instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2023-51098.
CVE ID: CVE-2023-51098 Date Updated: 2024-08-02T22:32:09.003Z Date Published: 2023-12-26T00:00:00 Description: Tenda W9 V1.0.0.7(4456)_CN was discovered to contain a command injection vulnerability via the function formSetDiagnoseInfo . No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/GD008/TENDA/blob/main/W9/W9_setDiagnoseInfo/W9_setDiagnoseInfo.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-42920.
CVE ID: CVE-2023-42920 Date Updated: 2024-08-27T14:07:47.895Z Date Published: 2024-03-19T16:46:46.325Z Description: Claris International has fixed a dylib hijacking vulnerability in the FileMaker Pro.app and Claris Pro.app versions on macOS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.claris.com/s/article/FileMaker-Security-Information?language=en_US No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1003.
CVE ID: CVE-2009-1003 Date Updated: 2024-08-07T04:57:17.541Z Date Published: 2009-04-15T10:00:00 Description: Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, and 9.0 allows remote attackers to affect integrity via unknown vectors related to "access to source code of web pages." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id?1022059 - http://www.securityfocus.com/bid/34461 - http://osvdb.org/53762 - http://www.oracle.com/technology/deploy/security/wls-security/1003.html - http://www.us-cert.gov/cas/techalerts/TA09-105A.html - http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/50054 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-7320.
CVE ID: CVE-2013-7320 Date Updated: 2024-08-06T18:01:20.390Z Date Published: 2014-02-06T15:00:00 Description: Cross-site request forgery (CSRF) vulnerability in D-Link DAP-2253 Access Point (Rev. A1) with firmware before 1.30 allows remote attackers to hijack the authentication of administrators for requests that modify configuration settings via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/64297 - http://secunia.com/advisories/56022 - http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10006 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39497.
CVE ID: CVE-2023-39497 Date Updated: 2024-08-02T18:10:21.123Z Date Published: 2024-05-03T02:10:58.136Z Description: PDF-XChange Editor JPG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPG files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-19947. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-1144/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7473.
CVE ID: CVE-2016-7473 Date Updated: 2018-07-26T19:57:01 Date Published: 2018-07-26T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3995.
CVE ID: CVE-2012-3995 Date Updated: 2024-08-06T20:21:04.039Z Date Published: 2012-10-10T17:00:00 Description: The IsCSSWordSpacingSpace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/50904 - http://secunia.com/advisories/50984 - http://secunia.com/advisories/50935 - http://secunia.com/advisories/50856 - http://secunia.com/advisories/50892 - http://rhn.redhat.com/errata/RHSA-2012-1351.html - https://bugzilla.mozilla.org/show_bug.cgi?id=765621 - http://secunia.com/advisories/50936 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16808 - http://secunia.com/advisories/55318 - http://www.securityfocus.com/bid/56136 - http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/79156 - http://www.mandriva.com/security/advisories?name=MDVSA-2012:163 - http://www.ubuntu.com/usn/USN-1611-1 - http://www.mozilla.org/security/announce/2012/mfsa2012-85.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3643.
CVE ID: CVE-2008-3643 Date Updated: 2024-08-07T09:45:18.953Z Date Published: 2008-10-10T10:00:00 Description: Unspecified vulnerability in Finder in Mac OS X 10.5.5 allows user-assisted attackers to cause a denial of service (continuous termination and restart) via a crafted Desktop file that generates an error when producing its icon, related to an "error recovery issue." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/31681 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45780 - http://www.securitytracker.com/id?1021024 - http://secunia.com/advisories/32222 - http://www.securityfocus.com/bid/31720 - http://www.vupen.com/english/advisories/2008/2780 - http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html - http://support.apple.com/kb/HT3216 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10975.
CVE ID: CVE-2019-10975 Date Updated: 2024-08-04T22:40:15.661Z Date Published: 2019-07-02T19:15:15 Description: An out-of-bounds read vulnerability has been identified in Fuji Electric Alpha7 PC Loader Versions 1.1 and prior, which may crash the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/108359 - https://www.zerodayinitiative.com/advisories/ZDI-19-517/ - https://www.us-cert.gov/ics/advisories/ICSA-19-136-02%2C - https://felib.fujielectric.co.jp/download/search2.htm?dosearch=1&site=global&lang=en&documentGroup=software No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3415.
CVE ID: CVE-2015-3415 Date Updated: 2024-08-06T05:47:57.679Z Date Published: 2015-04-24T17:00:00 Description: The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2015-1635.html - http://www.securitytracker.com/id/1033703 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - http://www.securityfocus.com/bid/74228 - http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html - https://security.gentoo.org/glsa/201507-05 - http://www.ubuntu.com/usn/USN-2698-1 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - https://support.apple.com/HT205267 - http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html - https://www.sqlite.org/src/info/02e3c88fbf6abdcf3975fb0fb71972b0ab30da30 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:217 - https://support.apple.com/HT205213 - http://www.debian.org/security/2015/dsa-3252 - http://seclists.org/fulldisclosure/2015/Apr/31 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1204.002
The MITRE ATT&CK technique T1204.002: Malicious File is related to the vulnerability CVE-CVE-2018-8248. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as exploitation_technique.
Provide detailed information about CVE-2009-2109.
CVE ID: CVE-2009-2109 Date Updated: 2024-08-07T05:36:20.982Z Date Published: 2009-06-18T21:00:00 Description: Multiple directory traversal vulnerabilities in FretsWeb 1.2 allow remote attackers to read arbitrary files via directory traversal sequences in the (1) language parameter to charts.php and the (2) fretsweb_language cookie parameter to unspecified vectors, possibly related to admin/common.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/55166 - http://secunia.com/advisories/35492 - https://www.exploit-db.com/exploits/8979 - http://osvdb.org/55196 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16878.
CVE ID: CVE-2020-16878 Date Updated: 2024-08-04T13:45:34.483Z Date Published: 2020-09-11T17:08:48 Description: <p>A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not properly sanitize a specially crafted web request to an affected Dynamics server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected Dynamics server.</p> <p>The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current authenticated user. These attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions within Dynamics Server on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user.</p> <p>The security update addresses the vulnerability by helping to ensure that Dynamics Server properly sanitizes web requests.</p> No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16878 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20695.
CVE ID: CVE-2021-20695 Date Updated: 2024-08-03T17:45:45.536Z Date Published: 2021-04-26T00:20:41 Description: Improper following of a certificate's chain of trust vulnerability in DAP-1880AC firmware version 1.21 and earlier allows a remote authenticated attacker to gain root privileges via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dlink-jp.com/support/release/jvnvu92898656_dap-1880ac.html - https://jvn.jp/en/vu/JVNVU92898656/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0793.
CVE ID: CVE-2013-0793 Date Updated: 2024-08-06T14:41:47.294Z Date Published: 2013-04-03T10:00:00 Description: Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 do not ensure the correctness of the address bar during history navigation, which allows remote attackers to conduct cross-site scripting (XSS) attacks or phishing attacks by leveraging control over navigation timing. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00019.html - http://www.ubuntu.com/usn/USN-1791-1 - http://www.debian.org/security/2013/dsa-2699 - http://www.securityfocus.com/bid/58837 - https://bugzilla.mozilla.org/show_bug.cgi?id=803870 - http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16928 - http://rhn.redhat.com/errata/RHSA-2013-0696.html - http://www.mozilla.org/security/announce/2013/mfsa2013-38.html - http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html - http://rhn.redhat.com/errata/RHSA-2013-0697.html - http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html - http://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9876.
CVE ID: CVE-2014-9876 Date Updated: 2024-08-06T13:55:05.082Z Date Published: 2016-08-06T10:00:00 Description: drivers/char/diag/diagfwd.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5, 5X, 6, 6P, and 7 (2013) devices mishandles certain integer values, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28767796 and Qualcomm internal bug CR483408. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://source.android.com/security/bulletin/2016-08-01.html - https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=7efd393ca08ac74b2e3d2639b0ad77da139e9139 - http://www.securityfocus.com/bid/92219 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1224.
CVE ID: CVE-2023-1224 Date Updated: 2024-08-02T05:40:59.645Z Date Published: 2023-03-07T21:42:17.668Z Description: Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html - https://crbug.com/1403539 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3226.
CVE ID: CVE-2015-3226 Date Updated: 2024-08-06T05:39:32.141Z Date Published: 2015-07-26T22:00:00 Description: Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1033755 - https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ - http://www.securityfocus.com/bid/75231 - http://openwall.com/lists/oss-security/2015/06/16/17 - http://www.debian.org/security/2016/dsa-3464 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-12779.
CVE ID: CVE-2017-12779 Date Updated: 2024-08-05T18:51:06.208Z Date Published: 2017-11-09T19:00:00 Description: The Node_GetData function in corec/corec/node/node.c in mkvalidator 0.5.1 allows remote attackers to cause a denial of service (Null pointer dereference and application crash) via a crafted mkv file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/144902/mkvalidator-0.5.1-Denial-Of-Service.html - http://seclists.org/fulldisclosure/2017/Nov/19 - https://github.com/Matroska-Org/foundation-source/issues/24 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20123.
CVE ID: CVE-2023-20123 Date Updated: 2024-08-02T08:57:35.831Z Date Published: 2023-04-05T00:00:00 Description: A vulnerability in the offline access mode of Cisco Duo Two-Factor Authentication for macOS and Duo Authentication for Windows Logon and RDP could allow an unauthenticated, physical attacker to replay valid user session credentials and gain unauthorized access to an affected macOS or Windows device. This vulnerability exists because session credentials do not properly expire. An attacker could exploit this vulnerability by replaying previously used multifactor authentication (MFA) codes to bypass MFA protection. A successful exploit could allow the attacker to gain unauthorized access to the affected device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-duo-replay-knuNKd No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2593.
CVE ID: CVE-2019-2593 Date Updated: 2024-10-02T15:47:44.840Z Date Published: 2019-04-23T18:16:40 Description: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - https://support.f5.com/csp/article/K54470776 - https://access.redhat.com/errata/RHSA-2019:2484 - https://access.redhat.com/errata/RHSA-2019:2511 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1142.
CVE ID: CVE-2015-1142 Date Updated: 2024-08-06T04:33:20.652Z Date Published: 2015-04-10T14:00:00 Description: LaunchServices in Apple OS X before 10.10.3 allows local users to cause a denial of service (Finder crash) via crafted localization data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT204659 - http://www.securityfocus.com/bid/73982 - http://www.securitytracker.com/id/1032048 - http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7621.
CVE ID: CVE-2016-7621 Date Updated: 2024-08-06T02:04:55.607Z Date Published: 2017-02-20T08:35:00 Description: An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows local users to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT207487 - https://support.apple.com/HT207422 - http://www.securityfocus.com/bid/94905 - http://www.securitytracker.com/id/1037469 - https://support.apple.com/HT207423 - https://www.exploit-db.com/exploits/40956/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24238.
CVE ID: CVE-2021-24238 Date Updated: 2024-08-03T19:21:18.692Z Date Published: 2021-04-22T21:00:51 Description: The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/ - https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5 - https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Findeo-WordPress-Theme-v1.3.0.txt - https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Realteo-WordPress-Plugin-v1.2.3.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20858.
CVE ID: CVE-2021-20858 Date Updated: 2024-08-03T17:53:22.852Z Date Published: 2021-12-01T02:15:51 Description: Cross-site scripting vulnerability in ELECOM LAN router WRC-2533GHBK-I firmware v1.20 and prior allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.elecom.co.jp/news/security/20211130-01/ - https://jvn.jp/en/jp/JVN88993473/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5994.
CVE ID: CVE-2017-5994 Date Updated: 2024-08-05T15:18:49.483Z Date Published: 2017-03-15T14:00:00 Description: Heap-based buffer overflow in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and crash) via the num_elements parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201707-06 - https://lists.freedesktop.org/archives/virglrenderer-devel/2017-February/000145.html - https://bugzilla.redhat.com/show_bug.cgi?id=1422452 - https://cgit.freedesktop.org/virglrenderer/commit/?id=114688c526fe45f341d75ccd1d85473c3b08f7a7 - http://www.securityfocus.com/bid/96276 - http://www.openwall.com/lists/oss-security/2017/02/15/8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43701.
CVE ID: CVE-2022-43701 Date Updated: 2024-08-03T13:40:06.204Z Date Published: 2023-07-27T21:28:08.461Z Description: When the installation directory does not have sufficiently restrictive file permissions, an attacker can modify files in the installation directory to cause execution of malicious code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://developer.arm.com/documentation/ka005596/latest - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00930.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-42385.
CVE ID: CVE-2022-42385 Date Updated: 2024-08-03T13:10:40.208Z Date Published: 2023-01-26T00:00:00 Description: This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18654. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tracker-software.com/product/pdf-xchange-editor/history - https://www.zerodayinitiative.com/advisories/ZDI-22-1376/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2052.
CVE ID: CVE-2009-2052 Date Updated: 2024-08-07T05:36:20.518Z Date Published: 2009-08-27T16:31:00 Description: Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.x, 5.x before 5.1(3g), 6.x before 6.1(4), 7.0 before 7.0(2), and 7.1 before 7.1(2); and Cisco Unified Presence 1.x, 6.x before 6.0(6), and 7.x before 7.0(4); allows remote attackers to cause a denial of service (TCP services outage) via a large number of TCP connections, related to "tracking of network connections," aka Bug IDs CSCsq22534 and CSCsw52371. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2009/2915 - http://secunia.com/advisories/36499 - http://secunia.com/advisories/37039 - http://securitytracker.com/id?1023018 - http://www.securityfocus.com/bid/36152 - http://secunia.com/advisories/36498 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080afc930.shtml - http://www.cisco.com/en/US/products/products_security_advisory09186a0080af2d11.shtml - http://www.securitytracker.com/id?1022775 - http://www.securityfocus.com/bid/36676 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22119.
CVE ID: CVE-2021-22119 Date Updated: 2024-08-03T18:30:23.943Z Date Published: 2021-06-29T16:15:05 Description: Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tanzu.vmware.com/security/cve-2021-22119 - https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14%40%3Cpluto-dev.portals.apache.org%3E - https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde%40%3Cpluto-dev.portals.apache.org%3E - https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3%40%3Cpluto-dev.portals.apache.org%3E - https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f%40%3Cpluto-dev.portals.apache.org%3E - https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc%40%3Cpluto-scm.portals.apache.org%3E - https://lists.apache.org/thread.html/r08a449010786e0bcffa4b5781b04fcb55d6eafa62cb79b8347680aad%40%3Cissues.nifi.apache.org%3E - https://www.oracle.com/security-alerts/cpujan2022.html - https://www.oracle.com/security-alerts/cpujul2022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14655.
CVE ID: CVE-2018-14655 Date Updated: 2024-08-05T09:38:13.384Z Date Published: 2018-11-13T19:00:00 Description: A flaw was found in Keycloak 3.4.3.Final, 4.0.0.Beta2, 4.3.0.Final. When using 'response_mode=form_post' it is possible to inject arbitrary Javascript-Code via the 'state'-parameter in the authentication URL. This allows an XSS-Attack upon succesfully login. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14655 - https://access.redhat.com/errata/RHSA-2018:3592 - https://access.redhat.com/errata/RHSA-2018:3593 - https://access.redhat.com/errata/RHSA-2018:3595 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-41614.
CVE ID: CVE-2024-41614 Date Updated: 2024-08-19T17:41:26.603Z Date Published: 2024-08-13T00:00:00 Description: symphonycms <=2.7.10 is vulnerable to Cross Site Scripting (XSS) in the Comment component for articles. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/OoLs5/VulDiscovery/blob/main/Symphony_CMS_XSS.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1269.
CVE ID: CVE-2019-1269 Date Updated: 2024-08-04T18:13:30.218Z Date Published: 2019-09-11T21:25:00 Description: An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system, aka 'Windows ALPC Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1272. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1269 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24565.
CVE ID: CVE-2021-24565 Date Updated: 2024-08-03T19:35:20.219Z Date Published: 2021-08-23T11:10:16 Description: The Contact Form 7 Captcha WordPress plugin before 0.0.9 does not have any CSRF check in place when saving its settings, allowing attacker to make a logged in user with the manage_options change them. Furthermore, the settings are not escaped when output in attributes, leading to a Stored Cross-Site Scripting issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/97bfef5e-2ee0-491a-a931-4f44c83e5be0 - https://plugins.trac.wordpress.org/changeset/2570402 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0334.
CVE ID: CVE-2024-0334 Date Updated: 2024-08-01T18:04:49.440Z Date Published: 2024-05-01T12:46:30.555Z Description: The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom attribute of a link in several Elementor widgets in all versions up to, and including, 2.6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/950e9042-1364-4200-8f57-171346075764?source=cve - https://plugins.trac.wordpress.org/changeset/3077328/jeg-elementor-kit No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4565.
CVE ID: CVE-2018-4565 Date Updated: 2023-09-14T18:42:07.966Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4453.
CVE ID: CVE-2012-4453 Date Updated: 2024-08-06T20:35:09.839Z Date Published: 2012-10-09T23:00:00 Description: dracut.sh in dracut, as used in Red Hat Enterprise Linux 6, Fedora 16 and 17, and possibly other products, creates initramfs images with world-readable permissions, which might allow local users to obtain sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2013-1674.html - https://bugzilla.redhat.com/show_bug.cgi?id=859448 - http://www.securityfocus.com/bid/55713 - http://www.openwall.com/lists/oss-security/2012/09/27/4 - https://exchange.xforce.ibmcloud.com/vulnerabilities/79258 - http://git.kernel.org/?p=boot/dracut/dracut.git%3Ba=commit%3Bh=e1b48995c26c4f06d1a71 - http://www.openwall.com/lists/oss-security/2012/09/27/6 - http://www.openwall.com/lists/oss-security/2012/09/27/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3160.
CVE ID: CVE-2023-3160 Date Updated: 2024-08-02T06:48:07.675Z Date Published: 2023-08-14T09:27:02.427Z Description: The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.eset.com/en/ca8466 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0572.
CVE ID: CVE-2013-0572 Date Updated: 2024-08-06T14:33:05.217Z Date Published: 2013-04-27T01:00:00 Description: Cross-site scripting (XSS) vulnerability in IBM Document Connect for Application Support Facility (aka DC4ASF) before 1.0.0.1218 in Application Support Facility (ASF) 3.4 for z/OS on Windows, Linux, and AIX allows remote authenticated users to inject content, and conduct phishing attacks, via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21635328 - https://exchange.xforce.ibmcloud.com/vulnerabilities/83247 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30937.
CVE ID: CVE-2022-30937 Date Updated: 2024-08-03T07:03:39.594Z Date Published: 2022-06-14T09:21:54 Description: A vulnerability has been identified in EN100 Ethernet module DNP3 IP variant (All versions), EN100 Ethernet module IEC 104 variant (All versions), EN100 Ethernet module IEC 61850 variant (All versions < V4.37), EN100 Ethernet module Modbus TCP variant (All versions), EN100 Ethernet module PROFINET IO variant (All versions). Affected applications contains a memory corruption vulnerability while parsing specially crafted HTTP packets to /txtrace endpoint. This could allow an attacker to crash the affected application leading to a denial of service condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-693555.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-39179.
CVE ID: CVE-2022-39179 Date Updated: 2024-08-03T12:00:42.476Z Date Published: 2022-11-17T22:27:55.603007Z Description: College Management System v1.0 - Authenticated remote code execution. An admin user (the authentication can be bypassed using SQL Injection that mentioned in my other report) can upload .php file that contains malicious code via student.php file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.gov.il/en/Departments/faq/cve_advisories No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2186.
CVE ID: CVE-2008-2186 Date Updated: 2024-08-07T08:49:58.495Z Date Published: 2008-05-13T22:00:00 Description: Cross-site scripting (XSS) vulnerability in index.php in Chilek Content Management System (aka ChiCoMaS) 2.0.4 allows remote attackers to inject arbitrary web script or HTML via the q parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.osvdb.org/44809 - http://www.securityfocus.com/archive/1/499458/100/0/threaded - http://marc.info/?l=bugtraq&m=120975560407192&w=2 - http://www.securityfocus.com/archive/1/499459/100/0/threaded - https://exchange.xforce.ibmcloud.com/vulnerabilities/42156 - https://www.exploit-db.com/exploits/7532 - http://www.bugreport.ir/index_59.htm - http://www.securityfocus.com/bid/29025 - http://secunia.com/advisories/30080 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-1665.
CVE ID: CVE-2021-1665 Date Updated: 2024-08-03T16:18:10.968Z Date Published: 2021-01-12T19:42:12 Description: GDI+ Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1665 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27902.
CVE ID: CVE-2020-27902 Date Updated: 2024-08-04T16:25:43.788Z Date Published: 2020-12-08T20:08:33 Description: An authentication issue was addressed with improved state management. This issue is fixed in iOS 14.2 and iPadOS 14.2. A person with physical access to an iOS device may be able to access stored passwords without authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT211929 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0453.
CVE ID: CVE-2018-0453 Date Updated: 2024-09-16T23:05:30.564Z Date Published: 2018-10-05T14:00:00Z Description: A vulnerability in the Sourcefire tunnel control channel protocol in Cisco Firepower System Software running on Cisco Firepower Threat Defense (FTD) sensors could allow an authenticated, local attacker to execute specific CLI commands with root privileges on the Cisco Firepower Management Center (FMC), or through Cisco FMC on other Firepower sensors and devices that are controlled by the same Cisco FMC. To send the commands, the attacker must have root privileges for at least one affected sensor or the Cisco FMC. The vulnerability exists because the affected software performs insufficient checks for certain CLI commands, if the commands are executed via a Sourcefire tunnel connection. An attacker could exploit this vulnerability by authenticating with root privileges to a Firepower sensor or Cisco FMC, and then sending specific CLI commands to the Cisco FMC or through the Cisco FMC to another Firepower sensor via the Sourcefire tunnel connection. A successful exploit could allow the attacker to modify device configurations or delete files on the device that is running Cisco FMC Software or on any Firepower device that is managed by Cisco FMC. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-fp-cmd-injection No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18856.
CVE ID: CVE-2018-18856 Date Updated: 2024-08-05T11:23:08.431Z Date Published: 2018-11-20T19:00:00 Description: Multiple local privilege escalation vulnerabilities have been identified in the LiquidVPN client through 1.37 for macOS. An attacker can communicate with an unprotected XPC service and directly execute arbitrary OS commands as root or load a potentially malicious kernel extension because com.smr.liquidvpn.OVPNHelper uses the system function to execute the "openvpncmd" parameter as a shell command. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/150137/LiquidVPN-For-macOS-1.3.7-Privilege-Escalation.html - https://www.exploit-db.com/exploits/45782/ - http://seclists.org/fulldisclosure/2018/Nov/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25398.
CVE ID: CVE-2024-25398 Date Updated: 2024-08-27T20:38:52.852Z Date Published: 2024-02-27T00:00:00 Description: In Srelay (the SOCKS proxy and Relay) v.0.4.8p3, a specially crafted network payload can trigger a denial of service condition and disrupt the service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sourceforge.net/projects/socks-relay/ - https://github.com/Nivedita-22/SRELAY-exploit-writeup/blob/main/Srelay.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38971.
CVE ID: CVE-2021-38971 Date Updated: 2024-09-17T01:06:09.137Z Date Published: 2022-03-14T17:00:21.310191Z Description: IBM Data Virtualization on Cloud Pak for Data 1.3.0, 1.4.1, 1.5.0, 1.7.1 and 1.7.3 could allow an authorized user to bypass data masking rules and obtain sensitve information. IBM X-Force ID: 212620. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6551076 - https://exchange.xforce.ibmcloud.com/vulnerabilities/212620 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23692.
CVE ID: CVE-2023-23692 Date Updated: 2024-08-02T10:35:33.652Z Date Published: 2023-02-01T12:30:12.354Z Description: Dell EMC prior to version DDOS 7.9 contain(s) an OS command injection Vulnerability. An authenticated non admin attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000201296/dsa-2022-187-dell-technologies-powerprotect-data-domain-security-update-for-multiple-third-party-component-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7440.
CVE ID: CVE-2015-7440 Date Updated: 2024-08-06T07:51:27.317Z Date Published: 2018-03-15T22:00:00 Description: IBM Rational Collaborative Lifecycle Management (CLM) 3.0.1 before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Quality Manager (RQM) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Team Concert (RTC) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1, 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Requirements Composer (RRC) 3.0.x before 3.0.1.6 iFix7 Interim Fix 1 and 4.0.x before 4.0.7 iFix10; Rational DOORS Next Generation (RDNG) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; Rational Engineering Lifecycle Manager (RELM) 4.0.3, 4.0.4, 4.0.5, 4.0.6, and 4.0.7 before iFix10, 5.0.x before 5.0.2 iFix1, and 6.0.x before 6.0.2; Rational Rhapsody Design Manager (Rhapsody DM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4; and Rational Software Architect Design Manager (RSA DM) 4.0.x before 4.0.7 iFix10, 5.0.x before 5.0.2 iFix15, and 6.0.x before 6.0.1 iFix4 might allow local users to gain privileges via unspecified vectors. IBM X-Force ID: 108098. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21982747 - https://exchange.xforce.ibmcloud.com/vulnerabilities/108098 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-31469.
CVE ID: CVE-2022-31469 Date Updated: 2024-08-03T07:19:06.134Z Date Published: 2022-12-26T00:00:00 Description: OX App Suite through 7.10.6 allows XSS via a deep link, as demonstrated by class="deep-link-app" for a /#!!&app=%2e./ URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://open-xchange.com - https://seclists.org/fulldisclosure/2022/Nov/18 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-33365.
CVE ID: CVE-2024-33365 Date Updated: 2024-08-02T02:27:53.639Z Date Published: 2024-07-29T00:00:00 Description: Buffer Overflow vulnerability in Tenda AC10 v4 US_AC10V4.0si_V16.03.10.20_cn allows a remote attacker to execute arbitrary code via the Virtual_Data_Check function in the bin/httpd component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackmd.io/%40JohnathanHuuTri/rJNbEItJC - https://github.com/johnathanhuutri/CVE_report/blob/master/CVE-2024-33365/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-10396.
CVE ID: CVE-2020-10396 Date Updated: 2024-08-04T10:58:40.584Z Date Published: 2020-03-12T13:03:53 Description: The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/add-language.php by adding a question mark (?) followed by the payload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://antoniocannito.it/?p=137#uxss - https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2779.
CVE ID: CVE-2015-2779 Date Updated: 2024-08-06T05:24:38.903Z Date Published: 2015-04-10T14:00:00 Description: Stack consumption vulnerability in the message splitting functionality in Quassel before 0.12-rc1 allows remote attackers to cause a denial of service (uncontrolled recursion) via a crafted massage. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8 - http://www.openwall.com/lists/oss-security/2015/03/20/12 - http://www.securityfocus.com/bid/74048 - http://lists.opensuse.org/opensuse-updates/2015-04/msg00018.html - http://www.openwall.com/lists/oss-security/2015/03/27/11 - http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163054.html - http://www.openwall.com/lists/oss-security/2015/03/28/3 - http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158666.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5471.
CVE ID: CVE-2018-5471 Date Updated: 2024-08-05T05:33:44.433Z Date Published: 2018-03-06T21:00:00 Description: A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/103340 - https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5706.
CVE ID: CVE-2008-5706 Date Updated: 2024-08-07T11:04:44.183Z Date Published: 2008-12-22T15:00:00 Description: The cTrigger::DoIt function in src/ctrigger.cpp in the trigger mechanism in the daemon in Verlihub 0.9.8d-RC2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/trigger.tmp temporary file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://bugs.debian.org/506530 - http://www.securityfocus.com/bid/32889 - https://www.exploit-db.com/exploits/7183 - http://openwall.com/lists/oss-security/2008/12/17/16 - http://securityreason.com/securityalert/4800 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21630.
CVE ID: CVE-2021-21630 Date Updated: 2024-08-03T18:16:23.814Z Date Published: 2021-03-30T11:10:32 Description: Jenkins Extra Columns Plugin 1.22 and earlier does not escape parameter values in the build parameters column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2222 - http://www.openwall.com/lists/oss-security/2021/03/30/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6793.
CVE ID: CVE-2014-6793 Date Updated: 2024-08-06T12:24:35.661Z Date Published: 2014-09-29T01:00:00 Description: The Arch Friend (aka com.xyproto.archfriend) application 0.4.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/778649 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-29234.
CVE ID: CVE-2023-29234 Date Updated: 2024-08-02T14:00:15.993Z Date Published: 2023-12-15T08:14:47.561Z Description: A deserialization vulnerability existed when decode a malicious package.This issue affects Apache Dubbo: from 3.1.0 through 3.1.10, from 3.2.0 through 3.2.4. Users are recommended to upgrade to the latest version, which fixes the issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/wb2df2whkdnbgp54nnqn0m94rllx8f77 - http://www.openwall.com/lists/oss-security/2023/12/15/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1000835.
CVE ID: CVE-2018-1000835 Date Updated: 2024-09-16T23:02:08.496Z Date Published: 2018-12-20T15:00:00Z Description: KeePassDX version <= 2.5.0.0beta17 contains a XML External Entity (XXE) vulnerability in kdbx file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Kunzisoft/KeePassDX/issues/200 - https://0dd.zone/2018/10/28/KeePassDX-XXE/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0307.
CVE ID: CVE-2019-0307 Date Updated: 2024-08-04T17:44:16.441Z Date Published: 2019-06-12T14:21:39 Description: Diagnostics Agent in Solution Manager, version 7.2, stores several credentials such as SLD user connection as well as Solman user communication in the SAP Secure Storage file which is not encrypted by default. By decoding these credentials, an attacker with admin privileges could gain access to the entire configuration, but no system sensitive information can be gained. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.support.sap.com/#/notes/2772266 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7742.
CVE ID: CVE-2016-7742 Date Updated: 2024-08-06T02:04:56.093Z Date Published: 2017-02-20T08:35:00 Description: An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "xar" component, which allows remote attackers to execute arbitrary code via a crafted archive that triggers use of uninitialized memory locations. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT207423 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18310.
CVE ID: CVE-2018-18310 Date Updated: 2024-08-05T11:08:21.823Z Date Published: 2018-10-15T02:00:00 Description: An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sourceware.org/bugzilla/show_bug.cgi?id=23752 - https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html - https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html - https://usn.ubuntu.com/4012-1/ - http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html - https://access.redhat.com/errata/RHSA-2019:2197 - https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21154.
CVE ID: CVE-2023-21154 Date Updated: 2024-08-02T09:28:25.915Z Date Published: 2023-06-28T00:00:00 Description: In StoreAdbSerialNumber of protocolmiscbuilder.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-263783910References: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2023-06-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3096.
CVE ID: CVE-2008-3096 Date Updated: 2024-08-07T09:28:41.241Z Date Published: 2008-07-09T19:00:00 Description: The Outline Designer module 5.x before 5.x-1.4 for Drupal changes each content reader's authentication level to match that of the content author, which might allow remote attackers to gain privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/43548 - http://www.securityfocus.com/bid/30066 - http://drupal.org/node/277883 - http://secunia.com/advisories/30936 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4265.
CVE ID: CVE-2019-4265 Date Updated: 2024-09-17T00:06:45.510Z Date Published: 2019-10-10T14:00:19.786270Z Description: IBM Maximo Anywhere 7.6.0, 7.6.1, 7.6.2, and 7.6.3 does not have device root detection which could result in an attacker gaining sensitive information about the device. IBM X-Force ID: 160198. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/1078995 - https://exchange.xforce.ibmcloud.com/vulnerabilities/160198 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0546.
CVE ID: CVE-2014-0546 Date Updated: 2024-08-06T09:20:19.091Z Date Published: 2014-08-12T21:00:00 Description: Adobe Reader and Acrobat 10.x before 10.1.11 and 11.x before 11.0.08 on Windows allow attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://helpx.adobe.com/security/products/reader/apsb14-19.html - http://www.securitytracker.com/id/1030711 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35692.
CVE ID: CVE-2022-35692 Date Updated: 2024-09-16T18:24:51.344Z Date Published: 2022-08-19T22:49:21.931103Z Description: Adobe Commerce versions 2.4.3-p2 (and earlier), 2.3.7-p3 (and earlier) and 2.4.4 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to leak minor information of another user's account detials. Exploitation of this issue does not require user interaction. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/magento/apsb22-38.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1545.
CVE ID: CVE-2013-1545 Date Updated: 2024-08-06T15:04:49.452Z Date Published: 2013-04-17T12:10:00 Description: Unspecified vulnerability in the Oracle HTTP Server component in Oracle Fusion Middleware 10.1.3.5, 11.1.1.5.0, and 11.1.1.6.0 allows remote attackers to affect availability via unknown vectors related to Web Listener. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html - http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1477.
CVE ID: CVE-2015-1477 Date Updated: 2024-09-16T19:04:45.153Z Date Published: 2015-02-04T16:00:00Z Description: SQL injection vulnerability in the CMSJunkie J-ClassifiedsManager component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a viewad task to classifieds/offerring-ads. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/130093/JClassifiedsManager-Cross-Site-Scripting-SQL-Injection.html - http://osvdb.org/show/osvdb/117567 - http://www.exploit-db.com/exploits/35911 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6476.
CVE ID: CVE-2018-6476 Date Updated: 2024-09-17T01:41:20.468Z Date Published: 2018-01-31T19:00:00Z Description: In SUPERAntiSpyware Professional Trial 6.0.1254, the SASKUTIL.SYS driver allows privilege escalation to NT AUTHORITY\SYSTEM because of not validating input values from IOCtl 0x9C402114 or 0x9C402124 or 0x9C40207c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402114_9C402124_9C40207c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0373.
CVE ID: CVE-2008-0373 Date Updated: 2024-08-07T07:39:34.814Z Date Published: 2008-01-22T19:00:00 Description: Unrestricted file upload vulnerability in PHP F1 Max's File Uploader allows remote attackers to upload and execute arbitrary PHP files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/486335/100/0/threaded - https://exchange.xforce.ibmcloud.com/vulnerabilities/39740 - http://www.securityfocus.com/bid/27285 - http://securityreason.com/securityalert/3572 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8880.
CVE ID: CVE-2019-8880 Date Updated: 2023-09-14T18:43:59.274Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8719.
CVE ID: CVE-2019-8719 Date Updated: 2024-08-04T21:24:29.662Z Date Published: 2019-12-18T17:33:23 Description: A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT210635 - https://support.apple.com/HT210636 - https://support.apple.com/HT210637 - https://security.gentoo.org/glsa/202003-22 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39299.
CVE ID: CVE-2023-39299 Date Updated: 2024-09-05T18:40:12.259Z Date Published: 2023-11-03T16:34:46.932Z Description: A path traversal vulnerability has been reported to affect Music Station. If exploited, the vulnerability could allow users to read the contents of unexpected files and expose sensitive data via a network. We have already fixed the vulnerability in the following versions: Music Station 4.8.11 and later Music Station 5.1.16 and later Music Station 5.3.23 and later No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qnap.com/en/security-advisory/qsa-23-61 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0746.
CVE ID: CVE-2024-0746 Date Updated: 2024-08-01T18:18:18.224Z Date Published: 2024-01-23T13:48:16.400Z Description: A Linux user opening the print preview dialog could have caused the browser to crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=1660223 - https://www.mozilla.org/security/advisories/mfsa2024-01/ - https://www.mozilla.org/security/advisories/mfsa2024-02/ - https://www.mozilla.org/security/advisories/mfsa2024-04/ - https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html - https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-19105.
CVE ID: CVE-2018-19105 Date Updated: 2024-08-05T11:30:03.975Z Date Published: 2018-11-08T08:00:00 Description: LibreCAD 2.1.3 allows remote attackers to cause a denial of service (0x89C04589 write access violation and application crash) or possibly have unspecified other impact via a crafted file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://code610.blogspot.com/2018/11/crashing-librecad-213.html - https://lists.debian.org/debian-lts-announce/2019/05/msg00005.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-9222.
CVE ID: CVE-2015-9222 Date Updated: 2024-09-17T02:36:22.612Z Date Published: 2018-04-18T14:00:00Z Description: In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SD 845, SDM630, SDM636, SDM660, and Snapdragon_High_Med_2016, processing erroneous bitstreams may result in a HW freeze. FW should detect the HW freeze based on watchdog timer, but because the watchdog timer is not enabled, an infinite loop occurs, resulting in a device freeze. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/39739/ - https://source.android.com/security/bulletin/2018-04-01 - http://www.securityfocus.com/bid/103671 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0246.
CVE ID: CVE-2014-0246 Date Updated: 2024-08-06T09:05:39.383Z Date Published: 2014-05-29T14:00:00 Description: SOSreport stores the md5 hash of the GRUB bootloader password in an archive, which allows local users to obtain sensitive information by reading the archive. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/67634 - https://bugzilla.redhat.com/show_bug.cgi?id=1101393 - http://www.openwall.com/lists/oss-security/2014/05/27/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4959.
CVE ID: CVE-2018-4959 Date Updated: 2024-08-05T05:18:27.046Z Date Published: 2018-07-09T19:00:00 Description: Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/104169 - https://helpx.adobe.com/security/products/acrobat/apsb18-09.html - http://www.securitytracker.com/id/1040920 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1747.
CVE ID: CVE-2018-1747 Date Updated: 2024-09-17T03:03:07.047Z Date Published: 2018-10-15T13:00:00Z Description: IBM Security Key Lifecycle Manager 2.5, 2.6, 2.7, and 3.0 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 148428. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/docview.wss?uid=ibm10733429 - https://exchange.xforce.ibmcloud.com/vulnerabilities/148428 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-22277.
CVE ID: CVE-2020-22277 Date Updated: 2024-08-04T14:51:10.471Z Date Published: 2020-11-04T16:57:01 Description: Import and export users and customers WordPress Plugin through 1.15.5.11 allows CSV injection via a customer's profile. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mega.nz/file/bSQnlS4R#UY_ozLkvXgXFKzqtTRKeB9RXGi6aEQF3X6eKXdSiBt0 - https://wordpress.org/plugins/import-users-from-csv-with-meta/#:~:text=Install%20Import%20and%20export%20users%20and%20customers%20automatically%2Cis%20uploaded%20and%20extracted%2C%20click%20Activate%20Plugin%20. - https://cert.ikiu.ac.ir/public-files/news/document/CVE-99/CVE-2020-22277.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5242.
CVE ID: CVE-2012-5242 Date Updated: 2024-08-06T20:58:03.323Z Date Published: 2014-10-21T14:00:00 Description: Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/23573 - https://www.htbridge.com/advisory/HTB23118 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26707.
CVE ID: CVE-2022-26707 Date Updated: 2024-08-03T05:11:44.083Z Date Published: 2022-09-23T18:58:30 Description: An issue in the handling of environment variables was addressed with improved validation. This issue is fixed in macOS Monterey 12.4. A user may be able to view sensitive user information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213257 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27620.
CVE ID: CVE-2020-27620 Date Updated: 2024-08-04T16:18:44.920Z Date Published: 2020-10-22T03:05:10 Description: The Cosmos Skin for MediaWiki through 1.35.0 has stored XSS because MediaWiki messages were not being properly escaped. This is related to wfMessage and Html::rawElement, as demonstrated by CosmosSocialProfile::getUserGroups. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://phabricator.wikimedia.org/T265440 - https://gerrit.wikimedia.org/r/c/mediawiki/skins/Cosmos/+/634749 - https://gerrit.wikimedia.org/r/c/mediawiki/skins/Cosmos/+/634752 - https://gerrit.wikimedia.org/r/c/mediawiki/skins/Cosmos/+/634751 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0260.
CVE ID: CVE-2024-0260 Date Updated: 2024-08-01T17:41:16.562Z Date Published: 2024-01-07T00:00:07.682Z Description: A vulnerability, which was classified as problematic, was found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file change_password_teacher.php of the component Password Change. The manipulation leads to session expiration. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249816. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.249816 - https://vuldb.com/?ctiid.249816 - https://mega.nz/file/yEsSwK6D#--ygVt0NtzhZdqVxvjaPLCYfnIeBSyf76KaRozOxfVo No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15049.
CVE ID: CVE-2020-15049 Date Updated: 2024-08-04T13:08:21.396Z Date Published: 2020-06-30T17:55:55 Description: An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.squid-cache.org/Versions/v4/changesets/squid-4-ea12a34d338b962707d5078d6d1fc7c6eb119a22.patch - http://www.squid-cache.org/Versions/v5/changesets/squid-5-485c9a7bb1bba88754e07ad0094647ea57a6eb8d.patch - https://github.com/squid-cache/squid/security/advisories/GHSA-qf3v-rc95-96j5 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3RG5FGSTCAYVIJPJHIY3MRZ7NFT6HDO7/ - https://www.debian.org/security/2020/dsa-4732 - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html - https://usn.ubuntu.com/4551-1/ - https://lists.debian.org/debian-lts-announce/2020/10/msg00005.html - https://security.netapp.com/advisory/ntap-20210312-0001/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-5026.
CVE ID: CVE-2010-5026 Date Updated: 2024-08-07T04:09:38.968Z Date Published: 2011-11-02T21:00:00 Description: SQL injection vulnerability in winners.php in Science Fair In A Box (SFIAB) 2.0.6 and 2.2.0 allows remote attackers to execute arbitrary SQL commands via the type parameter. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2010/1428 - http://secunia.com/advisories/40170 - http://www.exploit-db.com/exploits/13801 - http://securityreason.com/securityalert/8516 - https://exchange.xforce.ibmcloud.com/vulnerabilities/59282 - http://www.securityfocus.com/bid/40743 - http://packetstormsecurity.org/1006-exploits/fairinabox-sqlxss.txt - http://www.osvdb.org/65420 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3504.
CVE ID: CVE-2009-3504 Date Updated: 2024-09-16T23:30:44.221Z Date Published: 2009-09-30T15:00:00Z Description: SQL injection vulnerability in offers_buy.php in Alibaba Clone 3.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/36845 - http://packetstormsecurity.org/0909-exploits/alibaba30-sql.txt - http://www.vupen.com/english/advisories/2009/2737 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27080.
CVE ID: CVE-2021-27080 Date Updated: 2024-08-03T20:40:47.095Z Date Published: 2021-03-11T15:47:12 Description: Azure Sphere Unsigned Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27080 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1250 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3278.
CVE ID: CVE-2011-3278 Date Updated: 2024-09-16T20:17:35.864Z Date Published: 2011-10-03T23:00:00Z Description: Unspecified vulnerability in the NAT implementation in Cisco IOS 12.1 through 12.4 and 15.0 through 15.1, and IOS XE 3.1.xSG, allows remote attackers to cause a denial of service (device reload) by sending crafted SIP packets to UDP port 5060, aka Bug ID CSCti48483. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/viewAlert.x?alertId=24120 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b95d4d.shtml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-7675.
CVE ID: CVE-2018-7675 Date Updated: 2024-08-05T06:31:05.057Z Date Published: 2018-03-07T22:00:00 Description: In NetIQ Sentinel before 8.1.x, a Sentinel user is logged into the Sentinel Web Interface. After performing some tasks within Sentinel the user does not log out but does go idle for a period of time. This in turn causes the interface to timeout so that it requires the user to re-authenticate. If another user is passing by and decides to login, their credentials are accepted. While The user does not inherit any of the other users privileges, they are able to view the previous screen. In this case it is possible that the user can see another users events or configuration information for whatever view is currently showing. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.netiq.com/support/kb/doc.php?id=7022706 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-23340.
CVE ID: CVE-2021-23340 Date Updated: 2024-09-17T03:43:54.860Z Date Published: 2021-02-18T14:25:14.352339Z Description: This affects the package pimcore/pimcore before 6.8.8. A Local FIle Inclusion vulnerability exists in the downloadCsvAction function of the CustomReportController class (bundles/AdminBundle/Controller/Reports/CustomReportController.php). An authenticated user can reach this function with a GET request at the following endpoint: /admin/reports/custom-report/download-csv?exportFile=&91;filename]. Since exportFile variable is not sanitized, an attacker can exploit a local file inclusion vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1070132 - https://github.com/pimcore/pimcore/blob/v6.7.2/bundles/AdminBundle/Controller/Reports/CustomReportController.php%23L454 - https://github.com/pimcore/pimcore/commit/1786bdd4962ee51544fad537352c2b4223309442 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21596.
CVE ID: CVE-2021-21596 Date Updated: 2024-09-17T03:29:07.090Z Date Published: 2021-08-09T21:05:31.508558Z Description: Dell OpenManage Enterprise versions 3.4 through 3.6.1 and Dell OpenManage Enterprise Modular versions 1.20.00 through 1.30.00, contain a remote code execution vulnerability. A malicious attacker with access to the immediate subnet may potentially exploit this vulnerability leading to information disclosure and a possible elevation of privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/000189673 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-23330.
CVE ID: CVE-2021-23330 Date Updated: 2024-09-17T04:04:33.394Z Date Published: 2021-02-01T15:05:16.787092Z Description: All versions of package launchpad are vulnerable to Command Injection via stop. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://snyk.io/vuln/SNYK-JS-LAUNCHPAD-1044065 - https://github.com/bitovi/launchpad/issues/123%23issuecomment-732188118 - https://github.com/bitovi/launchpad/pull/124 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1000035.
CVE ID: CVE-2018-1000035 Date Updated: 2024-08-05T12:33:48.718Z Date Published: 2018-02-09T23:00:00 Description: A heap-based buffer overflow exists in Info-Zip UnZip version <= 6.00 in the processing of password-protected archives that allows an attacker to perform a denial of service or to possibly achieve code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html - https://lists.debian.org/debian-lts-announce/2020/01/msg00026.html - https://security.gentoo.org/glsa/202003-58 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4670.
CVE ID: CVE-2008-4670 Date Updated: 2024-08-07T10:24:20.643Z Date Published: 2008-10-22T10:00:00 Description: Cross-site scripting (XSS) vulnerability in search.php in Ed Pudol Clickbank Portal allows remote attackers to inject arbitrary web script or HTML via the search box. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/45483 - http://www.securityfocus.com/bid/31438 - http://www.securityfocus.com/bid/31438/exploit No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3159.
CVE ID: CVE-2012-3159 Date Updated: 2024-08-06T19:57:49.181Z Date Published: 2012-10-16T21:29:00 Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1533. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html - http://rhn.redhat.com/errata/RHSA-2012-1466.html - http://secunia.com/advisories/51438 - http://marc.info/?l=bugtraq&m=135758563611658&w=2 - http://www-01.ibm.com/support/docview.wss?uid=swg21621154 - http://rhn.redhat.com/errata/RHSA-2013-1455.html - http://rhn.redhat.com/errata/RHSA-2012-1391.html - http://www-01.ibm.com/support/docview.wss?uid=swg21620037 - http://marc.info/?l=bugtraq&m=135758563611658&w=2 - https://exchange.xforce.ibmcloud.com/vulnerabilities/79424 - http://secunia.com/advisories/51390 - http://rhn.redhat.com/errata/RHSA-2012-1392.html - http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00022.html - http://www-01.ibm.com/support/docview.wss?uid=swg21616490 - http://secunia.com/advisories/51327 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16615 - http://rhn.redhat.com/errata/RHSA-2012-1467.html - http://www-01.ibm.com/support/docview.wss?uid=swg21620575 - http://marc.info/?l=bugtraq&m=135542848327757&w=2 - http://www.securityfocus.com/bid/56072 - http://rhn.redhat.com/errata/RHSA-2013-1456.html - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html - http://secunia.com/advisories/51326 - http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf - http://marc.info/?l=bugtraq&m=135542848327757&w=2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-48809.
CVE ID: CVE-2022-48809 Date Updated: 2024-09-11T17:34:13.409Z Date Published: 2024-07-16T11:43:59.757Z Description: In the Linux kernel, the following vulnerability has been resolved: net: fix a memleak when uncloning an skb dst and its metadata When uncloning an skb dst and its associated metadata, a new dst+metadata is allocated and later replaces the old one in the skb. This is helpful to have a non-shared dst+metadata attached to a specific skb. The issue is the uncloned dst+metadata is initialized with a refcount of 1, which is increased to 2 before attaching it to the skb. When tun_dst_unclone returns, the dst+metadata is only referenced from a single place (the skb) while its refcount is 2. Its refcount will never drop to 0 (when the skb is consumed), leading to a memory leak. Fix this by removing the call to dst_hold in tun_dst_unclone, as the dst+metadata refcount is already 1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/4ac84498fbe84a00e7aef185e2bb3e40ce71eca4 - https://git.kernel.org/stable/c/c1ff27d100e2670b03cbfddb9117e5f9fc672540 - https://git.kernel.org/stable/c/0be943916d781df2b652793bb2d3ae4f9624c10a - https://git.kernel.org/stable/c/a80817adc2a4c1ba26a7aa5f3ed886e4a18dff88 - https://git.kernel.org/stable/c/00e6d6c3bc14dfe32824e2c515f0e0f2d6ecf2f1 - https://git.kernel.org/stable/c/fdcb263fa5cda15b8cb24a641fa2718c47605314 - https://git.kernel.org/stable/c/8b1087b998e273f07be13dcb5f3ca4c309c7f108 - https://git.kernel.org/stable/c/9eeabdf17fa0ab75381045c867c370f4cc75a613 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8503.
CVE ID: CVE-2018-8503 Date Updated: 2024-08-05T06:54:36.912Z Date Published: 2018-10-10T13:00:00 Description: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8505, CVE-2018-8510, CVE-2018-8511, CVE-2018-8513. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1041825 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8503 - http://www.securityfocus.com/bid/105464 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.