instruction
stringlengths 49
63
⌀ | input
stringlengths 0
69
| output
stringlengths 221
18.7k
|
|---|---|---|
Provide detailed information about CVE-2023-45841.
|
CVE ID: CVE-2023-45841
Date Updated: 2024-08-02T20:29:32.544Z
Date Published: 2023-12-05T11:30:10.990Z
Description:
Multiple data integrity vulnerabilities exist in the package hash checking functionality of Buildroot 2023.08.1 and Buildroot dev commit 622698d7847. A specially crafted man-in-the-middle attack can lead to arbitrary command execution in the builder.This vulnerability is related to the `versal-firmware` package.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
- http://www.openwall.com/lists/oss-security/2023/12/11/1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-2350.
|
CVE ID: CVE-2018-2350
Date Updated: 2019-01-22T17:57:02
Date Published: 2019-01-22T20:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-40172.
|
CVE ID: CVE-2021-40172
Date Updated: 2024-08-04T02:27:31.528Z
Date Published: 2021-08-29T19:18:22
Description:
Zoho ManageEngine Log360 before Build 5219 allows a CSRF attack on proxy settings.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.manageengine.com/log-management/readme.html#Build%205219
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-14449.
|
CVE ID: CVE-2020-14449
Date Updated: 2024-08-04T12:46:34.594Z
Date Published: 2020-06-19T13:07:03
Description:
An issue was discovered in Mattermost Mobile Apps before 1.30.0. Authorization tokens can sometimes be disclosed to third-party servers, aka MMSA-2020-0018.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://mattermost.com/security-updates/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2008-1014.
|
CVE ID: CVE-2008-1014
Date Updated: 2024-08-07T08:08:57.632Z
Date Published: 2008-04-04T17:00:00
Description:
Apple QuickTime before 7.4.5 does not properly handle external URLs in movies, which allows remote attackers to obtain sensitive information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://support.apple.com/kb/HT1241
- http://www.us-cert.gov/cas/techalerts/TA08-094A.html
- http://www.vupen.com/english/advisories/2008/1078
- http://www.securityfocus.com/bid/28583
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41602
- http://securitytracker.com/id?1019758
- http://secunia.com/advisories/29650
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2009-2930.
|
CVE ID: CVE-2009-2930
Date Updated: 2024-08-07T06:07:37.358Z
Date Published: 2009-08-21T20:21:00
Description:
Cross-site scripting (XSS) vulnerability in the Search feature in elka CMS (aka Elkapax) allows remote attackers to inject arbitrary web script or HTML via the q parameter to the default URI.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/archive/1/505725/100/0/threaded
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-3953.
|
CVE ID: CVE-2023-3953
Date Updated: 2024-08-02T07:08:50.790Z
Date Published: 2023-08-09T14:02:44.472Z
Description:
A CWE-119: Improper Restriction of Operations within the Bounds of a Memory
Buffer vulnerability exists that could cause memory corruption when an authenticated user
opens a tampered log file from GP-Pro EX.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-220-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-220-01.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-1285.
|
CVE ID: CVE-2019-1285
Date Updated: 2024-08-04T18:13:29.890Z
Date Published: 2019-09-11T21:25:00
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1256.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1285
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-33793.
|
CVE ID: CVE-2021-33793
Date Updated: 2024-08-03T23:58:23.107Z
Date Published: 2021-08-11T19:34:14
Description:
Foxit Reader before 10.1.4 and PhantomPDF before 10.1.4 have an out-of-bounds write because the Cross-Reference table is mishandled during Office document conversion.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.foxitsoftware.com/support/security-bulletins.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-40764.
|
CVE ID: CVE-2022-40764
Date Updated: 2024-08-03T12:28:42.504Z
Date Published: 2022-10-03T14:03:59
Description:
Snyk CLI before 1.996.0 allows arbitrary command execution, affecting Snyk IDE plugins and the snyk npm package. Exploitation could follow from the common practice of viewing untrusted files in the Visual Studio Code editor, for example. The original demonstration was with shell metacharacters in the vendor.json ignore field, affecting snyk-go-plugin before 1.19.1. This affects, for example, the Snyk TeamCity plugin (which does not update automatically) before 20220930.142957.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/snyk/snyk-go-plugin/releases/tag/v1.19.1
- https://github.com/snyk/cli/releases/tag/v1.996.0
- https://www.imperva.com/blog/how-scanning-your-projects-for-security-issues-can-lead-to-remote-code-execution/
- https://support.snyk.io/hc/en-us/articles/7015908293789-CVE-2022-40764-Command-Injection-vulnerability-affecting-Snyk-CLI-versions-prior-to-1-996-0
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-45586.
|
CVE ID: CVE-2021-45586
Date Updated: 2024-08-04T04:47:01.090Z
Date Published: 2021-12-26T00:42:41
Description:
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.netgear.com/000064108/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0094
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-3346.
|
CVE ID: CVE-2010-3346
Date Updated: 2024-08-07T03:03:19.058Z
Date Published: 2010-12-16T19:00:00
Description:
Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Element Memory Corruption Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.us-cert.gov/cas/techalerts/TA10-348A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12322
- http://www.securitytracker.com/id?1024872
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-44647.
|
CVE ID: CVE-2022-44647
Date Updated: 2024-08-03T13:54:03.999Z
Date Published: 2022-11-21T17:55:47.486Z
Description:
An Out-of-bounds read vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to disclose sensitive information on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is similar to, but not the same as CVE-2022-44648.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://success.trendmicro.com/solution/000291770
- https://www.zerodayinitiative.com/advisories/ZDI-22-1617/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-30924.
|
CVE ID: CVE-2021-30924
Date Updated: 2024-08-03T22:48:14.032Z
Date Published: 2021-08-24T18:50:26
Description:
A denial of service issue was addressed with improved state handling. This issue is fixed in macOS Monterey 12.0.1. A remote attacker can cause a device to unexpectedly restart.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/kb/HT212867
- https://support.apple.com/kb/HT212876
- https://support.apple.com/kb/HT212874
- https://support.apple.com/en-us/HT212869
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-2303.
|
CVE ID: CVE-2011-2303
Date Updated: 2024-08-06T22:53:17.600Z
Date Published: 2011-10-18T22:00:00
Description:
Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.2, and 12.1.3 allows remote authenticated users to affect integrity via unknown vectors related to Attachments / File Upload.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/topics/security/cpuoct2011-330135.html
- http://www.securityfocus.com/bid/50225
- http://secunia.com/advisories/46504
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-3459.
|
CVE ID: CVE-2024-3459
Date Updated: 2024-08-01T20:12:07.655Z
Date Published: 2024-05-09T10:13:03.813Z
Description:
KioWare for Windows (versions all through 8.34) allows to escape the environment by downloading PDF files, which then by default are opened in an external PDF viewer. By using built-in functions of that viewer it is possible to launch a web browser, search through local files and, subsequently, launch any program with user privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cert.pl/posts/2024/04/CVE-2024-3459
- https://cert.pl/en/posts/2024/04/CVE-2024-3459
- https://www.kioware.com/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-10868.
|
CVE ID: CVE-2020-10868
Date Updated: 2024-08-04T11:14:15.613Z
Date Published: 2020-04-01T17:08:42
Description:
An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to launch the Repair App RPC call from a Low Integrity process.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://forum.avast.com/index.php?topic=232420.0
- https://forum.avast.com/index.php?topic=232423.0
- https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-11681.
|
CVE ID: CVE-2018-11681
Date Updated: 2024-08-05T08:17:08.550Z
Date Published: 2018-06-02T13:00:00
Description:
Default and unremovable support credentials (user:nwk password:nwk2) allow attackers to gain total super user control of an IoT device through a TELNET session to products using the RadioRA 2 Lutron integration protocol Revision M to Revision Y. NOTE: The vendor disputes this id as not being a vulnerability because what can be done through the ports revolve around controlling lighting, not code execution. A certain set of commands are listed, which bear some similarity to code, but they are not arbitrary and do not allow admin-level control of a machine
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://sadfud.me/explotos/CVE-2018-11629
- https://reversecodes.wordpress.com/2018/06/02/0-day-tomando-el-control-de-las-instalaciones-de-la-nasa-en-cabo-canaveral/
- http://www.lutron.com/TechnicalDocumentLibrary/040249.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-18646.
|
CVE ID: CVE-2020-18646
Date Updated: 2024-08-04T14:00:49.327Z
Date Published: 2021-06-22T14:25:41
Description:
Information Disclosure in NoneCMS v1.3 allows remote attackers to obtain sensitive information via the component "/public/index.php".
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/PearlyNautilus/Security-Code-Review/issues/5
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-4421.
|
CVE ID: CVE-2010-4421
Date Updated: 2024-08-07T03:43:14.898Z
Date Published: 2011-01-19T15:00:00
Description:
Unspecified vulnerability in the Database Vault component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, and 11.2.0.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2011/0139
- http://www.securityfocus.com/bid/45905
- http://www.securitytracker.com/id?1024972
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64757
- http://secunia.com/advisories/42895
- http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-0399.
|
CVE ID: CVE-2015-0399
Date Updated: 2024-08-06T04:10:10.492Z
Date Published: 2015-01-21T18:00:00
Description:
Unspecified vulnerability in the Oracle Business Intelligence Enterprise Edition component in Oracle Fusion Middleware 10.1.3.4.2 and 11.1.1.7 allows remote authenticated users to affect confidentiality via unknown vectors related to Analytics Web General.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://secunia.com/advisories/62475
- http://www.securityfocus.com/bid/72204
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-52113.
|
CVE ID: CVE-2023-52113
Date Updated: 2024-08-02T22:48:12.460Z
Date Published: 2024-01-16T07:58:43.439Z
Description:
launchAnyWhere vulnerability in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://consumer.huawei.com/en/support/bulletin/2024/1/
- https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-6263.
|
CVE ID: CVE-2016-6263
Date Updated: 2024-08-06T01:22:20.763Z
Date Published: 2016-09-07T20:00:00
Description:
The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2016/07/21/4
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
- http://www.openwall.com/lists/oss-security/2016/07/20/6
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
- http://www.securityfocus.com/bid/92070
- http://www.debian.org/security/2016/dsa-3658
- https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
- http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555
- http://www.ubuntu.com/usn/USN-3068-1
- https://security.gentoo.org/glsa/201908-06
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-0406.
|
CVE ID: CVE-2016-0406
Date Updated: 2024-08-05T22:15:24.336Z
Date Published: 2016-01-21T02:00:00
Description:
Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect integrity and availability via vectors related to Libc.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.securitytracker.com/id/1034735
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-5577.
|
CVE ID: CVE-2023-5577
Date Updated: 2024-08-02T08:07:31.685Z
Date Published: 2023-11-07T11:31:06.058Z
Description:
The Bitly's plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpbitly' shortcode in all versions up to, and including, 2.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/31522e54-f260-46d0-8d57-2d46af7d3450?source=cve
- https://plugins.trac.wordpress.org/browser/wp-bitly/trunk/includes/class-wp-bitly-shortlink.php?rev=2767772#L238
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-2689.
|
CVE ID: CVE-2019-2689
Date Updated: 2024-10-02T15:39:55.144Z
Date Published: 2019-04-23T18:16:44
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://support.f5.com/csp/article/K04246541
- https://access.redhat.com/errata/RHSA-2019:2484
- https://access.redhat.com/errata/RHSA-2019:2511
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-23591.
|
CVE ID: CVE-2024-23591
Date Updated: 2024-08-01T23:06:25.269Z
Date Published: 2024-02-16T16:17:58.614Z
Description:
ThinkSystem SR670V2 servers manufactured from approximately June 2021 to July 2023 were left in Manufacturing Mode which could allow
an attacker with privileged logical access to the host or physical access to server internals to modify or disable Intel Boot Guard firmware integrity, SPS security, and other SPS configuration setting. The server’s NIST SP
800-193-compliant Platform Firmware Resiliency (PFR) security subsystem
significantly mitigates this issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://https://support.lenovo.com/us/en/product_security/LEN-150020
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-100016.
|
CVE ID: CVE-2014-100016
Date Updated: 2024-08-06T14:10:56.276Z
Date Published: 2015-01-13T15:00:00
Description:
Cross-site scripting (XSS) vulnerability in photocrati-gallery/ecomm-sizes.php in the Photocrati theme for WordPress allows remote attackers to inject arbitrary web script or HTML via the prod_id parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/56690
- http://osvdb.org/102717
- http://packetstormsecurity.com/files/124986/WordPress-Photocrati-Cross-Site-Scripting.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90812
- http://www.securityfocus.com/bid/65238
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-1445.
|
CVE ID: CVE-2010-1445
Date Updated: 2024-08-07T01:21:19.157Z
Date Published: 2014-12-26T20:00:00
Description:
Heap-based buffer overflow in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted byte stream in an RTMP session.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.videolan.org/security/sa1003.html
- http://openwall.com/lists/oss-security/2010/04/28/4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-1082.
|
CVE ID: CVE-2010-1082
Date Updated: 2024-09-16T18:24:41.835Z
Date Published: 2010-03-23T19:00:00Z
Description:
Multiple directory traversal vulnerabilities in OI.Blogs 1.0.0, when magic_quotes_gpc is disabled, allow remote attackers to read arbitrary files via directory traversal sequences in the (1) theme parameter to loadStyles.php and the (2) scripts parameter to javascript/loadScripts.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/38726
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-11771.
|
CVE ID: CVE-2017-11771
Date Updated: 2024-09-16T20:17:44.891Z
Date Published: 2017-10-13T13:00:00Z
Description:
The Microsoft Windows Search component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it fails to properly handle DNS responses, aka "Windows Search Remote Code Execution Vulnerability".
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11771
- http://www.securityfocus.com/bid/101114
- http://www.securitytracker.com/id/1039538
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-3853.
|
CVE ID: CVE-2014-3853
Date Updated: 2024-08-06T10:57:17.540Z
Date Published: 2014-08-07T10:00:00
Description:
Pyplate 0.08 does not set the secure flag for the id cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2014/05/23/1
- http://www.openwall.com/lists/oss-security/2014/05/14/3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-5644.
|
CVE ID: CVE-2020-5644
Date Updated: 2024-08-04T08:39:25.895Z
Date Published: 2020-11-06T02:06:27
Description:
Buffer overflow vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version "05.65.00.BD" and earlier, GT1450-QMBDE CoreOS version "05.65.00.BD" and earlier, GT1450-QLBDE CoreOS version "05.65.00.BD" and earlier, GT1455HS-QTBDE CoreOS version "05.65.00.BD" and earlier, and GT1450HS-QMBDE CoreOS version "05.65.00.BD" and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02
- https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf
- https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf
- https://jvn.jp/vu/JVNVU99562395/index.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-20012.
|
CVE ID: CVE-2024-20012
Date Updated: 2024-08-01T21:52:31.535Z
Date Published: 2024-02-05T05:59:35.241Z
Description:
In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358566; Issue ID: ALPS08358566.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://corp.mediatek.com/product-security-bulletin/February-2024
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-1738.
|
CVE ID: CVE-2011-1738
Date Updated: 2024-08-06T22:37:25.770Z
Date Published: 2011-05-13T17:00:00
Description:
HP Palm webOS 1.4.5 and 1.4.5.1 does not properly restrict Plug-in Development Kit (PDK) applications, which allows local users to gain privileges by leveraging unintended filesystem write access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/47788
- http://www.securitytracker.com/id?1025514
- https://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02822174
- https://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02822174
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-0438.
|
CVE ID: CVE-2015-0438
Date Updated: 2024-08-06T04:10:10.575Z
Date Published: 2015-04-16T16:00:00
Description:
Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.gentoo.org/glsa/201507-19
- http://www.securitytracker.com/id/1032121
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-20141.
|
CVE ID: CVE-2019-20141
Date Updated: 2024-08-05T02:39:08.083Z
Date Published: 2019-12-30T16:47:39
Description:
An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://knassar7o2.blogspot.com/2019/12/neon-dashboard-xss-reflected.html
- https://knassar702.github.io/cve/neon/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-39853.
|
CVE ID: CVE-2022-39853
Date Updated: 2024-08-03T12:07:42.990Z
Date Published: 2022-10-07T00:00:00
Description:
A use after free vulnerability in perf-mgr driver prior to SMR Oct-2022 Release 1 allows attacker to cause memory access fault.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=10
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-5609.
|
CVE ID: CVE-2024-5609
Date Updated: 2024-06-06T18:35:27.654Z
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-21265.
|
CVE ID: CVE-2021-21265
Date Updated: 2024-08-03T18:09:15.269Z
Date Published: 2021-03-10T21:15:15
Description:
October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October before version 1.1.2, when running on poorly configured servers (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. This has been addressed in version 1.1.2 by adding a feature to allow a set of trusted hosts to be specified in the application. As a workaround one may set the configuration setting cms.linkPolicy to force.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/octobercms/october/security/advisories/GHSA-xhfx-hgmf-v6vp
- https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6
- https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-23771.
|
CVE ID: CVE-2021-23771
Date Updated: 2024-09-17T00:20:38.770Z
Date Published: 2022-03-17T11:20:35.048563Z
Description:
This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from an incomplete fix in [SNYK-JS-NOTEVIL-608878](https://security.snyk.io/vuln/SNYK-JS-NOTEVIL-608878).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946
- https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-30974.
|
CVE ID: CVE-2021-30974
Date Updated: 2021-08-24T18:51:13
Date Published: 2021-08-24T18:51:13
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-4371.
|
CVE ID: CVE-2018-4371
Date Updated: 2024-08-05T05:11:22.808Z
Date Published: 2019-04-03T17:43:16
Description:
An out-of-bounds read was addressed with improved input validation. This issue affected versions prior to iOS 12.1, macOS Mojave 10.14.1, tvOS 12.1, watchOS 5.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/kb/HT209193
- https://support.apple.com/kb/HT209192
- https://support.apple.com/kb/HT209195
- https://support.apple.com/kb/HT209194
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-38233.
|
CVE ID: CVE-2024-38233
Date Updated: 2024-09-19T20:43:10.570Z
Date Published: 2024-09-10T16:54:00.087Z
Description:
Windows Networking Denial of Service Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38233
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-6264.
|
CVE ID: CVE-2017-6264
Date Updated: 2024-09-16T20:21:18.795Z
Date Published: 2017-11-14T17:00:00Z
Description:
An elevation of privilege vulnerability exists in the NVIDIA GPU driver (gm20b_clk_throt_set_cdev_state), where an out of bound memory read is used as a function pointer could lead to code execution in the kernel.This issue is rated as high because it could allow a local malicious application to execute arbitrary code within the context of a privileged process. Product: Android. Version: N/A. Android ID: A-34705430. References: N-CVE-2017-6264.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/101744
- https://source.android.com/security/bulletin/2017-11-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-20933.
|
CVE ID: CVE-2018-20933
Date Updated: 2024-08-05T12:12:29.804Z
Date Published: 2019-08-01T15:49:29
Description:
cPanel before 70.0.23 has Stored XSS via an WHM Edit DNS Zone action (SEC-410).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://documentation.cpanel.net/display/CL/70+Change+Log
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-2655.
|
CVE ID: CVE-2014-2655
Date Updated: 2024-08-06T10:21:36.074Z
Date Published: 2014-04-02T14:00:00
Description:
SQL injection vulnerability in the gen_show_status function in functions.inc.php in Postfix Admin (aka postfixadmin) before 2.3.7 allows remote authenticated users to execute arbitrary SQL commands via a new alias.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://sourceforge.net/p/postfixadmin/code/1650
- http://www.debian.org/security/2014/dsa-2889
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00075.html
- http://www.securityfocus.com/bid/66455
- http://www.openwall.com/lists/oss-security/2014/03/26/11
- http://www.openwall.com/lists/oss-security/2014/03/26/6
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-9572.
|
CVE ID: CVE-2017-9572
Date Updated: 2024-08-05T17:11:02.305Z
Date Published: 2017-06-16T12:00:00
Description:
The athens-state-bank-mobile-banking/id719748589 app 3.0.0 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://medium.com/%40chronic_9612/advisory-44-credit-union-apps-for-ios-may-allow-login-credential-exposure-4d2f380b85c5
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-8047.
|
CVE ID: CVE-2014-8047
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-3933.
|
CVE ID: CVE-2014-3933
Date Updated: 2024-08-06T10:57:18.054Z
Date Published: 2014-06-02T14:00:00
Description:
Cross-site scripting (XSS) vulnerability in the address components field formatter in the AddressField Tokens module 7.x-1.x before 7.x-1.4 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via an address field.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://drupal.org/node/2267475
- http://www.securityfocus.com/bid/67545
- https://drupal.org/node/2267485
- http://secunia.com/advisories/58399
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-32042.
|
CVE ID: CVE-2024-32042
Date Updated: 2024-08-02T02:06:43.266Z
Date Published: 2024-05-15T19:39:08.086Z
Description:
The key used to encrypt passwords stored in the database can be found in
the
CyberPower PowerPanel
application code, allowing the passwords to be recovered.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01
- https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-7604.
|
CVE ID: CVE-2024-7604
Date Updated: 2024-08-21T19:55:29.507Z
Date Published: 2024-08-21T16:06:17.339Z
Description:
Logsign Unified SecOps Platform Incorrect Authorization Authentication Bypass Vulnerability. This vulnerability allows local attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability.
The specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of the user's license expiration date. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-25029.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-24-1104/
- https://support.logsign.net/hc/en-us/articles/20617133769362-06-08-2024-Version-6-4-23-Release-Notes
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-0083.
|
CVE ID: CVE-2022-0083
Date Updated: 2024-08-02T23:18:41.639Z
Date Published: 2022-01-04T06:15:12
Description:
livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.dev/bounties/4c477440-3b03-42eb-a6e2-a31b55090736
- https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-12981.
|
CVE ID: CVE-2019-12981
Date Updated: 2024-08-04T23:41:09.926Z
Date Published: 2019-06-26T17:09:38
Description:
Ming (aka libming) 0.4.8 has an "fill overflow" vulnerability in the function SWFShape_setLeftFillStyle in blocks/shape.c.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/libming/libming/commit/6e76e8c71cb51c8ba0aa9737a636b9ac3029887f
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-2127.
|
CVE ID: CVE-2017-2127
Date Updated: 2024-08-05T13:39:32.431Z
Date Published: 2017-04-28T16:00:00
Description:
Cross-site scripting vulnerability in YOP Poll versions prior to 5.8.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://jvn.jp/en/jp/JVN55294532/index.html
- http://www.securityfocus.com/bid/97118
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-4160.
|
CVE ID: CVE-2013-4160
Date Updated: 2024-08-06T16:30:50.087Z
Date Published: 2014-01-21T18:00:00
Description:
Little CMS (lcms2) before 2.5, as used in OpenJDK 7 and possibly other products, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to (1) cmsStageAllocLabV2ToV4curves, (2) cmsPipelineDup, (3) cmsAllocProfileSequenceDescription, (4) CurvesAlloc, and (5) cmsnamed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://openwall.com/lists/oss-security/2013/07/18/7
- http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-July/023895.html
- http://www.ubuntu.com/usn/USN-1911-1
- https://github.com/mm2/Little-CMS/commit/91c2db7f2559be504211b283bc3a2c631d6f06d9
- https://bugzilla.novell.com/show_bug.cgi?id=826097#c9
- http://openwall.com/lists/oss-security/2013/07/22/1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-1459.
|
CVE ID: CVE-2011-1459
Date Updated: 2024-08-06T22:28:41.391Z
Date Published: 2019-11-05T22:16:57
Description:
The WebKit::WebPluginContainerImpl::handleEvent function in Google Chrome before Blink M11 allows an attacker to cause a denial of service (crash) via the htmlpluginelement.cpp plugin.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugs.chromium.org/p/chromium/issues/detail?id=76474
- http://trac.webkit.org/changeset/81795
- http://trac.webkit.org/changeset/81891
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-13979.
|
CVE ID: CVE-2019-13979
Date Updated: 2024-08-05T00:05:44.139Z
Date Published: 2019-07-19T14:18:16
Description:
In Directus 7 API before 2.2.1, uploading of PHP files is not blocked, leading to uploads/_/originals remote code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/directus/api/issues/979
- https://github.com/directus/api/projects/42
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-15437.
|
CVE ID: CVE-2018-15437
Date Updated: 2024-09-16T18:23:23.732Z
Date Published: 2018-11-08T17:00:00Z
Description:
A vulnerability in the system scanning component of Cisco Immunet and Cisco Advanced Malware Protection (AMP) for Endpoints running on Microsoft Windows could allow a local attacker to disable the scanning functionality of the product. This could allow executable files to be launched on the system without being analyzed for threats. The vulnerability is due to improper process resource handling. An attacker could exploit this vulnerability by gaining local access to a system running Microsoft Windows and protected by Cisco Immunet or Cisco AMP for Endpoints and executing a malicious file. A successful exploit could allow the attacker to prevent the scanning services from functioning properly and ultimately prevent the system from being protected from further intrusion.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/105867
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-imm-dos
- https://www.exploit-db.com/exploits/45829/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-1437.
|
CVE ID: CVE-2022-1437
Date Updated: 2024-08-03T00:03:06.283Z
Date Published: 2022-04-22T14:00:15
Description:
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038
- https://github.com/radareorg/radare2/commit/669a404b6d98d5db409a5ebadae4e94b34ef5136
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-16225.
|
CVE ID: CVE-2018-16225
Date Updated: 2024-08-05T10:17:38.393Z
Date Published: 2018-09-18T21:00:00
Description:
The QBee MultiSensor Camera through 4.16.4 accepts unencrypted network traffic from clients (such as the QBee Cam application through 1.0.5 for Android and the Swisscom Home application up to 10.7.2 for Android), which results in an attacker being able to reuse cookies to bypass authentication and disable the camera.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://seclists.org/fulldisclosure/2018/Sep/21
- https://blog.francescoservida.ch/2018/09/16/cve-2018-16225-public-disclosure-qbee-camera-vulnerability/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-1720.
|
CVE ID: CVE-2010-1720
Date Updated: 2024-08-07T01:35:53.582Z
Date Published: 2010-05-04T15:00:00
Description:
SQL injection vulnerability in the Q-Personel (com_qpersonel) component 1.0.2 and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the katid parameter in a qpListele action to index.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/39466
- http://www.exploit-db.com/exploits/12200
- https://exchange.xforce.ibmcloud.com/vulnerabilities/57775
- http://osvdb.org/63894
- http://www.xenuser.org/documents/security/qpersonel_sql.txt
- http://secunia.com/advisories/39445
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-0728.
|
CVE ID: CVE-2024-0728
Date Updated: 2024-08-01T18:18:17.381Z
Date Published: 2024-01-19T18:31:03.499Z
Description:
A vulnerability classified as problematic was found in ForU CMS up to 2020-06-23. Affected by this vulnerability is an unknown functionality of the file channel.php. The manipulation of the argument c_cmodel leads to file inclusion. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251551.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.251551
- https://vuldb.com/?ctiid.251551
- https://github.com/mi2acle/forucmsvuln/blob/master/LFI.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
null |
Describe the MITRE ATT&CK technique T1005
|
The MITRE ATT&CK technique T1005: Data from Local System is related to the vulnerability CVE-CVE-2018-8160. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact.
|
Provide detailed information about CVE-2020-10910.
|
CVE ID: CVE-2020-10910
Date Updated: 2024-08-04T11:14:15.694Z
Date Published: 2020-04-22T20:51:04
Description:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the RotatePage command of the communication API. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9943.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.foxitsoftware.com/support/security-bulletins.php
- https://www.zerodayinitiative.com/advisories/ZDI-20-517/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-24286.
|
CVE ID: CVE-2022-24286
Date Updated: 2024-08-03T04:07:02.361Z
Date Published: 2022-03-08T22:32:50
Description:
Acer QuickAccess 2.01.300x before 2.01.3030 and 3.00.30xx before 3.00.3038 contains a local privilege escalation vulnerability. The user process communicates with a service of system authority through a named pipe. In this case, the Named Pipe is also given Read and Write rights to the general user. In addition, the service program does not verify the user when communicating. A thread may exist with a specific command. When the path of the program to be executed is sent, there is a local privilege escalation in which the service program executes the path with system privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://community.acer.com/en/kb/articles/14762
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-1799.
|
CVE ID: CVE-2019-1799
Date Updated: 2024-09-16T16:53:01.235Z
Date Published: 2019-04-18T00:45:16.293711Z
Description:
A vulnerability in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerability by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. Software versions prior to 8.2.170.0, 8.5.150.0, and 8.8.100.0 are affected.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlc-iapp
- http://www.securityfocus.com/bid/108008
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-7582.
|
CVE ID: CVE-2014-7582
Date Updated: 2024-08-06T12:56:12.075Z
Date Published: 2014-10-20T10:00:00
Description:
The Water Lateral Sizer (aka com.wWaterLateralSizer) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
- http://www.kb.cert.org/vuls/id/168369
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-32145.
|
CVE ID: CVE-2023-32145
Date Updated: 2024-09-18T18:28:13.398Z
Date Published: 2024-05-03T01:56:30.792Z
Description:
D-Link DAP-1360 Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the processing of login requests to the web-based user interface. The firmware contains hard-coded default credentials. An attacker can leverage this vulnerability to bypass authentication on the system.
. Was ZDI-CAN-18455.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-23-537/
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10324
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-7336.
|
CVE ID: CVE-2024-7336
Date Updated: 2024-08-01T13:30:01.939Z
Date Published: 2024-08-01T02:31:04.790Z
Description:
A vulnerability classified as critical was found in TOTOLINK EX200 4.0.3c.7646_B20201211. Affected by this vulnerability is the function loginauth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273259. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.273259
- https://vuldb.com/?ctiid.273259
- https://vuldb.com/?submit.379314
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/EX200/loginauth.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-0727.
|
CVE ID: CVE-2015-0727
Date Updated: 2024-08-06T04:17:32.838Z
Date Published: 2015-05-15T01:00:00
Description:
Cross-site scripting (XSS) vulnerability in the HTTP module in Cisco Security Manager (CSM) 4.7(0)SP1(1) allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCut27789.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://tools.cisco.com/security/center/viewAlert.x?alertId=38788
- http://www.securitytracker.com/id/1032326
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-24829.
|
CVE ID: CVE-2023-24829
Date Updated: 2024-08-02T11:03:19.318Z
Date Published: 2023-01-31T09:22:41.587Z
Description:
Incorrect Authorization vulnerability in Apache Software Foundation Apache IoTDB.This issue affects the iotdb-web-workbench component from 0.13.0 before 0.13.3. iotdb-web-workbench is an optional component of IoTDB, providing a web console of the database.
This problem is fixed from version 0.13.3 of iotdb-web-workbench onwards.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.apache.org/thread/l0b59hh046tyn4gqot0bdrpg8gxlksmo
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-7462.
|
CVE ID: CVE-2016-7462
Date Updated: 2024-08-06T01:57:47.607Z
Date Published: 2016-12-29T09:02:00
Description:
The Suite REST API in VMware vRealize Operations (aka vROps) 6.x before 6.4.0 allows remote authenticated users to write arbitrary content to files or rename files via a crafted DiskFileItem in a relay-request payload that is mishandled during deserialization.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/94351
- http://www.securitytracker.com/id/1037297
- http://www.vmware.com/security/advisories/VMSA-2016-0020.html
- https://www.tenable.com/security/research/tra-2016-34
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-34791.
|
CVE ID: CVE-2021-34791
Date Updated: 2024-09-17T01:15:58.093Z
Date Published: 2021-10-27T18:56:15.009931Z
Description:
Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. For more information about these vulnerabilities, see the Details section of this advisory. Note: These vulnerabilities have been publicly discussed as NAT Slipstreaming.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-natalg-bypass-cpKGqkng
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2008-0663.
|
CVE ID: CVE-2008-0663
Date Updated: 2024-08-07T07:54:22.855Z
Date Published: 2008-02-08T01:00:00
Description:
Novell Challenge Response Client (LCM) 2.7.5 and earlier, as used with Novell Client for Windows 4.91 SP4, allows users with physical access to a locked system to obtain contents of the clipboard by pasting the contents into the Challenge Question field.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/28792
- http://www.vupen.com/english/advisories/2008/0423/references
- https://secure-support.novell.com/KanisaPlatform/Publishing/686/3726376_f.SAL_Public.html
- http://www.securitytracker.com/id?1019304
- http://www.securityfocus.com/bid/27631
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-28162.
|
CVE ID: CVE-2024-28162
Date Updated: 2024-08-02T00:48:49.411Z
Date Published: 2024-03-06T17:02:02.667Z
Description:
In Jenkins Delphix Plugin 3.0.1 through 3.1.0 (both inclusive) a global option for administrators to enable or disable SSL/TLS certificate validation for Data Control Tower (DCT) connections fails to take effect until Jenkins is restarted when switching from disabled validation to enabled validation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.jenkins.io/security/advisory/2024-03-06/#SECURITY-3330
- http://www.openwall.com/lists/oss-security/2024/03/06/3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-6807.
|
CVE ID: CVE-2019-6807
Date Updated: 2024-08-04T20:31:04.152Z
Date Published: 2019-05-22T20:05:13
Description:
A CWE-248: Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause a possible denial of service when writing sensitive application variables to the controller over Modbus.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0770
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-2549.
|
CVE ID: CVE-2011-2549
Date Updated: 2024-08-06T23:08:22.920Z
Date Published: 2011-07-28T22:00:00
Description:
Unspecified vulnerability in Cisco IOS XR 4.1.x before 4.1.1 on Cisco Aggregation Services Routers (ASR) 9000 series devices allows remote attackers to cause a denial of service (line-card reload) via an IPv4 packet, aka Bug ID CSCtr26695.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/48811
- http://www.cisco.com/en/US/products/products_security_advisory09186a0080b89155.shtml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68733
- http://securitytracker.com/id?1025811
- http://secunia.com/advisories/45333
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-4941.
|
CVE ID: CVE-2023-4941
Date Updated: 2024-08-02T07:44:53.387Z
Date Published: 2023-10-20T07:29:29.267Z
Description:
The BEAR for WordPress is vulnerable to Missing Authorization in versions up to, and including, 1.1.3.3. This is due to a missing capability check on the woobe_bulkoperations_swap function. This makes it possible for authenticated attackers (subscriber or higher) to manipulate products.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/bc20f303-cac3-4517-9c45-153c410a13af?source=cve
- https://plugins.trac.wordpress.org/browser/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php#L521
- https://plugins.trac.wordpress.org/changeset/2970262/woo-bulk-editor/trunk/ext/bulkoperations/bulkoperations.php?contextall=1&old=2844667&old_path=%2Fwoo-bulk-editor%2Ftrunk%2Fext%2Fbulkoperations%2Fbulkoperations.php
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-21205.
|
CVE ID: CVE-2021-21205
Date Updated: 2024-08-03T18:01:14.367Z
Date Published: 2021-04-26T16:25:55
Description:
Insufficient policy enforcement in navigation in Google Chrome on iOS prior to 90.0.4430.72 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html
- https://crbug.com/1165654
- https://www.debian.org/security/2021/dsa-4906
- https://security.gentoo.org/glsa/202104-08
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-15423.
|
CVE ID: CVE-2018-15423
Date Updated: 2024-09-16T17:08:29.302Z
Date Published: 2018-10-05T14:00:00Z
Description:
A vulnerability in the web UI of Cisco HyperFlex Software could allow an unauthenticated, remote attacker to affect the integrity of a device via a clickjacking attack. The vulnerability is due to insufficient input validation of iFrame data in HTTP requests that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted HTTP packets with malicious iFrame data. A successful exploit could allow the attacker to perform a clickjacking attack where the user is tricked into clicking a malicious link.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-hyperflex-clickjacking
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-29152.
|
CVE ID: CVE-2023-29152
Date Updated: 2024-08-02T14:00:15.879Z
Date Published: 2023-06-07T21:46:20.797Z
Description:
By changing the filename parameter in the request, an attacker could
delete any file with the permissions of the Vuforia server account.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-13
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-29313.
|
CVE ID: CVE-2021-29313
Date Updated: 2024-08-03T22:02:51.679Z
Date Published: 2021-08-17T18:11:57
Description:
Cross Site Scripting (XSS) vulnerability exists in SeaCMS 12.6 via the (1) v_company and (2) v_tvs parameters in /admin_video.php,
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/ciweiin/seacms/issues/14
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-1310.
|
CVE ID: CVE-2019-1310
Date Updated: 2024-08-04T18:13:30.316Z
Date Published: 2019-11-12T18:52:48
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0712, CVE-2019-1309, CVE-2019-1399.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1310
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-7700.
|
CVE ID: CVE-2016-7700
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-8724.
|
CVE ID: CVE-2018-8724
Date Updated: 2024-08-05T07:02:26.022Z
Date Published: 2021-01-11T15:34:26
Description:
K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://k7computing.com
- http://k7antivirus.com
- https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-31954.
|
CVE ID: CVE-2024-31954
Date Updated: 2024-08-02T01:59:50.570Z
Date Published: N/A
Description:
An issue was discovered in the installer in Samsung Portable SSD for T5 1.6.10 on Windows. Because it is possible to tamper with the directory and DLL files used during the installation process, an attacker can escalate privileges through arbitrary code execution. (An attacker must already have user privileges)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-31954/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-4827.
|
CVE ID: CVE-2019-4827
Date Updated: 2019-12-30T16:19:30
Date Published: 2019-12-30T16:19:30
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-36460.
|
CVE ID: CVE-2023-36460
Date Updated: 2024-08-02T16:45:56.987Z
Date Published: 2023-07-06T18:39:09.825Z
Description:
Mastodon is a free, open-source social network server based on ActivityPub. Starting in version 3.5.0 and prior to versions 3.5.9, 4.0.5, and 4.1.3, attackers using carefully crafted media files can cause Mastodon's media processing code to create arbitrary files at any location. This allows attackers to create and overwrite any file Mastodon has access to, allowing Denial of Service and arbitrary Remote Code Execution. Versions 3.5.9, 4.0.5, and 4.1.3 contain a patch for this issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/mastodon/mastodon/security/advisories/GHSA-9928-3cp5-93fm
- https://github.com/mastodon/mastodon/commit/dc8f1fbd976ae544720a4e07120d9a91b2722440
- https://github.com/mastodon/mastodon/releases/tag/v3.5.9
- https://github.com/mastodon/mastodon/releases/tag/v4.0.5
- https://github.com/mastodon/mastodon/releases/tag/v4.1.3
- http://www.openwall.com/lists/oss-security/2023/07/06/4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-7469.
|
CVE ID: CVE-2016-7469
Date Updated: 2024-08-06T01:57:47.636Z
Date Published: 2017-06-09T15:00:00
Description:
A stored cross-site scripting (XSS) vulnerability in the Configuration utility device name change page in BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, PSM, WebAccelerator, WOM and WebSafe version 12.0.0 - 12.1.2, 11.4.0 - 11.6.1, and 11.2.1 allows an authenticated user to inject arbitrary web script or HTML. Exploitation requires Resource Administrator or Administrator privileges, and it could cause the Configuration utility client to become unstable.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.f5.com/csp/article/K97285349
- http://www.securitytracker.com/id/1037559
- http://www.securityfocus.com/bid/95320
- http://www.securitytracker.com/id/1037560
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-8672.
|
CVE ID: CVE-2014-8672
Date Updated: 2024-09-16T22:36:08.895Z
Date Published: 2014-11-07T11:00:00Z
Description:
Cross-site scripting (XSS) vulnerability in the RewardingYourself application for Android and BlackBerry OS allows remote attackers to inject arbitrary web script or HTML via a crafted QR code.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://arxiv.org/pdf/1410.7756v1.pdf
- http://arxiv.org/abs/1410.7756
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-6343.
|
CVE ID: CVE-2017-6343
Date Updated: 2024-08-05T15:25:49.115Z
Date Published: 2017-02-27T07:25:00
Description:
The web interface on Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19 allows remote attackers to obtain login access by leveraging knowledge of the MD5 Admin Hash without knowledge of the corresponding password, a different vulnerability than CVE-2013-6117.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/96449
- https://nullku7.github.io/stuff/exposure/dahua/2017/02/24/dahua-nvr.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-1057.
|
CVE ID: CVE-2020-1057
Date Updated: 2024-08-04T06:25:00.990Z
Date Published: 2020-09-11T17:08:56
Description:
<p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.</p>
<p>If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p>The security update addresses the vulnerability by modifying how the ChakraCore scripting engine handles objects in memory.</p>
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1057
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-23773.
|
CVE ID: CVE-2024-23773
Date Updated: 2024-08-01T23:13:07.566Z
Date Published: 2024-04-30T00:00:00
Description:
An issue was discovered in Quest KACE Agent for Windows 12.0.38 and 13.1.23.0. An Arbitrary file delete vulnerability exists in the KSchedulerSvc.exe component. Local attackers can delete any file of their choice with NT Authority\SYSTEM privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.quest.com/kace/
- https://support.quest.com/kb/4375402/quest-response-to-kace-sma-agent-vulnerabilities-cve-2024-23772-cve-2024-23773-cve-2024-23774
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-46649.
|
CVE ID: CVE-2024-46649
Date Updated: 2024-09-23T14:02:09.473Z
Date Published: 2024-09-20T00:00:00
Description:
eNMS up to 4.7.1 is vulnerable to Directory Traversal via download/folder.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/skit-cyber-security/eNMS_vulnerabilities
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-12614.
|
CVE ID: CVE-2020-12614
Date Updated: 2024-08-04T12:04:21.620Z
Date Published: 2023-12-12T00:00:00
Description:
An issue was discovered in BeyondTrust Privilege Management for Windows through 5.6. If the publisher criteria is selected, it defines the name of a publisher that must be present in the certificate (and also requires that the certificate is valid). If an Add Admin token is protected by this criteria, it can be leveraged by a malicious actor to achieve Elevation of Privileges from standard user to administrator.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.beyondtrust.com/support/changelog/privilege-management-for-windows-5-6-sr1
- https://www.beyondtrust.com/trust-center/security-advisories/bt22-10
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-4029.
|
CVE ID: CVE-2021-4029
Date Updated: 2024-08-03T17:16:03.566Z
Date Published: 2022-02-22T14:25:14
Description:
A command injection vulnerability in the CGI program of the Zyxel ARMOR Z1/Z2 firmware could allow an attacker to execute arbitrary OS commands via a LAN interface.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zyxel.com/support/forgery-vulnerabilities-of-select-Armor-home-routers.shtml
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-36674.
|
CVE ID: CVE-2024-36674
Date Updated: 2024-08-02T03:37:05.326Z
Date Published: N/A
Description:
LyLme_spage v1.9.5 is vulnerable to Cross Site Scripting (XSS) via admin/link.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/LyLme/lylme_spage/issues/91
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-3724.
|
CVE ID: CVE-2016-3724
Date Updated: 2024-08-06T00:03:34.453Z
Date Published: 2016-05-17T14:00:00
Description:
Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with extended read access to obtain sensitive password information by reading a job configuration.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.cloudbees.com/jenkins-security-advisory-2016-05-11
- https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11
- https://access.redhat.com/errata/RHSA-2016:1206
- http://rhn.redhat.com/errata/RHSA-2016-1773.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-36025.
|
CVE ID: CVE-2022-36025
Date Updated: 2024-08-03T09:51:59.691Z
Date Published: 2022-09-24T02:00:13
Description:
Besu is a Java-based Ethereum client. In versions newer than 22.1.3 and prior to 22.7.1, Besu is subject to an Incorrect Conversion between Numeric Types. An error in 32 bit signed and unsigned types in the calculation of available gas in the CALL operations (including DELEGATECALL) results in incorrect gas being passed into called contracts and incorrect gas being returned after call execution. Where the amount of gas makes a difference in the success or failure, or if the gas is a negative 64 bit value, the execution will result in a different state root than expected, resulting in a consensus failure in networks with multiple EVM implementations. In networks with a single EVM implementation this can be used to execute with significantly more gas than then transaction requested, possibly exceeding gas limitations. This issue is patched in version 22.7.1. As a workaround, reverting to version 22.1.3 or earlier will prevent incorrect execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/hyperledger/besu/security/advisories/GHSA-4456-w38r-m53x
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.