z Date Published: 2023-02-13T00:00:00 Description: LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00 - https://gitlab.com/libtiff/libtiff/-/issues/500 - https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0802.json - https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html - https://www.debian.org/security/2023/dsa-5361 - https://security.netapp.com/advisory/ntap-20230316-0002/ - https://security.gentoo.org/glsa/202305-31 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6388.
CVE ID: CVE-2008-6388 Date Updated: 2024-08-07T11:27:35.687Z Date Published: 2009-03-02T19:00:00 Description: Rapid Classified 3.1 and 3.15 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file via a direct request to cldb.mdb. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/47016 - https://www.exploit-db.com/exploits/7324 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0262.
CVE ID: CVE-2015-0262 Date Updated: 2018-02-21T13:57:01 Date Published: 2018-02-21T14:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0910.
CVE ID: CVE-2017-0910 Date Updated: 2024-09-17T01:26:15.105Z Date Published: 2017-11-27T16:00:00Z Description: In Zulip Server before 1.7.1, on a server with multiple realms, a vulnerability in the invitation system lets an authorized user of one realm on the server create a user account on any other realm. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/zulip/zulip/commit/960d736e55cbb9386a68e4ee45f80581fd2a4e32 - http://blog.zulip.org/2017/11/23/zulip-1-7-1-released/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0113.
CVE ID: CVE-2008-0113 Date Updated: 2024-08-07T07:32:23.902Z Date Published: 2008-03-11T23:00:00 Description: Unspecified vulnerability in Microsoft Office Excel Viewer 2003 up to SP3 allows user-assisted remote attackers to execute arbitrary code via an Excel document with malformed cell comments that trigger memory corruption from an "allocation error," aka "Microsoft Office Cell Parsing Memory Corruption Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.zerodayinitiative.com/advisories/ZDI-08-008 - http://www.us-cert.gov/cas/techalerts/TA08-071A.html - http://secunia.com/advisories/29321 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-016 - http://marc.info/?l=bugtraq&m=120585858807305&w=2 - http://marc.info/?l=bugtraq&m=120585858807305&w=2 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5421 - http://www.securityfocus.com/archive/1/489415/100/0/threaded - http://www.vupen.com/english/advisories/2008/0848/references - http://www.securitytracker.com/id?1019578 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6903.
CVE ID: CVE-2017-6903 Date Updated: 2024-08-05T15:41:17.741Z Date Published: 2017-03-14T22:00:00 Description: In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A malicious auto-downloaded file can contain configuration defaults that override the user's. Executable bytecode in a malicious auto-downloaded file can set configuration variables to values that will result in unwanted native code DLLs being loaded, resulting in sandbox escape. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/iortcw/iortcw/commit/11a83410153756ae350a82ed41b08d128ff7f998 - http://www.debian.org/security/2017/dsa-3812 - https://github.com/iortcw/iortcw/commit/b248763e4878ef12d5835ece6600be8334f67da1 - https://github.com/ioquake/ioq3/commit/b173ac05993f634a42be3d3535e1b158de0c3372 - https://github.com/JACoders/OpenJK/commit/8956a35e7b91c4a0dd1fa6db1d28c7f0efbab2d7 - https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d - https://ioquake3.org/2017/03/13/important-security-update-please-update-ioquake3-immediately/ - https://github.com/ioquake/ioq3/commit/376267d534476a875d8b9228149c4ee18b74a4fd - https://github.com/iortcw/iortcw/commit/b6ff2bcb1e4e6976d61e316175c6d7c99860fe20 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857699 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1612.
CVE ID: CVE-2023-1612 Date Updated: 2024-08-02T05:57:24.493Z Date Published: 2023-03-23T20:31:03.701Z Description: A vulnerability, which was classified as critical, was found in Rebuild up to 3.2.3. This affects an unknown part of the file /files/list-file. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-223743. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.223743 - https://vuldb.com/?ctiid.223743 - https://github.com/getrebuild/rebuild/issues/598 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6827.
CVE ID: CVE-2014-6827 Date Updated: 2024-08-06T12:31:47.193Z Date Published: 2014-09-30T10:00:00 Description: The DK ONLINE Beta (aka com.sgmobile.dkonline) application 1.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/358185 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16674.
CVE ID: CVE-2019-16674 Date Updated: 2024-08-05T01:17:41.079Z Date Published: 2019-12-06T17:09:17 Description: An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Authentication Information used in a cookie is predictable and can lead to admin password compromise when captured on the network. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert.vde.com/en-us/advisories - https://cert.vde.com/en-us/advisories/vde-2019-018 - https://mdcop.weidmueller.com/mediadelivery/asset/900_102694 - https://www.us-cert.gov/ics/advisories/icsa-19-339-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6654.
CVE ID: CVE-2018-6654 Date Updated: 2024-09-17T01:41:14.664Z Date Published: 2018-02-06T01:00:00Z Description: The Grammarly extension before 2018-02-02 for Chrome allows remote attackers to discover authentication tokens via an 'action: "user"' request to iframe.gr_-ifr, because the exposure of these tokens is not restricted to any specific web site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.chromium.org/p/project-zero/issues/detail?id=1527 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6085.
CVE ID: CVE-2024-6085 Date Updated: 2024-08-01T21:25:03.365Z Date Published: 2024-06-27T18:45:15.903Z Description: A path traversal vulnerability exists in the XTTS server included in the lollms package, version v9.6. This vulnerability arises from the ability to perform an unauthenticated root folder settings change. Although the read file endpoint is protected against path traversals, this protection can be bypassed by changing the root folder to '/'. This allows attackers to read arbitrary files on the system. Additionally, the output folders can be changed to write arbitrary audio files to any location on the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.com/bounties/d2fb73d7-4b4f-451a-8763-484c189a27fe No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3016.
CVE ID: CVE-2023-3016 Date Updated: 2024-08-02T06:41:04.189Z Date Published: 2023-05-31T14:00:05.898Z Description: A vulnerability was found in yiwent Vip Video Analysis 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/admincore.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230360. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.230360 - https://vuldb.com/?ctiid.230360 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/VIP-video-analysis/XSS.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5616.
CVE ID: CVE-2008-5616 Date Updated: 2024-08-07T10:56:47.334Z Date Published: 2008-12-17T01:00:00 Description: Stack-based buffer overflow in the demux_open_vqf function in libmpdemux/demux_vqf.c in MPlayer 1.0 rc2 before r28150 allows remote attackers to execute arbitrary code via a malformed TwinVQ file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/34845 - http://www.mandriva.com/security/advisories?name=MDVSA-2009:014 - http://www.mandriva.com/security/advisories?name=MDVSA-2009:013 - http://www.securityfocus.com/bid/32822 - http://www.securityfocus.com/archive/1/499214/100/0/threaded - http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?r1=24723&r2=28150&pathrev=28150 - http://www.debian.org/security/2009/dsa-1782 - http://trapkit.de/advisories/TKADV2008-014.txt - http://svn.mplayerhq.hu/mplayer/branches/1.0rc2/libmpdemux/demux_vqf.c?view=log&pathrev=28150#rev28150 - http://secunia.com/advisories/33136 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-19016.
CVE ID: CVE-2018-19016 Date Updated: 2024-08-05T11:23:08.659Z Date Published: 2019-03-27T17:20:15 Description: Rockwell Automation EtherNet/IP Web Server Modules 1756-EWEB (includes 1756-EWEBK) Version 5.001 and earlier, and CompactLogix 1768-EWEB Version 2.005 and earlier. A remote attacker could send a crafted UDP packet to the SNMP service causing a denial-of-service condition to occur until the affected product is restarted. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-19-036-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28183.
CVE ID: CVE-2024-28183 Date Updated: 2024-08-02T00:48:49.763Z Date Published: 2024-03-25T14:31:28.466Z Description: ESP-IDF is the development framework for Espressif SoCs supported on Windows, Linux and macOS. A Time-of-Check to Time-of-Use (TOCTOU) vulnerability was discovered in the implementation of the ESP-IDF bootloader which could allow an attacker with physical access to flash of the device to bypass anti-rollback protection. Anti-rollback prevents rollback to application with security version lower than one programmed in eFuse of chip. This attack can allow to boot past (passive) application partition having lower security version of the same device even in the presence of the flash encryption scheme. The attack requires carefully modifying the flash contents after the anti-rollback checks have been performed by the bootloader (before loading the application). The vulnerability is fixed in 4.4.7 and 5.2.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/espressif/esp-idf/security/advisories/GHSA-22x6-3756-pfp8 - https://github.com/espressif/esp-idf/commit/3305cb4d235182067936f8e940e6db174e25b4b2 - https://github.com/espressif/esp-idf/commit/4c95aa445d4e84f01f86b6f3a552aa299276abf3 - https://github.com/espressif/esp-idf/commit/534e3ad1fa68526a5f989fb2163856d6b7cd2c87 - https://github.com/espressif/esp-idf/commit/7003f1ef0dffc73c34eb153d1b0710babb078149 - https://github.com/espressif/esp-idf/commit/b2cdc0678965790f49afeb6e6b0737cd24433a05 - https://github.com/espressif/esp-idf/commit/c33b9e1426121ce8cccf1a94241740be9cff68de - https://github.com/espressif/esp-idf/commit/f327ddf6adab0c28d395975785727b2feef57803 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27383.
CVE ID: CVE-2023-27383 Date Updated: 2024-08-02T12:09:43.364Z Date Published: 2023-11-14T19:05:05.093Z Description: Protection mechanism failure in some Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-3910.
CVE ID: CVE-2021-3910 Date Updated: 2024-09-17T03:27:37.742Z Date Published: 2021-11-11T21:45:21.177058Z Description: OctoRPKI crashes when encountering a repository that returns an invalid ROA (just an encoded NUL (\0) character). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/cloudflare/cfrpki/security/advisories/GHSA-5mxh-2qfv-4g7j - https://www.debian.org/security/2022/dsa-5041 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30671.
CVE ID: CVE-2021-30671 Date Updated: 2024-08-03T22:40:32.133Z Date Published: 2021-09-08T14:25:56 Description: A validation issue was addressed with improved logic. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina. A malicious application may be able to send unauthorized Apple events to Finder. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT212529 - https://support.apple.com/en-us/HT212530 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17208.
CVE ID: CVE-2017-17208 Date Updated: 2019-03-05T19:57:01 Date Published: 2019-03-05T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-29982.
CVE ID: CVE-2022-29982 Date Updated: 2024-08-03T06:40:47.247Z Date Published: 2022-05-12T14:10:53 Description: Simple Client Management System 1.0 is vulnerable to SQL Injection via /cms/admin/maintenance/manage_service.php?id=. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/simple-client-management-system/SQLi-9.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6955.
CVE ID: CVE-2013-6955 Date Updated: 2024-08-06T17:53:45.550Z Date Published: 2014-01-09T11:00:00 Description: webman/imageSelector.cgi in Synology DiskStation Manager (DSM) 4.0 before 4.0-2259, 4.2 before 4.2-3243, and 4.3 before 4.3-3810 Update 1 allows remote attackers to append data to arbitrary files, and consequently execute arbitrary code, via a pathname in the SLICEUPLOAD X-TMP-FILE HTTP header. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/615910 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3447.
CVE ID: CVE-2011-3447 Date Updated: 2024-09-17T00:26:30.041Z Date Published: 2012-02-02T18:00:00Z Description: CFNetwork in Apple Mac OS X 10.7.x before 10.7.3 does not properly construct request headers during parsing of URLs, which allows remote attackers to obtain sensitive information via a malformed URL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/kb/HT5130 - http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2217.
CVE ID: CVE-2014-2217 Date Updated: 2024-08-06T10:06:00.211Z Date Published: 2014-12-25T21:00:00 Description: Absolute path traversal vulnerability in the RadAsyncUpload control in the RadControls in Telerik UI for ASP.NET AJAX before Q3 2012 SP2 allows remote attackers to write to arbitrary files, and consequently execute arbitrary code, via a full pathname in the UploadID metadata value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://itq.nl/arbitrary-file-write-in-telerik-ui-for-asp-net-ajax/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7945.
CVE ID: CVE-2020-7945 Date Updated: 2024-08-04T09:48:24.936Z Date Published: 2020-09-18T17:58:51 Description: Local registry credentials were included directly in the CD4PE deployment definition, which could expose these credentials to users who should not have access to them. This is resolved in Continuous Delivery for Puppet Enterprise 4.0.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://puppet.com/security/cve/CVE-2020-7945 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2243.
CVE ID: CVE-2014-2243 Date Updated: 2024-08-06T10:06:00.267Z Date Published: 2014-03-02T02:00:00 Description: includes/User.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 terminates validation of a user token upon encountering the first incorrect character, which makes it easier for remote attackers to obtain access via a brute-force attack that relies on timing differences in responses to incorrect token guesses. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://openwall.com/lists/oss-security/2014/02/28/1 - https://bugzilla.wikimedia.org/show_bug.cgi?id=61346 - http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html - https://bugzilla.redhat.com/show_bug.cgi?id=1071136 - http://openwall.com/lists/oss-security/2014/03/01/2 - https://gerrit.wikimedia.org/r/#/q/I2a9e89120f7092015495e638c6fa9f67adc9b84f%2Cn%2Cz No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34315.
CVE ID: CVE-2024-34315 Date Updated: 2024-08-02T02:51:10.999Z Date Published: 2024-05-07T00:00:00 Description: CmsEasy v7.7.7.9 was discovered to contain a local file inclusion vunerability via the file_get_contents function in the fckedit_action method of /admin/template_admin.php. This vulnerability allows attackers to read arbitrary files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/H3rmesk1t/vulnerability-paper/blob/main/CmsEasy-7.7.7.9-File%20Inclusion2.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-2817.
CVE ID: CVE-2020-2817 Date Updated: 2024-09-27T19:08:16.602Z Date Published: 2020-04-15T13:29:47 Description: Vulnerability in the Oracle Scripting product of Oracle E-Business Suite (component: Miscellaneous). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Scripting. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Scripting, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Scripting accessible data as well as unauthorized update, insert or delete access to some of Oracle Scripting accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27477.
CVE ID: CVE-2024-27477 Date Updated: 2024-08-19T07:47:55.998Z Date Published: 2024-04-10T00:00:00 Description: In Leantime 3.0.6, a Cross-Site Scripting vulnerability exists within the ticket creation and modification functionality, allowing attackers to inject malicious JavaScript code into the title field of tickets (also known as to-dos). This stored XSS vulnerability can be exploited to perform Server-Side Request Forgery (SSRF) attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Leantime/leantime/blob/264a7dbc2c9b18f574821bf27dd568a287ee8498/app/Domain/Tickets/Controllers/ShowTicket.php#L20 - https://drive.proton.me/urls/35CKB8RV04#sEubCKVOuXqt - https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0088.
CVE ID: CVE-2016-0088 Date Updated: 2024-08-05T22:08:12.825Z Date Published: 2016-04-12T23:00:00 Description: Hyper-V in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-045 - http://www.securitytracker.com/id/1035538 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18797.
CVE ID: CVE-2017-18797 Date Updated: 2024-08-05T21:37:43.964Z Date Published: 2020-04-21T18:37:00 Description: Certain NETGEAR devices are affected by an attacker's ability to read arbitrary files. This affects R6400 before 1.0.1.24, R7900 before 1.0.1.18, R8000 before 1.0.3.54, and R8500 before 1.0.2.100. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000049365/Security-Advisory-for-Arbitrary-File-Read-Vulnerability-on-Some-Routers-PSV-2017-0318 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3618.
CVE ID: CVE-2015-3618 Date Updated: 2024-08-06T05:47:57.719Z Date Published: 2018-02-06T16:00:00 Description: Cross-site scripting (XSS) vulnerability in Nagios Business Process Intelligence (BPI) before 2.3.4 allows remote attackers to inject arbitrary web script or HTML via vectors involving index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/zeroday/FG-VD-15-011 - https://assets.nagios.com/downloads/exchange/nagiosbpi/CHANGELOG.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-35296.
CVE ID: CVE-2023-35296 Date Updated: 2024-08-02T16:23:59.664Z Date Published: 2023-07-11T17:03:19.728Z Description: Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35296 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30199.
CVE ID: CVE-2023-30199 Date Updated: 2024-08-02T14:21:44.541Z Date Published: 2023-05-19T00:00:00 Description: Prestashop customexporter <= 1.7.20 is vulnerable to Incorrect Access Control via modules/customexporter/downloads/download.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/PrestaShop/PrestaShop/blob/6c05518b807d014ee8edb811041e3de232520c28/classes/Tools.php#L1247 - https://friends-of-presta.github.io/security-advisories/modules/2023/05/16/customexporter.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1539.
CVE ID: CVE-2009-1539 Date Updated: 2024-08-07T05:20:33.447Z Date Published: 2009-07-15T15:00:00 Description: The QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 does not properly validate unspecified size fields in QuickTime media files, which allows remote attackers to execute arbitrary code via a crafted file, aka "DirectX Size Validation Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 - http://osvdb.org/55845 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6341 - http://www.vupen.com/english/advisories/2009/1886 - http://www.us-cert.gov/cas/techalerts/TA09-195A.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0543.
CVE ID: CVE-2014-0543 Date Updated: 2024-08-06T09:20:19.849Z Date Published: 2014-08-12T22:00:00 Description: Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK & Compiler before 14.0.0.178 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2014-0540, CVE-2014-0542, CVE-2014-0544, and CVE-2014-0545. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/60710 - http://secunia.com/advisories/60732 - http://helpx.adobe.com/security/products/flash-player/apsb14-18.html - http://www.securitytracker.com/id/1030712 - http://security.gentoo.org/glsa/glsa-201408-05.xml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-24975.
CVE ID: CVE-2023-24975 Date Updated: 2024-08-02T11:11:43.458Z Date Published: 2023-03-02T20:33:41.451Z Description: IBM Spectrum Symphony 7.3 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 247030. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6959369 - https://exchange.xforce.ibmcloud.com/vulnerabilities/247030 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20247.
CVE ID: CVE-2019-20247 Date Updated: 2022-09-29T16:51:53 Date Published: 2020-01-02T20:33:06 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-31418.
CVE ID: CVE-2023-31418 Date Updated: 2024-08-02T14:53:30.904Z Date Published: 2023-10-26T17:36:42.723Z Description: An issue has been identified with how Elasticsearch handled incoming requests on the HTTP layer. An unauthenticated user could force an Elasticsearch node to exit with an OutOfMemory error by sending a moderate number of malformed HTTP requests. The issue was identified by Elastic Engineering and we have no indication that the issue is known or that it is being exploited in the wild. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://discuss.elastic.co/t/elasticsearch-8-9-0-7-17-13-security-update/343616 - https://www.elastic.co/community/security - https://security.netapp.com/advisory/ntap-20231130-0005/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20781.
CVE ID: CVE-2023-20781 Date Updated: 2024-08-02T09:14:41.208Z Date Published: 2023-08-07T03:21:02.665Z Description: In keyinstall, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017756; Issue ID: ALPS07905323. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/August-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4825.
CVE ID: CVE-2017-4825 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6232.
CVE ID: CVE-2014-6232 Date Updated: 2024-08-06T12:10:12.619Z Date Published: 2014-09-11T14:00:00 Description: Unspecified vulnerability in the LDAP (eu_ldap) extension before 2.8.18 for TYPO3 allows remote authenticated users to obtain sensitive information via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://typo3.org/extensions/repository/view/eu_ldap - http://secunia.com/advisories/60886 - http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010 - http://www.securityfocus.com/bid/69565 - https://exchange.xforce.ibmcloud.com/vulnerabilities/95701 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30875.
CVE ID: CVE-2021-30875 Date Updated: 2024-08-03T22:48:13.637Z Date Published: 2021-08-24T18:49:40 Description: A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in iOS 15.1 and iPadOS 15.1. A local attacker may be able to view contacts from the lock screen. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT212867 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-22938.
CVE ID: CVE-2023-22938 Date Updated: 2024-08-02T10:20:31.381Z Date Published: 2023-02-14T17:24:46.893Z Description: In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘sendemail’ REST API endpoint lets any authenticated user send an email as the Splunk instance. The endpoint is now restricted to the ‘splunk-system-user’ account on the local instance. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://advisory.splunk.com/advisories/SVD-2023-0208 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50351.
CVE ID: CVE-2023-50351 Date Updated: 2024-08-02T22:16:46.252Z Date Published: 2024-01-03T01:45:45.358Z Description: HCL DRYiCE MyXalytics is impacted by the use of an insecure key rotation mechanism which can allow an attacker to compromise the confidentiality or integrity of data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5828.
CVE ID: CVE-2014-5828 Date Updated: 2024-08-06T11:55:50.158Z Date Published: 2014-09-09T10:00:00 Description: The 3Kundenzone (aka com.hutchison3g.at.android.selfcare) application 2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/719249 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30843.
CVE ID: CVE-2021-30843 Date Updated: 2024-08-03T22:48:12.692Z Date Published: 2021-10-19T13:11:47 Description: This issue was addressed with improved checks. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, Security Update 2021-005 Catalina, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing a maliciously crafted dfont file may lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT212804 - https://support.apple.com/en-us/HT212805 - https://support.apple.com/en-us/HT212807 - https://support.apple.com/en-us/HT212814 - https://support.apple.com/en-us/HT212819 - https://support.apple.com/en-us/HT212815 - http://seclists.org/fulldisclosure/2021/Oct/62 - http://seclists.org/fulldisclosure/2021/Oct/63 - http://seclists.org/fulldisclosure/2021/Oct/61 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6433.
CVE ID: CVE-2024-6433 Date Updated: 2024-08-01T21:41:03.297Z Date Published: 2024-07-10T00:00:14.507Z Description: The application zips all the files in the folder specified by the user, which allows an attacker to read arbitrary files on the system by providing a crafted path. This vulnerability can be exploited by sending a request to the application with a malicious snapshot_path parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.com/bounties/7d0463dd-6373-4eb8-86fc-beac0a1391a5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3590.
CVE ID: CVE-2011-3590 Date Updated: 2024-08-06T23:37:48.351Z Date Published: 2014-02-15T11:00:00 Description: The Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, includes all of root's SSH private keys within a vmcore file, which allows context-dependent attackers to obtain sensitive information by inspecting the file content. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=716439 - http://rhn.redhat.com/errata/RHSA-2011-1532.html - http://rhn.redhat.com/errata/RHSA-2012-0152.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-7014.
CVE ID: CVE-2023-7014 Date Updated: 2024-08-02T08:50:07.710Z Date Published: 2024-02-05T21:21:44.351Z Description: The Author Box, Guest Author and Co-Authors for Your Posts – Molongui plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.7.4 via the 'ma_debu' parameter. This makes it possible for unauthenticated attackers to extract sensitive data including post author emails and names if applicable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/538e9ce3-2d48-44ad-bd08-8eead3ef15c3?source=cve - https://plugins.trac.wordpress.org/changeset/3019084/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20693.
CVE ID: CVE-2023-20693 Date Updated: 2024-08-02T09:14:40.244Z Date Published: 2023-07-04T01:44:56.418Z Description: In wlan firmware, there is possible system crash due to an uncaught exception. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07664711; Issue ID: ALPS07664711. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/July-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4257.
CVE ID: CVE-2014-4257 Date Updated: 2024-08-06T11:12:34.110Z Date Published: 2014-07-17T10:00:00 Description: Unspecified vulnerability in the Oracle WebCenter Portal component in Oracle Fusion Middleware 11.1.1.7.0 and 11.1.1.8.0 allows remote attackers to affect confidentiality via unknown vectors related to Portlet Services. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vmware.com/security/advisories/VMSA-2014-0012.html - http://www.securityfocus.com/archive/1/534161/100/0/threaded - http://secunia.com/advisories/58739 - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - http://seclists.org/fulldisclosure/2014/Dec/23 - https://exchange.xforce.ibmcloud.com/vulnerabilities/94541 - http://www.securityfocus.com/bid/68563 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4225.
CVE ID: CVE-2021-4225 Date Updated: 2024-08-03T17:16:04.292Z Date Published: 2022-04-25T15:50:53 Description: The SP Project & Document Manager WordPress plugin before 4.24 allows any authenticated users, such as subscribers, to upload files. The plugin attempts to prevent PHP and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that on Windows servers, the security checks in place were insufficient, enabling bad actors to potentially upload backdoors on vulnerable sites. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/bd1083d1-edcc-482e-a8a9-c8b6c8d417bd - https://github.com/pang0lin/CVEproject/blob/main/wordpress_SP-Project_fileupload.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-8858.
CVE ID: CVE-2024-8858 Date Updated: 2024-09-25T14:31:49.688Z Date Published: 2024-09-25T10:59:51.550Z Description: The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘piechart_settings’ parameter in all versions up to, and including, 8.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3c2e5fe-cc02-479e-9f33-e1a783088596?source=cve - https://plugins.trac.wordpress.org/browser/addons-for-elementor/trunk/templates/addons/piecharts/loop.php#L21 - https://wordpress.org/plugins/addons-for-elementor/#developers - https://plugins.trac.wordpress.org/changeset/3153346/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4946.
CVE ID: CVE-2014-4946 Date Updated: 2024-09-17T03:03:19.100Z Date Published: 2014-07-14T14:00:00Z Description: Multiple cross-site scripting (XSS) vulnerabilities in Horde Internet Mail Program (IMP) before 6.1.8, as used in Horde Groupware Webmail Edition before 5.1.5, allow remote attackers to inject arbitrary web script or HTML via (1) unspecified flags or (2) a mailbox name in the dynamic mailbox view. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/59772 - http://lists.horde.org/archives/announce/2014/001025.html - http://secunia.com/advisories/59770 - https://github.com/horde/horde/blob/4513649810f13a32f1193bdeed76f7d85a5efa05/bundles/webmail/docs/CHANGES - https://github.com/horde/horde/blob/c0144ac03814a8c2cf6fc5ac0d1af2653e9ee139/imp/docs/CHANGES - http://lists.horde.org/archives/announce/2014/001019.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4307.
CVE ID: CVE-2011-4307 Date Updated: 2024-08-07T00:01:51.605Z Date Published: 2012-07-11T10:00:00Z Description: Cross-site scripting (XSS) vulnerability in mod/wiki/lang/en/wiki.php in Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to inject arbitrary web script or HTML via the section parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=41017112cff7f5bd7969c72d321320f3090e7c68 - http://moodle.org/mod/forum/discuss.php?d=188321 - https://bugzilla.redhat.com/show_bug.cgi?id=747444 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1078
The MITRE ATT&CK technique T1078: Valid Accounts is related to the vulnerability CVE-CVE-2019-3704. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as exploitation_technique.
Provide detailed information about CVE-2016-6273.
CVE ID: CVE-2016-6273 Date Updated: 2024-08-06T01:22:20.808Z Date Published: 2016-10-07T14:00:00 Description: The lmadmin component in Flexera FlexNet Publisher (aka Flex License Manager) before 2015 SP5 and 2016 before R1 SP1, as used by Citrix License Server for Windows before 11.14.0.1 and Citrix License Server VPX before 11.14.0.1, allows remote attackers to cause a denial of service (crash) via a type 2F packet with a '01 19' opcode. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2016-29 - http://www.securitytracker.com/id/1037008 - http://support.citrix.com/article/CTX217430 - http://www.securityfocus.com/bid/93450 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14822.
CVE ID: CVE-2019-14822 Date Updated: 2024-08-05T00:26:39.079Z Date Published: 2019-11-25T11:01:18 Description: A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1717958 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14822 - https://usn.ubuntu.com/4134-3/ - https://www.oracle.com/security-alerts/cpuapr2022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1565.001
The MITRE ATT&CK technique T1565.001: Stored Data Manipulation is related to the vulnerability CVE-CVE-2020-5539. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2020-11012.
CVE ID: CVE-2020-11012 Date Updated: 2024-08-04T11:21:14.522Z Date Published: 2020-04-23T21:55:14 Description: MinIO versions before RELEASE.2020-04-23T00-58-49Z have an authentication bypass issue in the MinIO admin API. Given an admin access key, it is possible to perform admin API operations i.e. creating new service accounts for existing access keys - without knowing the admin secret key. This has been fixed and released in version RELEASE.2020-04-23T00-58-49Z. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/minio/minio/security/advisories/GHSA-xv4r-vccv-mg4w - https://github.com/minio/minio/pull/9422 - https://github.com/minio/minio/commit/4cd6ca02c7957aeb2de3eede08b0754332a77923 - https://github.com/minio/minio/releases/tag/RELEASE.2020-04-23T00-58-49Z No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21865.
CVE ID: CVE-2023-21865 Date Updated: 2024-09-17T14:13:14.997Z Date Published: 2023-01-17T23:35:17.950Z Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpujan2023.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3708.
CVE ID: CVE-2024-3708 Date Updated: 2024-07-09T15:06:37.504Z Date Published: 2024-05-23T00:11:32.655Z Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33224.
CVE ID: CVE-2022-33224 Date Updated: 2024-08-03T08:01:20.459Z Date Published: 2023-06-06T07:38:35.157Z Description: Memory corruption in core due to buffer copy without check9ing the size of input while processing ioctl queries. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/june-2023-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2473.
CVE ID: CVE-2013-2473 Date Updated: 2024-08-06T15:36:46.529Z Date Published: 2013-06-18T22:00:00 Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ByteBandedRaster size checks" in 2D. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/259d4998ce2f - http://rhn.redhat.com/errata/RHSA-2013-1060.html - http://marc.info/?l=bugtraq&m=137545592101387&w=2 - https://access.redhat.com/errata/RHSA-2014:0414 - http://security.gentoo.org/glsa/glsa-201406-32.xml - http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html - http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html - http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html - http://marc.info/?l=bugtraq&m=137545505800971&w=2 - http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17189 - http://secunia.com/advisories/54154 - http://rhn.redhat.com/errata/RHSA-2013-1455.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18888 - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880 - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03898880 - http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html - http://rhn.redhat.com/errata/RHSA-2013-1059.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19600 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19652 - http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html - https://bugzilla.redhat.com/show_bug.cgi?id=975110 - http://rhn.redhat.com/errata/RHSA-2013-1081.html - http://www.us-cert.gov/ncas/alerts/TA13-169A - http://advisories.mageia.org/MGASA-2013-0185.html - http://www.securityfocus.com/bid/60623 - http://rhn.redhat.com/errata/RHSA-2013-0963.html - http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html - http://rhn.redhat.com/errata/RHSA-2013-1456.html - http://www.mandriva.com/security/advisories?name=MDVSA-2013:183 - http://www-01.ibm.com/support/docview.wss?uid=swg21642336 - http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8481.
CVE ID: CVE-2020-8481 Date Updated: 2024-08-04T10:03:45.868Z Date Published: 2020-04-29T01:30:56 Description: For ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, confidential data is written in an unprotected file. An attacker who successfully exploited this vulnerability could take full control of the computer. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231&LanguageCode=en&DocumentPartId=&Action=Launch - https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230&LanguageCode=en&DocumentPartId=&Action=Launch No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1203
The MITRE ATT&CK technique T1203: Exploitation for Client Execution is related to the vulnerability CVE-CVE-2015-3864. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2022-31339.
CVE ID: CVE-2022-31339 Date Updated: 2024-08-03T07:19:05.758Z Date Published: 2022-06-01T13:22:45 Description: Simple Inventory System v1.0 is vulnerable to SQL Injection via /inventory/login.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/k0xx11/bug_report/blob/main/vendors/argie/simple-inventory-system/SQLi-1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2864.
CVE ID: CVE-2012-2864 Date Updated: 2024-08-06T19:50:05.327Z Date Published: 2012-08-22T10:00:00 Description: Mesa, as used in Google Chrome before 21.0.1183.0 on the Acer AC700, Cr-48, and Samsung Series 5 and 5 550 Chromebook platforms, and the Samsung Chromebox Series 3, allows remote attackers to execute arbitrary code via unspecified vectors that trigger an "array overflow." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ubuntu.com/usn/USN-1623-1 - http://code.google.com/p/chromium/issues/detail?id=141901 - https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0264 - http://secunia.com/advisories/51215 - http://googlechromereleases.blogspot.com/2012/08/stable-channel-update-for-chrome-os.html - http://www.mandriva.com/security/advisories?name=MDVSA-2013:103 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-47129.
CVE ID: CVE-2023-47129 Date Updated: 2024-09-03T17:24:55.886Z Date Published: 2023-11-10T18:48:03.265Z Description: Statmic is a core Laravel content management system Composer package. Prior to versions 3.4.13 and 4.33.0, on front-end forms with an asset upload field, PHP files crafted to look like images may be uploaded. This only affects forms using the "Forms" feature and not just _any_ arbitrary form. This does not affect the control panel. This issue has been patched in 3.4.13 and 4.33.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/statamic/cms/security/advisories/GHSA-72hg-5wr5-rmfc - https://github.com/statamic/cms/commit/098ef8024d97286ca501273c18ae75b646262d75 - https://github.com/statamic/cms/commit/f6c688154f6bdbd0b67039f8f11dcd98ba061e77 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13160.
CVE ID: CVE-2018-13160 Date Updated: 2024-08-05T08:52:50.496Z Date Published: 2018-07-05T02:00:00 Description: The mintToken function of a smart contract implementation for etktokens (ETK), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md - https://github.com/BlockChainsSecurity/EtherTokens/tree/master/etktokens No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2248.
CVE ID: CVE-2014-2248 Date Updated: 2024-08-06T10:06:00.210Z Date Published: 2014-03-16T10:00:00 Description: Open redirect vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf - http://www.securityfocus.com/bid/66190 - http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01 - https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20704.
CVE ID: CVE-2019-20704 Date Updated: 2024-08-05T02:46:10.500Z Date Published: 2020-04-16T14:41:43 Description: Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, and XR500 before 2.3.2.32. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000061225/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-Gateways-PSV-2018-0392 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2695.
CVE ID: CVE-2019-2695 Date Updated: 2024-10-02T15:39:20.075Z Date Published: 2019-04-23T18:16:44 Description: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - https://support.f5.com/csp/article/K04246541 - https://access.redhat.com/errata/RHSA-2019:2484 - https://access.redhat.com/errata/RHSA-2019:2511 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8807.
CVE ID: CVE-2020-8807 Date Updated: 2024-08-04T10:12:10.589Z Date Published: 2021-02-05T09:13:58 Description: In Electric Coin Company Zcashd before 2.1.1-1, the time offset between messages could be leveraged to obtain sensitive information about the relationship between a suspected victim's address and an IP address, aka a timing side channel. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://electriccoin.co/blog/new-releases-2-1-1-and-hotfix-2-1-1-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49257.
CVE ID: CVE-2023-49257 Date Updated: 2024-08-02T21:53:45.304Z Date Published: 2024-01-12T14:24:32.311Z Description: An authenticated user is able to upload an arbitrary CGI-compatible file using the certificate upload utility and execute it with the root user privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert.pl/en/posts/2024/01/CVE-2023-49253/ - https://cert.pl/posts/2024/01/CVE-2023-49253/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-35235.
CVE ID: CVE-2021-35235 Date Updated: 2024-09-17T04:19:18.102Z Date Published: 2021-10-27T00:55:43.038021Z Description: The ASP.NET debug feature is enabled by default in Kiwi Syslog Server 9.7.2 and previous versions. ASP.NET allows remote debugging of web applications, if configured to do so. Debug mode causes ASP.NET to compile applications with extra information. The information enables a debugger to closely monitor and control the execution of an application. If an attacker could successfully start a remote debugging session, this is likely to disclose sensitive information about the web application and supporting infrastructure that may be valuable in targeting SWI with malicious intent. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://documentation.solarwinds.com/en/success_center/kss/content/release_notes/kss_9-8_release_notes.htm - https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35235 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5040.
CVE ID: CVE-2016-5040 Date Updated: 2024-08-06T00:46:40.266Z Date Published: 2017-02-17T17:00:00 Description: libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a large length value in a compilation unit header. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.prevanders.net/dwarfbug.html - http://www.openwall.com/lists/oss-security/2016/05/24/1 - http://www.openwall.com/lists/oss-security/2016/05/25/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36855.
CVE ID: CVE-2022-36855 Date Updated: 2024-08-03T10:14:28.910Z Date Published: 2022-09-09T14:40:05 Description: A use after free vulnerability in iva_ctl driver prior to SMR Sep-2022 Release 1 allows attacker to cause memory access fault. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=09 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1225.
CVE ID: CVE-2013-1225 Date Updated: 2024-09-16T19:35:44.621Z Date Published: 2013-05-09T10:00:00Z Description: Cisco Unified Customer Voice Portal (CVP) Software before 9.0.1 ES 11 allows remote attackers to read arbitrary files via a Resource Manager (1) HTTP or (2) HTTPS request containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, aka Bug ID CSCub38366. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130508-cvp No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15956.
CVE ID: CVE-2020-15956 Date Updated: 2024-08-04T13:30:23.526Z Date Published: 2020-08-04T19:03:35 Description: ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unauthenticated attackers to trigger a buffer overflow and application termination via a malformed payload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www2.acti.com/nvr3 - https://github.com/megamagnus/cve-2020-15956 - http://packetstormsecurity.com/files/158771/ACTi-NVR3-Standard-Professional-Server-3.0.12.42-Denial-Of-Service.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-4459.
CVE ID: CVE-2009-4459 Date Updated: 2024-08-07T07:01:20.431Z Date Published: 2009-12-30T19:00:00 Description: Redmine 0.8.7 and earlier uses the title tag before defining the character encoding in a meta tag, which allows remote attackers to conduct cross-site scripting (XSS) attacks and inject arbitrary script via UTF-7 encoded values in the title parameter to a new issue page, which may be interpreted as script by Internet Explorer 7 and 8. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/37425 - http://www.exploit-db.com/exploits/10554 - https://exchange.xforce.ibmcloud.com/vulnerabilities/54947 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5174.
CVE ID: CVE-2017-5174 Date Updated: 2024-08-05T14:55:35.010Z Date Published: 2017-05-19T02:43:00 Description: An Authentication Bypass issue was discovered in Geutebruck IP Camera G-Cam/EFD-2250 Version 1.11.0.12. An authentication bypass vulnerability has been identified. The existing file system architecture could allow attackers to bypass the access control that may allow remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/96209 - https://ics-cert.us-cert.gov/advisories/ICSA-17-045-02 - https://www.exploit-db.com/exploits/41360/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0316.
CVE ID: CVE-2015-0316 Date Updated: 2024-08-06T04:03:11.042Z Date Published: 2015-02-06T00:00:00 Description: Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0318, CVE-2015-0321, CVE-2015-0329, and CVE-2015-0330. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://security.gentoo.org/glsa/glsa-201502-02.xml - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00008.html - http://secunia.com/advisories/62895 - http://www.securitytracker.com/id/1031706 - http://secunia.com/advisories/62886 - https://technet.microsoft.com/library/security/2755801 - http://secunia.com/advisories/62777 - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00007.html - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00006.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/100701 - http://www.securityfocus.com/bid/72514 - https://helpx.adobe.com/security/products/flash-player/apsb15-04.html - http://rhn.redhat.com/errata/RHSA-2015-0140.html - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33314.
CVE ID: CVE-2022-33314 Date Updated: 2024-09-16T18:54:02.582Z Date Published: 2022-06-30T19:05:40.156403Z Description: Multiple command injection vulnerabilities exist in the web_server action endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/action/import_sdk_file/` API is affected by command injection vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8670.
CVE ID: CVE-2020-8670 Date Updated: 2024-08-04T10:03:46.319Z Date Published: 2021-06-09T18:50:23 Description: Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html - https://security.netapp.com/advisory/ntap-20210702-0002/ - https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0230.
CVE ID: CVE-2024-0230 Date Updated: 2024-08-01T17:41:15.961Z Date Published: 2024-01-12T23:10:45.940Z Description: A session management issue was addressed with improved checks. This issue is fixed in Magic Keyboard Firmware Update 2.0.6. An attacker with physical access to the accessory may be able to extract its Bluetooth pairing key and monitor Bluetooth traffic. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT214050 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4906.
CVE ID: CVE-2010-4906 Date Updated: 2024-08-07T04:02:30.443Z Date Published: 2011-10-08T10:00:00 Description: SQL injection vulnerability in zp-core/full-image.php in Zenphoto 1.3 and 1.3.1.2 allows remote attackers to execute arbitrary SQL commands via the a parameter. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.org/1009-exploits/zenphoto-sqlxss.txt - http://www.securityfocus.com/bid/43021 - http://www.securityfocus.com/archive/1/513525/100/0/threaded - http://secunia.com/advisories/41350 - http://www.acunetix.com/blog/web-security-zone/articles/zenphoto-13-advisory/ - http://securityreason.com/securityalert/8442 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28588.
CVE ID: CVE-2022-28588 Date Updated: 2024-08-03T05:56:16.072Z Date Published: 2022-05-03T17:42:00 Description: In SpringBootMovie <=1.2 when adding movie names, malicious code can be stored because there are no filtering parameters, resulting in stored XSS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/lkmc2/SpringBootMovie/issues/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7748.
CVE ID: CVE-2018-7748 Date Updated: 2024-08-05T06:37:59.470Z Date Published: 2018-08-03T18:00:00 Description: report_viewer.do in ServiceNow Release Jakarta Patch 8 and earlier allows remote attackers to execute arbitrary code via '${xyz}' Glide Scripting Injection in the sysparm_media parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://telekomsecurity.github.io/2018/07/servicenow-privilege-escalation.html - https://telekomsecurity.github.io/assets/advisories/20180104_ServiceNow_GlideInjection.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0258.
CVE ID: CVE-2019-0258 Date Updated: 2024-08-04T17:44:16.456Z Date Published: 2019-02-15T18:00:00 Description: SAP Disclosure Management, version 10.01, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.support.sap.com/#/notes/2724014 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943 - http://www.securityfocus.com/bid/106969 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8022.
CVE ID: CVE-2019-8022 Date Updated: 2024-08-04T21:02:19.508Z Date Published: 2019-08-20T19:46:03 Description: Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-41.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-41034.
CVE ID: CVE-2024-41034 Date Updated: 2024-09-11T17:32:58.811Z Date Published: 2024-07-29T14:31:49.043Z Description: In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix kernel bug on rename operation of broken directory Syzbot reported that in rename directory operation on broken directory on nilfs2, __block_write_begin_int() called to prepare block write may fail BUG_ON check for access exceeding the folio/page size. This is because nilfs_dotdot(), which gets parent directory reference entry ("..") of the directory to be moved or renamed, does not check consistency enough, and may return location exceeding folio/page size for broken directories. Fix this issue by checking required directory entries ("." and "..") in the first chunk of the directory in nilfs_dotdot(). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/ff9767ba2cb949701e45e6e4287f8af82986b703 - https://git.kernel.org/stable/c/24c1c8566a9b6be51f5347be2ea76e25fc82b11e - https://git.kernel.org/stable/c/a9a466a69b85059b341239766a10efdd3ee68a4b - https://git.kernel.org/stable/c/7000b438dda9d0f41a956fc9bffed92d2eb6be0d - https://git.kernel.org/stable/c/1a8879c0771a68d70ee2e5e66eea34207e8c6231 - https://git.kernel.org/stable/c/60f61514374e4a0c3b65b08c6024dd7e26150bfd - https://git.kernel.org/stable/c/298cd810d7fb687c90a14d8f9fd1b8719a7cb8a5 - https://git.kernel.org/stable/c/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34796.
CVE ID: CVE-2022-34796 Date Updated: 2024-08-03T09:22:10.447Z Date Published: 2022-06-30T17:47:42 Description: A missing permission check in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2798%20%281%29 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.