instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2009-3703.
CVE ID: CVE-2009-3703 Date Updated: 2024-08-07T06:38:30.209Z Date Published: 2009-12-18T19:00:00 Description: Multiple SQL injection vulnerabilities in the WP-Forum plugin before 2.4 for WordPress allow remote attackers to execute arbitrary SQL commands via (1) the search_max parameter in a search action to the default URI, related to wpf.class.php; (2) the forum parameter to an unspecified component, related to wpf.class.php; (3) the topic parameter in a viewforum action to the default URI, related to the remove_topic function in wpf.class.php; or the id parameter in a (4) editpost or (5) viewtopic action to the default URI, related to wpf-post.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/37357 - http://www.securityfocus.com/archive/1/508504/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1557 : Adversary-in-the-Middle
Name: Adversary-in-the-Middle ID: T1557 URL: https://attack.mitre.org/techniques/T1557 Platforms: Windows, macOS, Linux, Network Kill Chain Phases: Credential Access, Collection Description: Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](T1040), [Transmitted Data Manipulation](T1565.002), or replay attacks ([Exploitation for Credential Access](T1212)). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics) For example, adversaries may manipulate victim DNS settings to enable other malicious activities such as preventing/redirecting users from accessing legitimate sites and/or pushing additional malware.(Citation: ttint_rat)(Citation: dns_changer_trojans)(Citation: ad_blocker_with_miner) Adversaries may also manipulate DNS and leverage their position in order to intercept user credentials, including access tokens ([Steal Application Access Token](T1528)) and session cookies ([Steal Web Session Cookie](T1539)).(Citation: volexity_0day_sophos_FW)(Citation: Token tactics) [Downgrade Attack](T1562.010)s can also be used to establish an AiTM position, such as by negotiating a less secure, deprecated, or weaker version of communication protocol (SSL/TLS) or encryption algorithm.(Citation: mitm_tls_downgrade_att)(Citation: taxonomy_downgrade_att_tls)(Citation: tlseminar_downgrade_att) Adversaries may also leverage the AiTM position to attempt to monitor and/or modify traffic, such as in [Transmitted Data Manipulation](T1565.002). Adversaries can setup a position similar to AiTM to prevent traffic from flowing to the appropriate destination, potentially to [Impair Defenses](T1562) and/or in support of a [Network Denial of Service](T1498). Data Sources: Application Log: Application Log Content, Network Traffic: Network Traffic Content, Windows Registry: Windows Registry Key Modification, Network Traffic: Network Traffic Flow, Service: Service Creation Detection: Monitor network traffic for anomalies associated with known AiTM behavior. Consider monitoring for modifications to system configuration files involved in shaping network traffic flow.
Provide detailed information about CVE-2019-15707.
CVE ID: CVE-2019-15707 Date Updated: 2024-08-05T00:56:22.364Z Date Published: 2020-01-23T17:47:00 Description: An improper access control vulnerability in FortiMail admin webUI 6.2.0, 6.0.0 to 6.0.6, 5.4.10 and below may allow administrators to perform system backup config download they should not be authorized for. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/advisory/FG-IR-19-237 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8003.
CVE ID: CVE-2020-8003 Date Updated: 2024-08-04T09:48:25.490Z Date Published: 2020-01-27T00:00:00 Description: A double-free vulnerability in vrend_renderer.c in virglrenderer through 0.8.1 allows attackers to cause a denial of service by triggering texture allocation failure, because vrend_renderer_resource_allocated_texture is not an appropriate place for a free. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340 - https://gitlab.freedesktop.org/virgl/virglrenderer/commit/f9b079ccc319c98499111f66bd654fc9b56cf15f?merge_request_iid=340 - https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340/diffs?commit_id=f9b079ccc319c98499111f66bd654fc9b56cf15f - https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/340/diffs?commit_id=3320973c9f2068f60cf6613c2811a8824781878a - https://lists.debian.org/debian-lts-announce/2022/12/msg00017.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2807.
CVE ID: CVE-2008-2807 Date Updated: 2024-08-07T09:14:14.921Z Date Published: 2008-07-07T23:00:00 Description: Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly handle an invalid .properties file for an add-on, which allows remote attackers to read uninitialized memory, as demonstrated by use of ISO 8859 encoding instead of UTF-8 encoding in a French .properties file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html - http://www.redhat.com/support/errata/RHSA-2008-0549.html - http://www.debian.org/security/2009/dsa-1697 - http://secunia.com/advisories/31021 - https://exchange.xforce.ibmcloud.com/vulnerabilities/50656 - http://secunia.com/advisories/30898 - http://secunia.com/advisories/31403 - http://wiki.rpath.com/Advisories:rPSA-2008-0216 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9432 - https://issues.rpath.com/browse/RPL-2646 - http://secunia.com/advisories/30949 - http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152 - http://www.vupen.com/english/advisories/2009/0977 - http://secunia.com/advisories/31069 - http://secunia.com/advisories/31008 - http://secunia.com/advisories/31377 - http://rhn.redhat.com/errata/RHSA-2008-0616.html - http://www.vupen.com/english/advisories/2008/1993/references - http://secunia.com/advisories/31023 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:155 - http://www.securityfocus.com/bid/30038 - http://www.debian.org/security/2008/dsa-1607 - http://security.gentoo.org/glsa/glsa-200808-03.xml - http://secunia.com/advisories/31005 - http://secunia.com/advisories/33433 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html - http://www.securitytracker.com/id?1020419 - http://secunia.com/advisories/31253 - http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15 - https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html - http://secunia.com/advisories/31183 - http://secunia.com/advisories/30903 - http://www.redhat.com/support/errata/RHSA-2008-0547.html - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html - https://bugzilla.mozilla.org/show_bug.cgi?id=397093 - http://www.ubuntu.com/usn/usn-629-1 - http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 - http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911 - http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.410484 - http://www.debian.org/security/2008/dsa-1615 - https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html - http://secunia.com/advisories/31220 - http://secunia.com/advisories/31195 - http://www.mozilla.org/security/announce/2008/mfsa2008-29.html - http://secunia.com/advisories/31076 - http://www.ubuntu.com/usn/usn-619-1 - http://secunia.com/advisories/30911 - http://www.redhat.com/support/errata/RHSA-2008-0569.html - http://secunia.com/advisories/30878 - http://www.debian.org/security/2008/dsa-1621 - http://www.securityfocus.com/archive/1/494080/100/0/threaded - http://secunia.com/advisories/31286 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html - http://secunia.com/advisories/34501 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:136 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3405.
CVE ID: CVE-2008-3405 Date Updated: 2024-08-07T09:37:26.876Z Date Published: 2008-07-31T16:00:00 Description: Directory traversal vulnerability in index.php in Ricardo Amaral nzFotolog 0.4.1 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action_file parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://securityreason.com/securityalert/4086 - https://exchange.xforce.ibmcloud.com/vulnerabilities/44065 - https://www.exploit-db.com/exploits/6164 - http://www.securityfocus.com/bid/30439 - http://secunia.com/advisories/31297 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32469.
CVE ID: CVE-2021-32469 Date Updated: 2024-08-03T23:17:29.547Z Date Published: 2021-12-25T23:24:52 Description: MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. (Affected Chipsets MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915 Affected Software Versions 7.4.0.0; Out-of-bounds read). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 - https://corp.mediatek.com/product-security-bulletin/January-2022 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15838.
CVE ID: CVE-2020-15838 Date Updated: 2024-08-04T13:30:22.376Z Date Published: 2020-10-09T06:37:47 Description: The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.connectwise.com/company/trust/security-bulletins - https://dbeta.com/2020/10/05/PrivilegeEscalationInAutomateAgent No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-35630.
CVE ID: CVE-2023-35630 Date Updated: 2024-08-02T16:30:43.431Z Date Published: 2023-12-12T18:10:52.594Z Description: Internet Connection Sharing (ICS) Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35630 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5475.
CVE ID: CVE-2012-5475 Date Updated: 2024-09-17T02:01:15.784Z Date Published: 2012-11-16T11:00:00Z Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22133.
CVE ID: CVE-2021-22133 Date Updated: 2024-08-03T18:30:24.014Z Date Published: 2021-02-10T18:55:15 Description: The Elastic APM agent for Go versions before 1.11.0 can leak sensitive HTTP header information when logging the details during an application panic. Normally, the APM agent will sanitize sensitive HTTP header details before sending the information to the APM server. During an application panic it is possible the headers will not be sanitized before being sent. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://discuss.elastic.co/t/elastic-apm-agent-for-go-1-11-0-security-update/263252 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-45384.
CVE ID: CVE-2024-45384 Date Updated: 2024-09-18T15:07:08.592Z Date Published: 2024-09-17T18:36:00.411Z Description: Padding Oracle vulnerability in Apache Druid extension, druid-pac4j. This could allow an attacker to manipulate a pac4j session cookie. This issue affects Apache Druid versions 0.18.0 through 30.0.0. Since the druid-pac4j extension is optional and disabled by default, Druid installations not using the druid-pac4j extension are not affected by this vulnerability. While we are not aware of a way to meaningfully exploit this flaw, we nevertheless recommend upgrading to version 30.0.1 or higher which fixes the issue and ensuring you have a strong druid.auth.pac4j.cookiePassphrase as a precaution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/gr94fnp574plb50lsp8jw4smvgv1lbz1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4938.
CVE ID: CVE-2018-4938 Date Updated: 2024-08-05T05:18:27.045Z Date Published: 2018-05-19T17:00:00 Description: Adobe ColdFusion Update 5 and earlier versions, ColdFusion 11 Update 13 and earlier versions have an exploitable Insecure Library Loading vulnerability. Successful exploitation could lead to local privilege escalation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/coldfusion/apsb18-14.html - http://www.securityfocus.com/bid/103718 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21348.
CVE ID: CVE-2021-21348 Date Updated: 2024-08-03T18:09:15.691Z Date Published: 2021-03-22T23:45:29 Description: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://x-stream.github.io/security.html#workaround - http://x-stream.github.io/changes.html#1.4.16 - https://github.com/x-stream/xstream/security/advisories/GHSA-56p8-3fh9-4cvq - https://x-stream.github.io/CVE-2021-21348.html - https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html - https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0%40%3Cdev.jmeter.apache.org%3E - https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd%40%3Cusers.activemq.apache.org%3E - https://security.netapp.com/advisory/ntap-20210430-0002/ - https://www.oracle.com//security-alerts/cpujul2021.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/ - https://www.oracle.com/security-alerts/cpuoct2021.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/ - https://www.debian.org/security/2021/dsa-5004 - https://www.oracle.com/security-alerts/cpujan2022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-37100.
CVE ID: CVE-2021-37100 Date Updated: 2024-08-04T01:09:07.737Z Date Published: 2021-12-07T16:06:39 Description: There is a Improper Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to account authentication bypassed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39669.
CVE ID: CVE-2023-39669 Date Updated: 2024-08-02T18:18:09.808Z Date Published: 2023-08-18T00:00:00 Description: D-Link DIR-880 A1_FW107WWb08 was discovered to contain a NULL pointer dereference in the function FUN_00010824. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dlink.com/en/security-bulletin/ - https://support.dlink.com/ - https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/880%20unchecked%20return%20value.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3043.
CVE ID: CVE-2024-3043 Date Updated: 2024-08-01T19:32:42.579Z Date Published: 2024-06-27T18:17:15.392Z Description: An unauthenticated IEEE 802.15.4 'co-ordinator realignment' packet can be used to force Zigbee nodes to change their network identifier (pan ID), leading to a denial of service. This packet type is not useful in production and should be used only for PHY qualification. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/SiliconLabs/gecko_sdk - https://community.silabs.com/069Vm000005UCH0IAO No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3506.
CVE ID: CVE-2016-3506 Date Updated: 2024-08-05T23:56:14.152Z Date Published: 2016-07-21T10:00:00 Description: Unspecified vulnerability in the JDBC component in Oracle Database Server 11.2.0.4, 12.1.0.1, and 12.1.0.2; the Oracle Retail Xstore Point of Service 5.5, 6.0, 6.5, 7.0, 7.1, 15.0, and 16.0; the Oracle Retail Warehouse Management System 14.04, 14.1.3, and 15.0.1; the Oracle Retail Workforce Management 1.60.7, and 1.64.0; the Oracle Retail Clearance Optimization Engine 13.4; the Oracle Retail Markdown Optimization 13.4 and 14.0; and Oracle Retail Merchandising System 16.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - http://www.securitytracker.com/id/1036363 - http://www.securityfocus.com/bid/91787 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html - http://www.securityfocus.com/bid/91867 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4914.
CVE ID: CVE-2010-4914 Date Updated: 2024-08-07T04:02:30.459Z Date Published: 2011-10-08T10:00:00 Description: PHP remote file inclusion vulnerability in tools/phpmailer/class.phpmailer.php in PHP Classifieds 7.3 allows remote attackers to execute arbitrary PHP code via a URL in the lang_path parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/14893 - https://exchange.xforce.ibmcloud.com/vulnerabilities/61603 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0668.
CVE ID: CVE-2009-0668 Date Updated: 2024-08-07T04:40:05.110Z Date Published: 2009-08-07T19:00:00 Description: Unspecified vulnerability in Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to execute arbitrary Python code via vectors involving the ZEO network protocol. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2009/2217 - http://secunia.com/advisories/36204 - https://exchange.xforce.ibmcloud.com/vulnerabilities/52377 - http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2 - http://secunia.com/advisories/36205 - http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html - http://osvdb.org/56827 - http://www.securityfocus.com/bid/35987 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8980.
CVE ID: CVE-2019-8980 Date Updated: 2024-08-04T21:31:37.556Z Date Published: 2019-02-21T05:00:00 Description: A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1935705.html - http://www.securityfocus.com/bid/107120 - https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1935698.html - https://usn.ubuntu.com/3930-1/ - https://usn.ubuntu.com/3931-1/ - https://usn.ubuntu.com/3931-2/ - https://usn.ubuntu.com/3930-2/ - http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html - https://support.f5.com/csp/article/K56480726 - https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34381.
CVE ID: CVE-2022-34381 Date Updated: 2024-08-03T09:07:16.247Z Date Published: 2024-02-02T15:30:23.697Z Description: Dell BSAFE SSL-J version 7.0 and all versions prior to 6.5, and Dell BSAFE Crypto-J versions prior to 6.2.6.1 contain an unmaintained third-party component vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to the compromise of the impacted system. This is a Critical vulnerability and Dell recommends customers to upgrade at the earliest opportunity. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000203278/dsa-2022-208-dell-bsafe-ssl-j-6-5-and-7-1-and-dell-bsafe-crypto-j-6-2-6-1-and-7-0-security-vulnerability No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28316.
CVE ID: CVE-2022-28316 Date Updated: 2024-08-03T05:48:38.031Z Date Published: 2023-03-29T00:00:00 Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. Crafted data in an IFC file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16368. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0006 - https://www.zerodayinitiative.com/advisories/ZDI-22-607/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33660.
CVE ID: CVE-2022-33660 Date Updated: 2024-09-10T16:06:28.059Z Date Published: 2022-07-12T22:38:20 Description: Azure Site Recovery Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33660 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6755.
CVE ID: CVE-2015-6755 Date Updated: 2024-08-06T07:29:24.775Z Date Published: 2015-10-15T10:00:00 Description: The ContainerNode::parserInsertBefore function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 46.0.2490.71, proceeds with a DOM tree insertion in certain cases where a parent node no longer contains a child node, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://googlechromereleases.blogspot.com/2015/10/stable-channel-update.html - http://www.securityfocus.com/bid/77071 - http://www.debian.org/security/2015/dsa-3376 - https://code.google.com/p/chromium/issues/detail?id=519558 - https://security.gentoo.org/glsa/201603-09 - http://www.securitytracker.com/id/1033816 - http://www.ubuntu.com/usn/USN-2770-1 - http://rhn.redhat.com/errata/RHSA-2015-1912.html - http://www.ubuntu.com/usn/USN-2770-2 - https://src.chromium.org/viewvc/blink?revision=200690&view=revision No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10271.
CVE ID: CVE-2019-10271 Date Updated: 2024-08-04T22:17:19.688Z Date Published: 2019-06-24T18:11:59 Description: An issue was discovered in the Ultimate Member plugin 2.39 for WordPress. It allows unauthorized profile and cover picture modification. It is possible to modify the profile and cover picture of any user once one is connected. One can also modify the profiles and cover pictures of privileged users. To perform such a modification, one first needs to (for example) intercept an upload-picture request and modify the user_id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cxsecurity.com/issue/WLB-2019060120 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1397.
CVE ID: CVE-2011-1397 Date Updated: 2024-08-06T22:28:40.297Z Date Published: 2012-03-13T01:00:00 Description: Cross-site request forgery (CSRF) vulnerability in the Labor Reporting page in IBM Maximo Asset Management and Asset Management Essentials 6.2, 7.1, and 7.5; IBM Tivoli Asset Management for IT 6.2, 7.1, and 7.2; IBM Tivoli Service Request Manager 7.1 and 7.2; IBM Maximo Service Desk 6.2; and IBM Tivoli Change and Configuration Management Database (CCMDB) 6.2, 7.1, and 7.2 allows remote attackers to hijack the authentication of arbitrary users. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/72000 - http://www.ibm.com/support/docview.wss?uid=swg21584666 - http://secunia.com/advisories/48299 - http://secunia.com/advisories/48305 - http://www.securityfocus.com/bid/52333 - http://www-01.ibm.com/support/docview.wss?uid=swg1IV09193 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1732.
CVE ID: CVE-2015-1732 Date Updated: 2024-08-06T04:54:15.993Z Date Published: 2015-06-10T01:00:00 Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1742, CVE-2015-1747, CVE-2015-1750, and CVE-2015-1753. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-056 - http://www.securitytracker.com/id/1032521 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10300.
CVE ID: CVE-2018-10300 Date Updated: 2024-08-05T07:39:06.251Z Date Published: 2018-04-23T18:00:00 Description: Cross-site scripting (XSS) vulnerability in the Web-Dorado Instagram Feed WD plugin before 1.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML by passing payloads in an Instagram profile's bio. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://medium.com/%40squeal/wd-instagram-feed-1-3-0-xss-vulnerabilities-cve-2018-10300-and-cve-2018-10301-7173ffc4c271 - https://wpvulndb.com/vulnerabilities/9393 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6637.
CVE ID: CVE-2012-6637 Date Updated: 2024-08-06T21:36:01.959Z Date Published: 2014-03-03T02:00:00 Description: Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier do not anchor the end of domain-name regular expressions, which allows remote attackers to bypass a whitelist protection mechanism via a domain name that contains an acceptable name as an initial substring. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf - http://www.internetsociety.org/ndss2014/programme#session3 - http://seclists.org/bugtraq/2014/Jan/96 - http://labs.mwrinfosecurity.com/blog/2012/04/30/building-android-javajavascript-bridges/ - http://openwall.com/lists/oss-security/2014/02/07/9 - http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36833.
CVE ID: CVE-2022-36833 Date Updated: 2024-08-03T10:14:28.496Z Date Published: 2022-08-05T15:20:19 Description: Improper Privilege Management vulnerability in Game Optimizing Service prior to versions 3.3.04.0 in Android 10, and 3.5.04.8 in Android 11 and above allows local attacker to execute hidden function for developer by changing package name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=08 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-51586.
CVE ID: CVE-2023-51586 Date Updated: 2024-08-02T22:40:33.768Z Date Published: 2024-05-03T02:15:17.119Z Description: Voltronic Power ViewPower Pro selectEventConfig SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists within the selectEventConfig method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-22072. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-1891/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6586.
CVE ID: CVE-2015-6586 Date Updated: 2024-08-06T07:22:22.243Z Date Published: 2017-05-23T03:56:00 Description: The mDNS module in Huawei WLAN AC6005, AC6605, and ACU2 devices with software before V200R006C00SPC100 allows remote attackers to obtain sensitive information by leveraging failure to restrict processing of mDNS unicast queries to the link local network. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-453516.htm - http://www.securityfocus.com/bid/76684 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-45965.
CVE ID: CVE-2024-45965 Date Updated: 2024-10-02T20:30:17.783Z Date Published: 2024-10-02T00:00:00 Description: Contao 5.4.1 allows an authenticated admin account to upload a SVG file containing malicious javascript code into the target system. If the file is accessed through the website, it could lead to a Cross-Site Scripting (XSS) attack or execute arbitrary code via a crafted javascript to the target. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://grimthereaperteam.medium.com/contao-5-4-1-malicious-file-upload-xss-in-svg-30edb8820ecb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20940.
CVE ID: CVE-2018-20940 Date Updated: 2024-08-05T12:19:27.107Z Date Published: 2019-08-01T16:09:11 Description: cPanel before 68.0.27 allows attackers to read root's crontab file during a short time interval upon the enabling of backups (SEC-342). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://documentation.cpanel.net/display/CL/68+Change+Log No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35121.
CVE ID: CVE-2022-35121 Date Updated: 2024-08-03T09:29:17.357Z Date Published: 2022-08-17T19:43:42 Description: Novel-Plus v3.6.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /service/impl/BookServiceImpl.java. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/201206030/novel-plus/issues/92 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-29081.
CVE ID: CVE-2022-29081 Date Updated: 2024-08-03T06:10:59.435Z Date Published: 2022-04-28T19:16:57 Description: Zoho ManageEngine Access Manager Plus before 4302, Password Manager Pro before 12007, and PAM360 before 5401 are vulnerable to access-control bypass on a few Rest API URLs (for SSOutAction. SSLAction. LicenseMgr. GetProductDetails. GetDashboard. FetchEvents. and Synchronize) via the ../RestAPI substring. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2022-14 - https://www.manageengine.com/privileged-session-management/advisory/cve-2022-29081.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4771.
CVE ID: CVE-2011-4771 Date Updated: 2024-09-16T23:06:42.219Z Date Published: 2012-01-25T02:00:00Z Description: The Scan to PDF Free (com.scan.to.pdf.trial) application 2.0.4 for Android does not properly protect data, which allows remote attackers to read or modify scanned files and a Google account via a crafted application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2011-4771-vulnerability-in-ScanToPDF.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12762.
CVE ID: CVE-2019-12762 Date Updated: 2024-08-04T23:32:54.710Z Date Published: 2019-06-06T19:45:22 Description: Xiaomi Mi 5s Plus devices allow attackers to trigger touchscreen anomalies via a radio signal between 198 kHz and 203 kHz, as demonstrated by a transmitter and antenna hidden just beneath the surface of a coffee-shop table, aka Ghost Touch. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://medium.com/%40juliodellaflora/ghost-touch-on-xiaomi-mi5s-plus-707998308607 - https://hackercombat.com/nfc-vulnerability-may-promote-ghost-screen-taps/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29357.
CVE ID: CVE-2021-29357 Date Updated: 2024-08-03T22:02:51.654Z Date Published: 2021-04-12T18:59:08 Description: The ECT Provider component in OutSystems Platform Server 10 before 10.0.1104.0 and 11 before 11.9.0 (and LifeTime management console before 11.7.0) allows SSRF for arbitrary outbound HTTP requests. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://success.outsystems.com/Support/Security/Vulnerabilities/Vulnerability_RTAF-2226 - https://labs.integrity.pt/advisories/cve-2021-29357/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3008.
CVE ID: CVE-2008-3008 Date Updated: 2024-08-07T09:21:34.933Z Date Published: 2008-09-10T15:00:00 Description: Stack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka "Windows Media Encoder Buffer Overrun Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/996227 - http://marc.info/?l=bugtraq&m=122235754013992&w=2 - http://www.securitytracker.com/id?1020832 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6018 - http://www.securityfocus.com/bid/31065 - http://marc.info/?l=bugtraq&m=122235754013992&w=2 - https://www.exploit-db.com/exploits/6454 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-053 - http://www.us-cert.gov/cas/techalerts/TA08-253A.html - http://www.vupen.com/english/advisories/2008/2521 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-45206.
CVE ID: CVE-2022-45206 Date Updated: 2024-08-03T14:09:56.543Z Date Published: 2022-11-25T00:00:00 Description: Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/duplicate/check. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://jeecg-boot.com - https://github.com/jeecgboot/jeecg-boot/issues/4129 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11933.
CVE ID: CVE-2019-11933 Date Updated: 2024-08-04T23:10:29.463Z Date Published: 2019-10-23T15:40:10 Description: A heap buffer overflow bug in libpl_droidsonroids_gif before 1.2.19, as used in WhatsApp for Android before version 2.19.291 could allow remote attackers to execute arbitrary code or cause a denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.facebook.com/security/advisories/cve-2019-11933 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4661.
CVE ID: CVE-2018-4661 Date Updated: 2023-09-14T18:42:44.328Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41294.
CVE ID: CVE-2022-41294 Date Updated: 2024-09-16T16:13:48.144Z Date Published: 2022-10-06T17:15:28.532533Z Description: IBM Robotic Process Automation 21.0.0, 21.0.1, 21.0.2, 21.0.3, and 21.0.4 is vulnerable to cross origin resource sharing using the bot api. IBM X-Force ID: 236807. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6825985 - https://exchange.xforce.ibmcloud.com/vulnerabilities/236807 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42203.
CVE ID: CVE-2021-42203 Date Updated: 2024-08-04T03:30:37.404Z Date Published: 2022-05-31T18:49:21 Description: An issue was discovered in swftools through 20201222. A heap-use-after-free exists in the function swf_FontExtract_DefineTextCallback() located in swftext.c. It allows an attacker to cause code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/matthiaskramm/swftools/issues/176 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4294.
CVE ID: CVE-2022-4294 Date Updated: 2024-08-03T01:34:50.109Z Date Published: 2023-01-10T09:14:47.102Z Description: Norton, Avira, Avast and AVG Antivirus for Windows may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.norton.com/sp/static/external/tools/security-advisories.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6136.
CVE ID: CVE-2015-6136 Date Updated: 2024-08-06T07:15:13.293Z Date Published: 2015-12-09T11:00:00 Description: The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to execute arbitrary code via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.zerodayinitiative.com/advisories/ZDI-15-595 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-126 - http://www.securitytracker.com/id/1034315 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-124 - http://www.zerodayinitiative.com/advisories/ZDI-15-594 - http://www.zerodayinitiative.com/advisories/ZDI-15-592 - http://www.zerodayinitiative.com/advisories/ZDI-15-593 - http://www.zerodayinitiative.com/advisories/ZDI-15-597 - http://www.securitytracker.com/id/1034317 - http://www.zerodayinitiative.com/advisories/ZDI-15-591 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2347.
CVE ID: CVE-2024-2347 Date Updated: 2024-08-01T19:11:53.309Z Date Published: 2024-04-09T18:59:31.932Z Description: The Astra theme for WordPress is vulnerable to Stored Cross-Site Scripting via a user's display name in all versions up to, and including, 4.6.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/ed914e67-4cf7-49b1-96be-ed8c604e6dce?source=cve - https://themes.trac.wordpress.org/changeset/221725/astra No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5145.
CVE ID: CVE-2024-5145 Date Updated: 2024-08-01T21:03:11.046Z Date Published: 2024-05-20T22:31:04.320Z Description: A vulnerability was found in SourceCodester Vehicle Management System up to 1.0 and classified as critical. This issue affects some unknown processing of the file /newdriver.php of the component HTTP POST Request Handler. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265289 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.265289 - https://vuldb.com/?ctiid.265289 - https://vuldb.com/?submit.339721 - https://github.com/CveSecLook/cve/issues/38 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38934.
CVE ID: CVE-2021-38934 Date Updated: 2024-09-16T23:51:47.129Z Date Published: 2022-08-29T21:10:09.490561Z Description: IBM Engineering Test Management 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 210671. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6615619 - https://exchange.xforce.ibmcloud.com/vulnerabilities/210671 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3513.
CVE ID: CVE-2016-3513 Date Updated: 2024-08-05T23:56:14.405Z Date Published: 2016-07-21T10:00:00 Description: Unspecified vulnerability in the Oracle Communications Operations Monitor component in Oracle Communications Applications before 3.3.92.0.0 allows remote authenticated users to affect confidentiality via vectors related to Infrastructure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - http://www.securitytracker.com/id/1036401 - http://www.synacktiv.com/ressources/oracle_sbc_configuration_issues.pdf - http://www.securityfocus.com/bid/91787 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22349.
CVE ID: CVE-2022-22349 Date Updated: 2024-09-16T22:15:14.368Z Date Published: 2022-02-24T17:10:14.818932Z Description: IBM Sterling External Authentication Server 3.4.3.2, 6.0.2.0, and 6.0.3.0 is vulnerable to path traversals, due to not properly validating RESTAPI configuration data. An authorized user could import invalid data which could be used for an attack. IBM X-Force ID: 220144. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6558928 - https://exchange.xforce.ibmcloud.com/vulnerabilities/220144 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1010149.
CVE ID: CVE-2019-1010149 Date Updated: 2024-08-05T03:07:18.227Z Date Published: 2019-07-23T13:07:45 Description: zzcms version 8.3 and earlier is affected by: File Delete to Code Execution. The impact is: zzcms File Delete to Code Execution. The component is: user/licence_save.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/Lz1y/e82eb9cc776e629b9d1874dc689421eb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28877.
CVE ID: CVE-2024-28877 Date Updated: 2024-08-02T00:56:58.121Z Date Published: 2024-06-11T20:15:14.566Z Description: MicroDicom DICOM Viewer is vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code on affected installations of DICOM Viewer. User interaction is required to exploit this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-163-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8990.
CVE ID: CVE-2018-8990 Date Updated: 2024-08-05T07:10:47.297Z Date Published: 2018-03-25T03:00:00 Description: In Windows Master (aka Windows Optimization Master) 7.99.13.604, the driver file (WoptiHWDetect.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0xf1002010. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/D0neMkj/POC_BSOD/tree/master/Windows%20Optimization%20master/0xf1002010 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6969.
CVE ID: CVE-2019-6969 Date Updated: 2024-08-04T20:31:04.395Z Date Published: 2019-08-02T20:53:05 Description: The web interface of the D-Link DVA-5592 20180823 is vulnerable to an authentication bypass that allows an unauthenticated user to have access to sensitive information such as the Wi-Fi password and the phone number (if VoIP is in use). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://rhaidiz.net/2019/02/27/dribble-router-vulns-dlink-alcatel-cve-2019-6969-cve-2019-6968-cve-2019-7163/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13658.
CVE ID: CVE-2020-13658 Date Updated: 2024-08-04T12:25:16.272Z Date Published: 2020-09-29T18:52:41 Description: In Lansweeper 8.0.130.17, the web console is vulnerable to a CSRF attack that would allow a low-level Lansweeper user to elevate their privileges within the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.nccgroup.com/us/our-research/?research=Technical+advisories - https://research.nccgroup.com/2020/09/25/technical-advisory-lansweeper-privilege-escalation-via-csrf-using-http-method-interchange/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-46701.
CVE ID: CVE-2022-46701 Date Updated: 2024-08-03T14:39:38.710Z Date Published: 2022-12-15T00:00:00 Description: The issue was addressed with improved bounds checks. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, tvOS 16.2. Connecting to a malicious NFS server may lead to arbitrary code execution with kernel privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213535 - https://support.apple.com/en-us/HT213532 - https://support.apple.com/en-us/HT213530 - http://seclists.org/fulldisclosure/2022/Dec/20 - http://seclists.org/fulldisclosure/2022/Dec/23 - http://seclists.org/fulldisclosure/2022/Dec/26 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3358.
CVE ID: CVE-2008-3358 Date Updated: 2024-08-07T09:37:26.604Z Date Published: 2009-01-28T18:00:00 Description: Cross-site scripting (XSS) vulnerability in Web Dynpro (WD) in the SAP NetWeaver portal, when Internet Explorer 7.0.5730 is used, allows remote attackers to inject arbitrary web script or HTML via a crafted URI, which causes the XSS payload to be reflected in a text/plain document. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://service.sap.com/sap/support/notes/1235253 - http://secunia.com/advisories/33685 - http://www.securityfocus.com/archive/1/500415/100/0/threaded - http://www.vupen.com/english/advisories/2009/0255 - http://osvdb.org/51627 - http://www.securitytracker.com/id?1021638 - https://exchange.xforce.ibmcloud.com/vulnerabilities/48237 - http://www.securityfocus.com/bid/33465 - http://www.csnc.ch/misc/files/advisories/CVE-2008-3358.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-45005.
CVE ID: CVE-2024-45005 Date Updated: 2024-09-15T17:56:51.502Z Date Published: 2024-09-04T19:54:47.694Z Description: In the Linux kernel, the following vulnerability has been resolved: KVM: s390: fix validity interception issue when gisa is switched off We might run into a SIE validity if gisa has been disabled either via using kernel parameter "kvm.use_gisa=0" or by setting the related sysfs attribute to N (echo N >/sys/module/kvm/parameters/use_gisa). The validity is caused by an invalid value in the SIE control block's gisa designation. That happens because we pass the uninitialized gisa origin to virt_to_phys() before writing it to the gisa designation. To fix this we return 0 in kvm_s390_get_gisa_desc() if the origin is 0. kvm_s390_get_gisa_desc() is used to determine which gisa designation to set in the SIE control block. A value of 0 in the gisa designation disables gisa usage. The issue surfaces in the host kernel with the following kernel message as soon a new kvm guest start is attemted. kvm: unhandled validity intercept 0x1011 WARNING: CPU: 0 PID: 781237 at arch/s390/kvm/intercept.c:101 kvm_handle_sie_intercept+0x42e/0x4d0 [kvm] Modules linked in: vhost_net tap tun xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT xt_tcpudp nft_compat x_tables nf_nat_tftp nf_conntrack_tftp vfio_pci_core irqbypass vhost_vsock vmw_vsock_virtio_transport_common vsock vhost vhost_iotlb kvm nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables sunrpc mlx5_ib ib_uverbs ib_core mlx5_core uvdevice s390_trng eadm_sch vfio_ccw zcrypt_cex4 mdev vfio_iommu_type1 vfio sch_fq_codel drm i2c_core loop drm_panel_orientation_quirks configfs nfnetlink lcs ctcm fsm dm_service_time ghash_s390 prng chacha_s390 libchacha aes_s390 des_s390 libdes sha3_512_s390 sha3_256_s390 sha512_s390 sha256_s390 sha1_s390 sha_common dm_mirror dm_region_hash dm_log zfcp scsi_transport_fc scsi_dh_rdac scsi_dh_emc scsi_dh_alua pkey zcrypt dm_multipath rng_core autofs4 [last unloaded: vfio_pci] CPU: 0 PID: 781237 Comm: CPU 0/KVM Not tainted 6.10.0-08682-gcad9f11498ea #6 Hardware name: IBM 3931 A01 701 (LPAR) Krnl PSW : 0704c00180000000 000003d93deb0122 (kvm_handle_sie_intercept+0x432/0x4d0 [kvm]) R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3 Krnl GPRS: 000003d900000027 000003d900000023 0000000000000028 000002cd00000000 000002d063a00900 00000359c6daf708 00000000000bebb5 0000000000001eff 000002cfd82e9000 000002cfd80bc000 0000000000001011 000003d93deda412 000003ff8962df98 000003d93de77ce0 000003d93deb011e 00000359c6daf960 Krnl Code: 000003d93deb0112: c020fffe7259 larl %r2,000003d93de7e5c4 000003d93deb0118: c0e53fa8beac brasl %r14,000003d9bd3c7e70 #000003d93deb011e: af000000 mc 0,0 >000003d93deb0122: a728ffea lhi %r2,-22 000003d93deb0126: a7f4fe24 brc 15,000003d93deafd6e 000003d93deb012a: 9101f0b0 tm 176(%r15),1 000003d93deb012e: a774fe48 brc 7,000003d93deafdbe 000003d93deb0132: 40a0f0ae sth %r10,174(%r15) Call Trace: [<000003d93deb0122>] kvm_handle_sie_intercept+0x432/0x4d0 [kvm] ([<000003d93deb011e>] kvm_handle_sie_intercept+0x42e/0x4d0 [kvm]) [<000003d93deacc10>] vcpu_post_run+0x1d0/0x3b0 [kvm] [<000003d93deaceda>] __vcpu_run+0xea/0x2d0 [kvm] [<000003d93dead9da>] kvm_arch_vcpu_ioctl_run+0x16a/0x430 [kvm] [<000003d93de93ee0>] kvm_vcpu_ioctl+0x190/0x7c0 [kvm] [<000003d9bd728b4e>] vfs_ioctl+0x2e/0x70 [<000003d9bd72a092>] __s390x_sys_ioctl+0xc2/0xd0 [<000003d9be0e9222>] __do_syscall+0x1f2/0x2e0 [<000003d9be0f9a90>] system_call+0x70/0x98 Last Breaking-Event-Address: [<000003d9bd3c7f58>] __warn_printk+0xe8/0xf0 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/051c0a558154174cfcea301a386e4c91ade83ce1 - https://git.kernel.org/stable/c/027ac3c5092561bccce09b314a73a1c167117ef6 - https://git.kernel.org/stable/c/5a44bb061d04b0306f2aa8add761d86d152b9377 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1805.
CVE ID: CVE-2022-1805 Date Updated: 2024-08-03T00:16:59.963Z Date Published: 2022-07-28T14:21:09 Description: When connecting to Amazon Workspaces, the SHA256 presented by AWS connection provisioner is not fully verified by Zero Clients. The issue could be exploited by an adversary that places a MITM (Man in the Middle) between a zero client and AWS session provisioner in the network. This issue is only applicable when connecting to an Amazon Workspace from a PCoIP Zero Client. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hp.com/us-en/document/ish_6545906-6545930-16/hpsbhf03794 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-42236.
CVE ID: CVE-2022-42236 Date Updated: 2024-08-03T13:03:45.507Z Date Published: 2022-10-11T00:00:00 Description: A Stored XSS issue in Merchandise Online Store v.1.0 allows to injection of Arbitrary JavaScript in edit account form. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/draco1725/vloggers/blob/main/poc No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-47366.
CVE ID: CVE-2023-47366 Date Updated: 2024-09-03T19:02:17.693Z Date Published: 2023-11-09T00:00:00 Description: The leakage of channel access token in craft_members Line 13.6.1 allows remote attackers to send malicious notifications to victims. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/syz913/CVE-reports/blob/main/craft_members.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3685.
CVE ID: CVE-2008-3685 Date Updated: 2024-09-16T18:09:01.902Z Date Published: 2009-10-22T15:26:00Z Description: Directory traversal vulnerability in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to upload arbitrary files, and execute arbitrary code, via directory traversal sequences in requests to TCP port 2606. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.zerodayinitiative.com/advisories/ZDI-08-095/ - http://secunia.com/advisories/37070 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14336.
CVE ID: CVE-2018-14336 Date Updated: 2024-08-05T09:21:41.554Z Date Published: 2018-07-19T20:00:00 Description: TP-Link WR840N devices allow remote attackers to cause a denial of service (connectivity loss) via a series of packets with random MAC addresses. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackingvila.wordpress.com/2018/07/17/cve-2018-14336-tp-link-wireless-n-router-wr840n-vulnerability/ - https://www.exploit-db.com/exploits/45064/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39905.
CVE ID: CVE-2024-39905 Date Updated: 2024-08-02T04:33:11.321Z Date Published: 2024-07-11T15:43:34.437Z Description: Red is a fully modular Discord bot. Due to a bug in Red's Core API, 3rd-party cogs using the `@commands.can_manage_channel()` command permission check without additional permission controls may authorize a user to run a command even when that user doesn't have permissions to manage a channel. None of the core commands or core cogs are affected. The maintainers of the project are not aware of any _public_ 3rd-party cog utilizing this API at the time of writing this advisory. The problem was patched and released in version 3.5.10. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-5jq8-q6rj-9gq4 - https://github.com/Cog-Creators/Red-DiscordBot/pull/6398 - https://github.com/Cog-Creators/Red-DiscordBot/commit/0b0b23b9717b40ed4f8715720b199417c8e89750 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1151.
CVE ID: CVE-2010-1151 Date Updated: 2024-08-07T01:14:06.289Z Date Published: 2010-04-20T16:00:00 Description: Race condition in the mod_auth_shadow module for the Apache HTTP Server allows remote attackers to bypass authentication, and read and possibly modify data, via vectors related to improper interaction with an external helper application for validation of credentials. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2010/0908 - http://www.securityfocus.com/bid/39538 - http://www.mandriva.com/security/advisories?name=MDVSA-2010:081 - http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041340.html - http://secunia.com/advisories/39823 - http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041326.html - https://bugzilla.redhat.com/show_bug.cgi?id=578168 - http://www.vupen.com/english/advisories/2010/1148 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4650.
CVE ID: CVE-2010-4650 Date Updated: 2024-08-07T03:51:17.964Z Date Published: 2012-06-21T23:00:00Z Description: Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2011/01/06/18 - http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 - https://github.com/torvalds/linux/commit/7572777eef78ebdee1ecb7c258c0ef94d35bad16 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7572777eef78ebdee1ecb7c258c0ef94d35bad16 - https://bugzilla.redhat.com/show_bug.cgi?id=667892 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8933.
CVE ID: CVE-2014-8933 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38221.
CVE ID: CVE-2024-38221 Date Updated: 2024-09-19T20:53:59.796Z Date Published: 2024-09-19T20:43:04.384Z Description: Microsoft Edge (Chromium-based) Spoofing Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38221 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5112.
CVE ID: CVE-2015-5112 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20745.
CVE ID: CVE-2018-20745 Date Updated: 2024-09-17T00:56:20.560Z Date Published: 2019-01-28T08:00:00Z Description: Yii 2.x through 2.0.15.1 actively converts a wildcard CORS policy into reflecting an arbitrary Origin header value, which is incompatible with the CORS security design, and could lead to CORS misconfiguration security problems. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-chen.pdf - https://github.com/yiisoft/yii2/issues/16193 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2124.
CVE ID: CVE-2017-2124 Date Updated: 2024-08-05T13:39:32.332Z Date Published: 2017-04-28T16:00:00 Description: Cross-site scripting vulnerability in OneThird CMS v1.73 Heaven's Door and earlier allows remote attackers to inject arbitrary web script or HTML via contact.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://onethird.net/en/p1277.html - http://www.securityfocus.com/bid/98604 - http://jvn.jp/en/jp/JVN13003724/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34477.
CVE ID: CVE-2023-34477 Date Updated: 2024-08-04T08:42:44.473Z Date Published: 2023-08-07T16:50:55.613Z Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability allows SQL Injection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://extensions.joomla.org/extension/online-virtual-classroom/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6768.
CVE ID: CVE-2016-6768 Date Updated: 2024-08-06T01:43:38.167Z Date Published: 2017-01-12T15:00:00 Description: A remote code execution vulnerability in the Framesequence library could enable an attacker using a specially crafted file to execute arbitrary code in the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses the Framesequence library. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. Android ID: A-31631842. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2016-12-01.html - http://www.securityfocus.com/bid/94704 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-20121.
CVE ID: CVE-2017-20121 Date Updated: 2024-08-05T21:45:25.993Z Date Published: 2022-06-30T05:05:20 Description: A vulnerability was found in Teradici Management Console 2.2.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Database Management. The manipulation leads to improper privilege management. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2017/Feb/62 - https://vuldb.com/?id.97279 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-36398.
CVE ID: CVE-2021-36398 Date Updated: 2024-08-04T00:54:51.547Z Date Published: 2023-03-06T00:00:00 Description: In moodle, ID numbers displayed in the web service token list required additional sanitizing to prevent a stored XSS risk. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://moodle.org/mod/forum/discuss.php?d=424804 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29075.
CVE ID: CVE-2021-29075 Date Updated: 2024-08-03T21:55:12.479Z Date Published: 2021-03-23T06:59:31 Description: Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects RBW30 before 2.6.2.2, RBK852 before 3.2.17.12, RBK852 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, RBK753 before 3.2.17.12, RBK753S before 3.2.17.12, RBK754 before 3.2.17.12, RBR750 before 3.2.17.12, and RBS750 before 3.2.17.12. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000063010/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-WiFi-Systems-PSV-2020-0466 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-18780.
CVE ID: CVE-2020-18780 Date Updated: 2024-08-04T14:08:30.528Z Date Published: 2023-08-22T00:00:00 Description: A Use After Free vulnerability in function new_Token in asm/preproc.c in nasm 2.14.02 allows attackers to cause a denial of service via crafted nasm command. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.nasm.us/show_bug.cgi?id=3392634 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-12587.
CVE ID: CVE-2017-12587 Date Updated: 2024-08-05T18:43:56.087Z Date Published: 2017-08-06T14:00:00 Description: ImageMagick 7.0.6-1 has a large loop vulnerability in the ReadPWPImage function in coders\pwp.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ImageMagick/ImageMagick/issues/535 - https://usn.ubuntu.com/3681-1/ - https://www.debian.org/security/2017/dsa-4019 - https://lists.debian.org/debian-lts-announce/2019/05/msg00015.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3465.
CVE ID: CVE-2023-3465 Date Updated: 2024-08-02T06:55:03.573Z Date Published: 2023-06-29T21:00:04.953Z Description: A vulnerability was found in SimplePHPscripts Classified Ads Script 1.8. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file user.php of the component HTTP POST Request Handler. The manipulation of the argument title leads to cross site scripting. The attack can be launched remotely. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-232711. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.232711 - https://vuldb.com/?ctiid.232711 - https://simplephpscripts.com/guestbook-script-php/guestbook/preview.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-46788.
CVE ID: CVE-2022-46788 Date Updated: 2023-05-12T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4089.
CVE ID: CVE-2014-4089 Date Updated: 2024-08-06T11:04:28.332Z Date Published: 2014-09-10T01:00:00 Description: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4080, CVE-2014-4091, and CVE-2014-4102. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/69596 - https://exchange.xforce.ibmcloud.com/vulnerabilities/95519 - http://www.securitytracker.com/id/1030818 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-052 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36119.
CVE ID: CVE-2022-36119 Date Updated: 2024-08-03T09:52:00.576Z Date Published: 2022-08-25T23:00:13 Description: An issue was discovered in Blue Prism Enterprise 6.0 through 7.01. In a misconfigured environment that exposes the Blue Prism Application server, it is possible for a domain authenticated user to send a crafted message to the Blue Prism Server and accomplish a remote code execution attack that is possible because of insecure deserialization. Exploitation of this vulnerability allows for code to be executed in the context of the Blue Prism Server service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blueprism.com - https://portal.blueprism.com/security-vulnerabilities-august-2022 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28119.
CVE ID: CVE-2023-28119 Date Updated: 2024-08-02T12:30:24.231Z Date Published: 2023-03-22T19:51:13.210Z Description: The crewjam/saml go library contains a partial implementation of the SAML standard in golang. Prior to version 0.4.13, the package's use of `flate.NewReader` does not limit the size of the input. The user can pass more than 1 MB of data in the HTTP request to the processing functions, which will be decompressed server-side using the Deflate algorithm. Therefore, after repeating the same request multiple times, it is possible to achieve a reliable crash since the operating system kills the process. This issue is patched in version 0.4.13. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/crewjam/saml/security/advisories/GHSA-5mqj-xc49-246p - https://github.com/crewjam/saml/commit/8e9236867d176ad6338c870a84e2039aef8a5021 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3463.
CVE ID: CVE-2012-3463 Date Updated: 2024-08-06T20:05:12.614Z Date Published: 2012-08-10T10:00:00 Description: Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_tag_helper.rb in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the prompt field to the select_tag helper. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/ - https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source&output=gplain - http://rhn.redhat.com/errata/RHSA-2013-0154.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26995.
CVE ID: CVE-2021-26995 Date Updated: 2024-08-03T20:40:46.961Z Date Published: 2021-06-11T13:12:58 Description: E-Series SANtricity OS Controller Software 11.x versions prior to 11.70.1 are susceptible to a vulnerability which when successfully exploited could allow privileged attackers to execute arbitrary code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.netapp.com/advisory/NTAP-20210610-0002 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1752.
CVE ID: CVE-2014-1752 Date Updated: 2024-08-06T09:50:11.203Z Date Published: 2014-04-08T21:00:00 Description: Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-018 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1114.
CVE ID: CVE-2024-1114 Date Updated: 2024-08-23T19:24:44.201Z Date Published: 2024-01-31T19:31:05.018Z Description: A vulnerability has been found in openBI up to 1.0.8 and classified as critical. This vulnerability affects the function dlfile of the file /application/index/controller/Screen.php. The manipulation of the argument fileUrl leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252472. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.252472 - https://vuldb.com/?ctiid.252472 - https://note.zhaoj.in/share/9wv48TygKRxo No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-13038.
CVE ID: CVE-2017-13038 Date Updated: 2024-08-05T18:58:12.414Z Date Published: 2017-09-14T06:00:00 Description: The PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:handle_mlppp(). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201709-23 - https://github.com/the-tcpdump-group/tcpdump/commit/7335163a6ef82d46ff18f3e6099a157747241629 - https://support.apple.com/HT208221 - http://www.debian.org/security/2017/dsa-3971 - http://www.securitytracker.com/id/1039307 - http://www.tcpdump.org/tcpdump-changes.txt - https://access.redhat.com/errata/RHEA-2018:0705 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23958.
CVE ID: CVE-2024-23958 Date Updated: 2024-10-03T13:48:39.497Z Date Published: 2024-09-28T06:10:32.811Z Description: Autel MaxiCharger AC Elite Business C50 BLE Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Autel MaxiCharger AC Elite Business C50 charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the BLE AppAuthenRequest command handler. The handler uses hardcoded credentials as a fallback in case of an authentication request failure. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-23196 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-24-852/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26582.
CVE ID: CVE-2021-26582 Date Updated: 2024-08-03T20:26:25.525Z Date Published: 2021-04-15T17:50:41 Description: A security vulnerability in HPE IceWall SSO Domain Gateway Option (Dgfw) module version 10.0 on RHEL 5/6/7, version 10.0 on HP-UX 11i v3, version 10.0 on Windows and 11.0 on Windows could be exploited remotely to allow cross-site scripting (XSS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn04086en_us No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-36895.
CVE ID: CVE-2023-36895 Date Updated: 2024-08-02T17:01:09.931Z Date Published: 2023-08-08T17:08:51.952Z Description: Microsoft Outlook Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36895 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0450.
CVE ID: CVE-2024-0450 Date Updated: 2024-08-02T15:00:26.971Z Date Published: 2024-03-19T15:12:07.789Z Description: An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eba - https://github.com/python/cpython/commit/fa181fcf2156f703347b03a3b1966ce47be8ab3b - https://github.com/python/cpython/commit/a956e510f6336d5ae111ba429a61c3ade30a7549 - https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85 - https://github.com/python/cpython/commit/a2c59992e9e8d35baba9695eb186ad6c6ff85c51 - https://github.com/python/cpython/commit/d05bac0b74153beb541b88b4fca33bf053990183 - https://github.com/python/cpython/issues/109858 - https://www.bamsoftware.com/hacks/zipbomb/ - https://mail.python.org/archives/list/security-announce@python.org/thread/XELNUX2L3IOHBTFU7RQHCY6OUVEWZ2FG/ - https://lists.debian.org/debian-lts-announce/2024/03/msg00024.html - https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html - http://www.openwall.com/lists/oss-security/2024/03/20/5 - https://github.com/python/cpython/commit/70497218351ba44bffc8b571201ecb5652d84675 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4698.
CVE ID: CVE-2010-4698 Date Updated: 2024-08-07T03:55:35.102Z Date Published: 2011-01-18T19:00:00 Description: Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/45338 - http://marc.info/?l=bugtraq&m=133469208622507&w=2 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11939 - http://seclists.org/fulldisclosure/2010/Dec/180 - http://www.php.net/ChangeLog-5.php - http://marc.info/?l=bugtraq&m=133469208622507&w=2 - http://bugs.php.net/53492 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-6160.
CVE ID: CVE-2018-6160 Date Updated: 2024-08-05T05:54:53.221Z Date Published: 2019-01-09T19:00:00 Description: JavaScript alert handling in Prompts in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html - https://security.gentoo.org/glsa/201808-01 - http://www.securityfocus.com/bid/104887 - https://crbug.com/839822 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-22776.
CVE ID: CVE-2024-22776 Date Updated: 2024-08-14T15:27:10.706Z Date Published: 2024-02-23T00:00:00 Description: Wallos 0.9 is vulnerable to Cross Site Scripting (XSS) in all text-based input fields without proper validation, excluding those requiring specific formats like date fields. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ellite/Wallos - https://webity-luescher.notion.site/webity-luescher/Wallos-v0-9-to-v1-2-2-CVE-2024-22776-Stored-XSS-Vulnerability-in-all-text-based-input-fields-6622fb4cfbe0430aa0b1d4b3edcb67b0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4101.
CVE ID: CVE-2013-4101 Date Updated: 2024-08-06T16:30:50.090Z Date Published: 2019-11-04T14:52:09 Description: Cryptocat before 2.0.22 Link Markup Decorator HTML Handling Weakness No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.openwall.com/lists/oss-security/2013/07/10/15 - https://tobtu.com/decryptocat.php - https://www.securityfocus.com/bid/61098 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5645.
CVE ID: CVE-2024-5645 Date Updated: 2024-08-01T21:18:06.679Z Date Published: 2024-06-07T09:33:36.853Z Description: The Envo Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘button_css_id’ parameter within the Button widget in all versions up to, and including, 1.8.23 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/dbe53b09-84c6-4fb6-9a79-1e4987678129?source=cve - https://plugins.trac.wordpress.org/browser/envo-extra/tags/1.8.22/lib/elementor/widgets/button/button.php#L676 - https://wordpress.org/plugins/envo-extra/#developers - https://plugins.trac.wordpress.org/changeset/3098500/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.