instruction
stringlengths 49
63
⌀ | input
stringlengths 0
69
| output
stringlengths 221
18.7k
|
|---|---|---|
Provide detailed information about CVE-2019-13981.
|
CVE ID: CVE-2019-13981
Date Updated: 2024-08-05T00:05:44.098Z
Date Published: 2019-07-19T14:17:58
Description:
In Directus 7 API through 2.3.0, remote attackers can read image files via a direct request for a filename under the uploads/_/originals/ directory. This is related to a configuration option in which the file collection can be non-public, but this option does not apply to the thumbnailer.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/directus/api/issues/987
- https://github.com/directus/api/issues/986
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
null |
Describe the MITRE ATT&CK technique T1189
|
The MITRE ATT&CK technique T1189: Drive-by Compromise is related to the vulnerability CVE-CVE-2018-8355. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as exploitation_technique.
|
Provide detailed information about CVE-2015-2445.
|
CVE ID: CVE-2015-2445
Date Updated: 2024-08-06T05:17:26.316Z
Date Published: 2015-08-14T10:00:00
Description:
Microsoft Internet Explorer 10 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "ASLR Bypass."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1033237
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-079
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-0743.
|
CVE ID: CVE-2023-0743
Date Updated: 2024-08-02T05:24:34.105Z
Date Published: 2023-02-08T00:00:00
Description:
Cross-site Scripting (XSS) - Generic in GitHub repository answerdev/answer prior to 1.0.4.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.dev/bounties/366cf8bb-19f6-4388-b089-d0a260efd863
- https://github.com/answerdev/answer/commit/860b1a3bd8cfaa8827e6e6f50ab1d98fa4c2c816
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-31292.
|
CVE ID: CVE-2024-31292
Date Updated: 2024-08-02T01:46:04.993Z
Date Published: 2024-04-07T17:29:15.731Z
Description:
Unrestricted Upload of File with Dangerous Type vulnerability in Moove Agency Import XML and RSS Feeds.This issue affects Import XML and RSS Feeds: from n/a through 2.1.5.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/import-xml-feed/wordpress-import-xml-and-rss-feeds-plugin-2-1-5-arbitrary-file-upload-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-14981.
|
CVE ID: CVE-2019-14981
Date Updated: 2024-08-05T00:34:53.021Z
Date Published: 2019-08-12T22:06:50
Description:
In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/ImageMagick/ImageMagick/issues/1552
- https://github.com/ImageMagick/ImageMagick6/commit/b522d2d857d2f75b659936b59b0da9df1682c256
- https://github.com/ImageMagick/ImageMagick/commit/a77d8d97f5a7bced0468f0b08798c83fb67427bc
- https://lists.debian.org/debian-lts-announce/2019/10/msg00028.html
- https://usn.ubuntu.com/4192-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html
- https://www.debian.org/security/2020/dsa-4712
- https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-10188.
|
CVE ID: CVE-2018-10188
Date Updated: 2024-08-05T07:32:01.774Z
Date Published: 2018-04-19T14:00:00
Description:
phpMyAdmin 4.8.0 before 4.8.0-1 has CSRF, allowing an attacker to execute arbitrary SQL statements, related to js/db_operations.js, js/tbl_operations.js, libraries/classes/Operations.php, and sql.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/103936
- http://www.securitytracker.com/id/1040752
- https://www.phpmyadmin.net/security/PMASA-2018-2/
- https://www.exploit-db.com/exploits/44496/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-0951.
|
CVE ID: CVE-2012-0951
Date Updated: 2024-08-06T18:45:25.891Z
Date Published: 2020-02-12T16:56:08
Description:
A Memory Corruption Vulnerability exists in NVIDIA Graphics Drivers 29549 due to an unknown function in the file proc/driver/nvidia/registry.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-0951.html
- https://vuldb.com/?id.10060
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-4747.
|
CVE ID: CVE-2023-4747
Date Updated: 2024-08-02T07:38:00.326Z
Date Published: 2023-09-04T00:00:16.227Z
Description:
A vulnerability classified as critical was found in DedeCMS 5.7.110. This vulnerability affects unknown code of the file /uploads/tags.php. The manipulation of the argument tag_alias leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-238636.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.238636
- https://vuldb.com/?ctiid.238636
- https://github.com/laoquanshi/cve
- https://github.com/laoquanshi/cve/blob/main/dedecms%20%20sql%20%20injection
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-24923.
|
CVE ID: CVE-2024-24923
Date Updated: 2024-08-01T23:36:21.460Z
Date Published: 2024-02-13T09:00:31.872Z
Description:
A vulnerability has been identified in Simcenter Femap (All versions < V2401.0000), Simcenter Femap (All versions < V2306.0001). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted Catia MODEL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-22055)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cert-portal.siemens.com/productcert/html/ssa-000072.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-6703.
|
CVE ID: CVE-2014-6703
Date Updated: 2024-08-06T12:24:35.356Z
Date Published: 2014-09-25T01:00:00
Description:
The phonearabs4 (aka com.phonearabs4.myapps) application 1.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
- http://www.kb.cert.org/vuls/id/680881
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2008-4990.
|
CVE ID: CVE-2008-4990
Date Updated: 2024-08-07T10:31:28.343Z
Date Published: 2009-02-02T22:00:00
Description:
Enomaly Elastic Computing Platform (ECP), formerly Enomalism, before 2.1.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/enomalism2.pid temporary file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/archive/1/500573/100/0/threaded
- http://secunia.com/advisories/33724
- http://www.securityfocus.com/bid/33544
- http://groups.google.com/group/enomalism/msg/11c2f51b3734b0ab?dmode=source
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-14071.
|
CVE ID: CVE-2019-14071
Date Updated: 2024-08-05T00:12:42.152Z
Date Published: 2020-03-05T08:56:16
Description:
Compromised reset handler may bypass access control due to AC config is being reset if debug path is enabled to collect secure or non-secure ram dumps in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8017, APQ8053, APQ8096, APQ8096AU, IPQ6018, MDM9205, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS404, QCS405, QCS605, QM215, Rennell, SA6155P, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130, SXR2130
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-2425.
|
CVE ID: CVE-2011-2425
Date Updated: 2024-08-06T23:00:33.850Z
Date Published: 2011-08-10T22:00:00
Description:
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2417.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00006.html
- http://secunia.com/advisories/48308
- http://www.us-cert.gov/cas/techalerts/TA11-222A.html
- http://www.adobe.com/support/security/bulletins/apsb11-21.html
- http://www.securityfocus.com/bid/49085
- http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00007.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15475
- http://www.redhat.com/support/errata/RHSA-2011-1144.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14073
- http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00008.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-44128.
|
CVE ID: CVE-2024-44128
Date Updated: 2024-09-17T13:39:10.156Z
Date Published: 2024-09-16T23:23:19.791Z
Description:
This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An Automator Quick Action workflow may be able to bypass Gatekeeper.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/121234
- https://support.apple.com/en-us/121238
- https://support.apple.com/en-us/121247
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-6915.
|
CVE ID: CVE-2014-6915
Date Updated: 2014-10-13T18:57:00
Date Published: 2014-10-13T18:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-38231.
|
CVE ID: CVE-2024-38231
Date Updated: 2024-09-19T20:43:09.635Z
Date Published: 2024-09-10T16:53:58.914Z
Description:
Windows Remote Desktop Licensing Service Denial of Service Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38231
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-52544.
|
CVE ID: CVE-2023-52544
Date Updated: 2024-08-02T23:03:20.880Z
Date Published: 2024-04-08T08:52:13.485Z
Description:
Vulnerability of file path verification being bypassed in the email module.
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://consumer.huawei.com/en/support/bulletin/2024/3/
- https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-37743.
|
CVE ID: CVE-2021-37743
Date Updated: 2024-08-04T01:30:07.527Z
Date Published: 2021-07-30T02:09:05
Description:
app/View/GalaxyElements/ajax/index.ctp in MISP 2.4.147 allows Stored XSS when viewing galaxy cluster elements in JSON format.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/MISP/MISP/commit/f318f7c0ddac7dfd2b1f246fd8f488d9dfc3a4bf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
null |
Describe the MITRE ATT&CK technique T1110
|
The MITRE ATT&CK technique T1110: Brute Force is related to the vulnerability CVE-CVE-2020-5365. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as exploitation_technique.
|
Provide detailed information about CVE-2012-5334.
|
CVE ID: CVE-2012-5334
Date Updated: 2024-08-06T21:05:46.805Z
Date Published: 2012-10-08T23:00:00
Description:
SQL injection vulnerability in product_desc.php in Pre Printing Press allows remote attackers to execute arbitrary SQL commands via the pid parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/52551
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74125
- http://www.osvdb.org/80191
- http://www.exploit-db.com/exploits/18616
- http://secunia.com/advisories/48443
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74122
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-41865.
|
CVE ID: CVE-2024-41865
Date Updated: 2024-08-16T04:01:52.080Z
Date Published: 2024-08-14T14:55:37.938Z
Description:
Dimension versions 3.4.11 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious file into the search path, which the application might execute instead of the legitimate file. This could occur if the application uses a search path to locate executables or libraries. Exploitation of this issue requires user interaction.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/dimension/apsb24-47.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2009-1089.
|
CVE ID: CVE-2009-1089
Date Updated: 2024-08-07T04:57:17.918Z
Date Published: 2009-03-25T18:00:00
Description:
Absolute path traversal vulnerability in upload.php in Rapidleech rev.36 and earlier allows remote attackers to read arbitrary files via a base64-encoded absolute path in the filename parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://security.bkis.vn/?p=345
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49253
- http://secunia.com/advisories/34300
- http://www.securityfocus.com/bid/34119
- http://www.securityfocus.com/archive/1/501854/100/0/threaded
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-1379.
|
CVE ID: CVE-2022-1379
Date Updated: 2024-08-03T00:03:06.044Z
Date Published: 2022-05-14T09:55:09
Description:
URL Restriction Bypass in GitHub repository plantuml/plantuml prior to V1.2022.5. An attacker can abuse this to bypass URL restrictions that are imposed by the different security profiles and achieve server side request forgery (SSRF). This allows accessing restricted internal resources/servers or sending requests to third party servers.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.dev/bounties/0d737527-86e1-41d1-9d37-b2de36bc063a
- https://github.com/plantuml/plantuml/commit/93e5964e5f35914f3f7b89de620c596795550083
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHUE4G5CAJUD7L2QPJF6U4JYQTP7CNNL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4DP36G2VBOZUNQIUZ5LVJKZIVO4SDAI/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-27749.
|
CVE ID: CVE-2020-27749
Date Updated: 2024-08-04T16:18:45.656Z
Date Published: 2021-03-03T16:40:30
Description:
A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1899966
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWZ36QK4IKU6MWDWNOOWKPH3WXZBHT2R/
- https://security.gentoo.org/glsa/202104-05
- https://security.netapp.com/advisory/ntap-20220325-0001/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-42724.
|
CVE ID: CVE-2023-42724
Date Updated: 2024-08-02T19:30:23.909Z
Date Published: 2023-12-04T00:54:17.047Z
Description:
In gpu driver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-5044.
|
CVE ID: CVE-2019-5044
Date Updated: 2019-07-09T18:25:00
Date Published: 2019-07-09T18:25:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-26973.
|
CVE ID: CVE-2020-26973
Date Updated: 2024-08-04T16:03:23.261Z
Date Published: 2021-01-07T13:53:21
Description:
Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1680084
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-0009.
|
CVE ID: CVE-2010-0009
Date Updated: 2024-08-07T00:30:47.025Z
Date Published: 2010-04-05T16:00:00
Description:
Apache CouchDB 0.8.0 through 0.10.1 allows remote attackers to obtain sensitive information by measuring the completion time of operations that verify (1) hashes or (2) passwords.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/39116
- https://bugzilla.redhat.com/show_bug.cgi?id=578572
- http://www.securityfocus.com/archive/1/510427/100/0/threaded
- http://secunia.com/advisories/39146
- http://archives.neohapsis.com/archives/bugtraq/2010-03/0267.html
- http://couchdb.apache.org/security.html
- http://www.osvdb.org/63350
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2008-4870.
|
CVE ID: CVE-2008-4870
Date Updated: 2024-08-07T10:31:27.923Z
Date Published: 2008-10-31T22:00:00
Description:
dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/32164
- http://www.openwall.com/lists/oss-security/2008/10/29/10
- http://secunia.com/advisories/33149
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46323
- https://bugzilla.redhat.com/show_bug.cgi?id=436287
- http://security.gentoo.org/glsa/glsa-200812-16.xml
- http://www.redhat.com/support/errata/RHSA-2009-0205.html
- http://secunia.com/advisories/33624
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10776
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-11020.
|
CVE ID: CVE-2016-11020
Date Updated: 2024-08-06T03:47:33.913Z
Date Published: 2020-02-24T17:04:35
Description:
Kunena before 5.0.4 does not restrict avatar file extensions to gif, jpeg, jpg, and png. This can lead to XSS and remote code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.kunena.org/bugs/changelog
- https://github.com/Kunena/Kunena-Forum/pull/5028
- https://www.kunena.org/blog/179-kunena-5-0-4-released
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-39826.
|
CVE ID: CVE-2024-39826
Date Updated: 2024-08-02T04:26:16.038Z
Date Published: 2024-07-15T17:24:05.124Z
Description:
Path traversal in Team Chat for some Zoom Workplace Apps and SDKs for Windows may allow an authenticated user to conduct information disclosure via network access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zoom.com/en/trust/security-bulletin/zsb-24023
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-22552.
|
CVE ID: CVE-2022-22552
Date Updated: 2024-09-17T01:36:17.536Z
Date Published: 2022-01-21T20:15:21.743821Z
Description:
Dell EMC AppSync versions 3.9 to 4.3 contain a clickjacking vulnerability in AppSync. A remote unauthenticated attacker could potentially exploit this vulnerability to trick the victim into executing state changing operations.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.dell.com/support/kbdoc/000195377
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-8271.
|
CVE ID: CVE-2016-8271
Date Updated: 2024-08-06T02:13:21.962Z
Date Published: 2017-04-02T20:00:00
Description:
Huawei eSpace IAD V300R002C01SPC100 and earlier versions have an information leak vulnerability; an attacker can check and download the fault information by accessing a special URL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160905-01-espace-en
- http://www.securityfocus.com/bid/98096
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-20564.
|
CVE ID: CVE-2018-20564
Date Updated: 2024-09-16T20:57:38.690Z
Date Published: 2018-12-28T15:00:00Z
Description:
An issue was discovered in DouCo DouPHP 1.5 20181221. admin/product_category.php?rec=update has XSS via the cat_name parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/AvaterXXX/CVEs/blob/master/DouPHP.md#xss4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-1000006.
|
CVE ID: CVE-2015-1000006
Date Updated: 2024-08-06T08:58:26.485Z
Date Published: 2016-10-06T14:00:00
Description:
Remote file download vulnerability in recent-backups v0.7 wordpress plugin
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vapidlabs.com/advisory.php?v=144
- http://www.securityfocus.com/bid/97125
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-6356.
|
CVE ID: CVE-2013-6356
Date Updated: 2013-12-09T18:57:00
Date Published: 2013-12-09T18:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-4604.
|
CVE ID: CVE-2013-4604
Date Updated: 2024-09-16T23:00:24.018Z
Date Published: 2013-06-25T14:00:00Z
Description:
Fortinet FortiOS before 5.0.3 on FortiGate devices does not properly restrict Guest capabilities, which allows remote authenticated users to read, modify, or delete the records of arbitrary users by leveraging the Guest role.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.fortiguard.com/advisory/FGA-2013-20/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-27945.
|
CVE ID: CVE-2022-27945
Date Updated: 2024-08-03T05:41:10.986Z
Date Published: 2022-03-26T16:13:33
Description:
NETGEAR R8500 1.0.2.158 devices allow remote authenticated users to execute arbitrary commands (such as telnetd) via shell metacharacters in the sysNewPasswd and sysConfirmPasswd parameters to password.cgi.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/donothingme/VUL/blob/main/vul2/2.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-0649.
|
CVE ID: CVE-2024-0649
Date Updated: 2024-08-01T18:11:35.658Z
Date Published: 2024-01-17T23:00:07.012Z
Description:
A vulnerability was found in ZhiHuiYun up to 4.4.13 and classified as critical. This issue affects the function download_network_image of the file /app/Http/Controllers/ImageController.php of the component Search. The manipulation of the argument url leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251375.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.251375
- https://vuldb.com/?ctiid.251375
- https://note.zhaoj.in/share/jC6NMe5TRSys
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-6969.
|
CVE ID: CVE-2017-6969
Date Updated: 2024-08-05T15:49:02.307Z
Date Published: 2017-03-17T08:55:00
Description:
readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://sourceware.org/bugzilla/show_bug.cgi?id=21156
- https://security.gentoo.org/glsa/201709-02
- http://www.securityfocus.com/bid/97065
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-4788.
|
CVE ID: CVE-2019-4788
Date Updated: 2019-12-30T16:19:29
Date Published: 2019-12-30T16:19:29
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-22320.
|
CVE ID: CVE-2023-22320
Date Updated: 2024-08-02T10:07:05.922Z
Date Published: 2023-01-10T00:00:00
Description:
OpenAM Web Policy Agent (OpenAM Consortium Edition) provided by OpenAM Consortium parses URLs improperly, leading to a path traversal vulnerability(CWE-22). Furthermore, a crafted URL may be evaluated incorrectly.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/openam-jp/web-agents/issues/3
- https://jvn.jp/en/vu/JVN91740661/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-23114.
|
CVE ID: CVE-2024-23114
Date Updated: 2024-08-28T19:49:48.296Z
Date Published: 2024-02-20T14:59:38.326Z
Description:
Deserialization of Untrusted Data vulnerability in Apache Camel CassandraQL Component AggregationRepository which is vulnerable to unsafe deserialization. Under specific conditions it is possible to deserialize malicious payload.This issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0.
Users are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://camel.apache.org/security/CVE-2024-23114.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
null |
Describe the vulnerability CVE-CVE-2020-14508
|
CVE-CVE-2020-14508 is a vulnerability in GateManager. It is related to the MITRE ATT&CK technique T1499: Endpoint Denial of Service. The vulnerability is classified as a primary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
|
Provide detailed information about CVE-2015-5414.
|
CVE ID: CVE-2015-5414
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-19880.
|
CVE ID: CVE-2020-19880
Date Updated: 2024-08-04T14:15:28.479Z
Date Published: 2020-08-24T14:11:40
Description:
DBHcms v1.2.0 has a stored xss vulnerability as there is no htmlspecialchars function form 'Name' in dbhcms\types.php, A remote unauthenticated attacker can exploit this vulnerability to hijack other users.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-29849.
|
CVE ID: CVE-2021-29849
Date Updated: 2024-09-17T00:25:54.131Z
Date Published: 2021-12-01T17:05:23.476544Z
Description:
IBM QRadar SIEM 7.3 and 7.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 205281.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/6520476
- https://exchange.xforce.ibmcloud.com/vulnerabilities/205281
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-19498.
|
CVE ID: CVE-2018-19498
Date Updated: 2024-08-05T11:37:11.461Z
Date Published: 2019-03-17T21:41:11
Description:
The Simplenia Pages plugin 2.6.0 for Atlassian Bitbucket Server has XSS.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.com/files/151466/Pages-For-Bitbucket-Server-2.6.0-Cross-Site-Scripting.html
- https://seclists.org/bugtraq/2019/Jan/53
- https://marketplace.atlassian.com/apps/1212525/pages-for-bitbucket-server/version-history
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-037.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-6200.
|
CVE ID: CVE-2012-6200
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-27935.
|
CVE ID: CVE-2023-27935
Date Updated: 2024-08-02T12:23:30.573Z
Date Published: 2023-05-08T00:00:00
Description:
The issue was addressed with improved bounds checks. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. A remote user may be able to cause unexpected app termination or arbitrary code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT213670
- https://support.apple.com/en-us/HT213677
- https://support.apple.com/en-us/HT213675
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-2828.
|
CVE ID: CVE-2023-2828
Date Updated: 2024-08-02T06:33:05.796Z
Date Published: 2023-06-21T16:26:07.096Z
Description:
Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit.
It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded.
This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.isc.org/docs/cve-2023-2828
- http://www.openwall.com/lists/oss-security/2023/06/21/6
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/
- https://www.debian.org/security/2023/dsa-5439
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/
- https://security.netapp.com/advisory/ntap-20230703-0010/
- https://lists.debian.org/debian-lts-announce/2023/07/msg00021.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-1761.
|
CVE ID: CVE-2014-1761
Date Updated: 2024-08-06T09:50:11.185Z
Date Published: 2014-03-24T19:00:00
Description:
Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-017
- http://technet.microsoft.com/security/advisory/2953095
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-5835.
|
CVE ID: CVE-2017-5835
Date Updated: 2024-08-05T15:11:48.899Z
Date Published: 2017-03-03T15:00:00
Description:
libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/96022
- https://github.com/libimobiledevice/libplist/issues/88
- http://www.openwall.com/lists/oss-security/2017/01/31/6
- http://www.openwall.com/lists/oss-security/2017/02/02/4
- https://lists.debian.org/debian-lts-announce/2020/04/msg00002.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-8090.
|
CVE ID: CVE-2014-8090
Date Updated: 2024-08-06T13:10:50.067Z
Date Published: 2014-11-21T15:00:00
Description:
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html
- http://secunia.com/advisories/59948
- http://rhn.redhat.com/errata/RHSA-2014-1912.html
- http://www.debian.org/security/2015/dsa-3159
- http://secunia.com/advisories/62050
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://rhn.redhat.com/errata/RHSA-2014-1913.html
- https://support.apple.com/HT205267
- http://rhn.redhat.com/errata/RHSA-2014-1911.html
- http://www.debian.org/security/2015/dsa-3157
- http://advisories.mageia.org/MGASA-2014-0472.html
- https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/
- http://www.ubuntu.com/usn/USN-2412-1
- http://secunia.com/advisories/62748
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:129
- http://www.securityfocus.com/bid/71230
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2014-1914.html
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-20409.
|
CVE ID: CVE-2018-20409
Date Updated: 2024-09-17T01:52:00.084Z
Date Published: 2018-12-23T23:00:00Z
Description:
An issue was discovered in Bento4 1.5.1-627. There is a heap-based buffer over-read in AP4_AvccAtom::Create in Core/Ap4AvccAtom.cpp, as demonstrated by mp42hls.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/axiomatic-systems/Bento4/issues/345
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-1000135.
|
CVE ID: CVE-2017-1000135
Date Updated: 2024-08-05T21:53:07.079Z
Date Published: 2017-11-03T18:00:00
Description:
Mahara 1.8 before 1.8.7 and 1.9 before 1.9.5 and 1.10 before 1.10.3 and 15.04 before 15.04.0 are vulnerable as logged-in users can stay logged in after the institution they belong to is suspended.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugs.launchpad.net/mahara/+bug/1348024
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2008-3003.
|
CVE ID: CVE-2008-3003
Date Updated: 2024-08-07T09:21:34.925Z
Date Published: 2008-08-12T23:00:00
Description:
Microsoft Office Excel 2007 Gold and SP1 does not properly delete the PWD (password) string from connections.xml when a .xlsx file is configured not to save the remote data session password, which allows local users to obtain sensitive information and obtain access to a remote data source, aka the "Excel Credential Caching Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.us-cert.gov/cas/techalerts/TA08-225A.html
- http://www.securityfocus.com/bid/30641
- http://marc.info/?l=bugtraq&m=121915960406986&w=2
- http://marc.info/?l=bugtraq&m=121915960406986&w=2
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-043
- http://www.securitytracker.com/id?1020669
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5951
- http://secunia.com/advisories/31454
- http://www.vupen.com/english/advisories/2008/2347
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-0380.
|
CVE ID: CVE-2010-0380
Date Updated: 2024-08-07T00:45:12.147Z
Date Published: 2010-01-22T21:20:00
Description:
install.php in JCE-Tech PHP Calendars, downloaded 20100121, allows remote attackers to bypass intended access restrictions and modify application settings via a direct request. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.org/1001-exploits/phpcalendars-xss.txt
- http://www.exploit-db.com/exploits/11082
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-5633.
|
CVE ID: CVE-2020-5633
Date Updated: 2024-08-04T08:39:25.706Z
Date Published: 2021-01-13T09:40:35
Description:
Multiple NEC products (Express5800/T110j, Express5800/T110j-S, Express5800/T110j (2nd-Gen), Express5800/T110j-S (2nd-Gen), iStorage NS100Ti, and Express5800/GT110j) where Baseboard Management Controller (BMC) firmware Rev1.09 and earlier is applied allows remote attackers to bypass authentication and then obtain/modify BMC setting information, obtain monitoring information, or reboot/shut down the vulnerable product via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://jpn.nec.com/security-info/secinfo/nv21-002.html
- https://www.support.nec.co.jp/View.aspx?id=9010108754
- https://jvn.jp/en/jp/JVN38752718/index.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-23242.
|
CVE ID: CVE-2024-23242
Date Updated: 2024-08-01T22:59:32.157Z
Date Published: 2024-03-08T01:36:08.176Z
Description:
A privacy issue was addressed by not logging contents of text fields. This issue is fixed in macOS Sonoma 14.4, iOS 17.4 and iPadOS 17.4. An app may be able to view Mail data.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT214081
- https://support.apple.com/en-us/HT214084
- http://seclists.org/fulldisclosure/2024/Mar/21
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-2047.
|
CVE ID: CVE-2013-2047
Date Updated: 2024-08-06T15:20:37.449Z
Date Published: 2014-03-14T16:00:00
Description:
The login page (aka index.php) in ownCloud before 5.0.6 does not disable the autocomplete setting for the password parameter, which makes it easier for physically proximate attackers to guess the password.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://owncloud.org/about/security/advisories/oC-SA-2013-023/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-0385.
|
CVE ID: CVE-2023-0385
Date Updated: 2024-08-02T05:10:55.600Z
Date Published: 2023-01-18T14:18:55.171Z
Description:
The Custom 404 Pro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.7.1. This is due to missing or incorrect nonce validation on the custom_404_pro_admin_init function. This makes it possible for unauthenticated attackers to delete logs, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/968920b9-febf-4d76-a16b-f27954cd72e5
- https://plugins.trac.wordpress.org/browser/custom-404-pro/tags/3.7.1/admin/AdminClass.php#L114
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2008-5470.
|
CVE ID: CVE-2008-5470
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-0341.
|
CVE ID: CVE-2019-0341
Date Updated: 2024-08-04T17:44:16.467Z
Date Published: 2019-08-14T13:50:44
Description:
The session cookie used by SAP Enable Now, version 1902, does not have the HttpOnly flag set. If an attacker runs script code in the context of the application, he could get access to the session cookie. The session cookie could then be abused to gain access to the application.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017
- https://launchpad.support.sap.com/#/notes/2794742
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-9228.
|
CVE ID: CVE-2020-9228
Date Updated: 2024-08-04T10:19:20.048Z
Date Published: 2020-08-14T14:43:55
Description:
FusionCompute 8.0.0 has an information disclosure vulnerability. Due to the properly protection of certain information, attackers may exploit this vulnerability to obtain certain information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200805-01-fc-en
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-25140.
|
CVE ID: CVE-2024-25140
Date Updated: 2024-08-29T17:56:43.389Z
Date Published: 2024-02-06T00:00:00
Description:
A default installation of RustDesk 1.2.3 on Windows places a WDKTestCert certificate under Trusted Root Certification Authorities with Enhanced Key Usage of Code Signing (1.3.6.1.5.5.7.3.3), valid from 2023 until 2033. This is potentially unwanted, e.g., because there is no public documentation of security measures for the private key, and arbitrary software could be signed if the private key were to be compromised. NOTE: the vendor's position is "we do not have EV cert, so we use test cert as a workaround." Insertion into Trusted Root Certification Authorities was the originally intended behavior, and the UI ensured that the certificate installation step (checked by default) was visible to the user before proceeding with the product installation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://news.ycombinator.com/item?id=39256493
- https://github.com/rustdesk/rustdesk/discussions/6444
- https://serverfault.com/questions/837994
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2009-4062.
|
CVE ID: CVE-2009-4062
Date Updated: 2024-08-07T06:45:50.999Z
Date Published: 2009-11-24T02:00:00
Description:
Multiple cross-site scripting (XSS) vulnerabilities in the Printfriendly module 6.x before 6.x-1.6 for Drupal allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/37059
- http://osvdb.org/60281
- http://drupal.org/node/636678
- https://exchange.xforce.ibmcloud.com/vulnerabilities/54348
- http://drupal.org/node/636670
- http://secunia.com/advisories/37441
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-2777.
|
CVE ID: CVE-2022-2777
Date Updated: 2024-08-03T00:46:04.459Z
Date Published: 2022-08-11T10:45:13
Description:
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.dev/bounties/13dd2f4d-0c7f-483e-a771-e1ed2ff1c36f
- https://github.com/microweber/microweber/commit/60eef7494211d1c458228c321e986edeaa401a58
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-27937.
|
CVE ID: CVE-2022-27937
Date Updated: 2024-08-03T05:41:11.079Z
Date Published: 2022-07-17T21:00:30
Description:
Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.pexip.com/admin/security_bulletins.htm#CVE-2022-27937
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-1768.
|
CVE ID: CVE-2015-1768
Date Updated: 2024-08-06T04:54:16.009Z
Date Published: 2015-06-10T01:00:00
Description:
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/75024
- http://www.securitytracker.com/id/1032525
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-061
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-47631.
|
CVE ID: CVE-2023-47631
Date Updated: 2024-08-02T21:16:42.299Z
Date Published: 2023-11-14T21:04:20.522Z
Description:
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federated Learning (FL) and Multi-Party Computation (MPC). In affected versions a node does not check if an image is allowed to run if a `parent_id` is set. A malicious party that breaches the server may modify it to set a fake `parent_id` and send a task of a non-whitelisted algorithm. The node will then execute it because the `parent_id` that is set prevents checks from being run. This impacts all servers that are breached by an expert user. This vulnerability has been patched in version 4.1.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/vantage6/vantage6/security/advisories/GHSA-vc3v-ppc7-v486
- https://github.com/vantage6/vantage6/commit/bf83521eb12fa80aa5fc92ef1692010a9a7f8243
- https://github.com/vantage6/vantage6/blob/version/4.1.1/vantage6-node/vantage6/node/docker/docker_manager.py#L265-L268
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-4106.
|
CVE ID: CVE-2022-4106
Date Updated: 2024-08-03T01:27:54.544Z
Date Published: 2022-12-19T13:41:50.942Z
Description:
The Wholesale Market for WooCommerce WordPress plugin before 1.0.7 does not have authorisation check, as well as does not validate user input used to generate system path, allowing unauthenticated attackers to download arbitrary file from the server.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/b60a0d3d-148f-4e9b-baee-7332890804ed
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-2491.
|
CVE ID: CVE-2023-2491
Date Updated: 2024-08-02T06:26:08.963Z
Date Published: 2023-05-17T00:00:00
Description:
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=2192873
- https://access.redhat.com/security/cve/CVE-2023-2491
- https://access.redhat.com/errata/RHSA-2023:3104
- https://access.redhat.com/errata/RHSA-2023:2626
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-49938.
|
CVE ID: CVE-2023-49938
Date Updated: 2024-08-02T22:09:49.477Z
Date Published: 2023-12-14T00:00:00
Description:
An issue was discovered in SchedMD Slurm 22.05.x and 23.02.x. There is Incorrect Access Control: an attacker can modified their extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups. The fixed versions are 22.05.11 and 23.02.7.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.schedmd.com/security-archive.php
- https://lists.schedmd.com/pipermail/slurm-announce/2023/000103.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FEDDYEE2WK7FHWBHKON3OZVQI56WSQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYQS3LFGC4HE4WCW4L3NAA2I6FRIWMNO/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-19788.
|
CVE ID: CVE-2018-19788
Date Updated: 2024-08-29T15:55:31.505Z
Date Published: 2018-12-03T06:00:00
Description:
A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://usn.ubuntu.com/3861-1/
- https://lists.debian.org/debian-lts-announce/2019/01/msg00021.html
- https://usn.ubuntu.com/3861-2/
- https://bugs.debian.org/915332
- https://gitlab.freedesktop.org/polkit/polkit/issues/74
- https://www.debian.org/security/2018/dsa-4350
- https://access.redhat.com/errata/RHSA-2019:2046
- https://security.gentoo.org/glsa/201908-14
- https://access.redhat.com/errata/RHSA-2019:3232
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-20341.
|
CVE ID: CVE-2021-20341
Date Updated: 2024-09-16T23:31:58.352Z
Date Published: 2021-03-09T14:55:13.340111Z
Description:
IBM Cloud Pak for Multicloud Management Monitoring 2.2 returns potentially sensitive information in headers which could lead to further attacks against the system. IBM X-Force ID: 194513.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/6426997
- https://exchange.xforce.ibmcloud.com/vulnerabilities/194513
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-0670.
|
CVE ID: CVE-2017-0670
Date Updated: 2024-09-17T03:12:23.484Z
Date Published: 2017-07-06T20:00:00Z
Description:
A denial of service vulnerability in the Android framework. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36104177.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/99470
- https://source.android.com/security/bulletin/2017-07-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-3495.
|
CVE ID: CVE-2020-3495
Date Updated: 2024-09-17T04:14:44.501Z
Date Published: 2020-09-04T02:25:52.219424Z
Description:
A vulnerability in Cisco Jabber for Windows could allow an authenticated, remote attacker to execute arbitrary code. The vulnerability is due to improper validation of message contents. An attacker could exploit this vulnerability by sending specially crafted Extensible Messaging and Presence Protocol (XMPP) messages to the affected software. A successful exploit could allow the attacker to cause the application to execute arbitrary programs on the targeted system with the privileges of the user account that is running the Cisco Jabber client software, possibly resulting in arbitrary code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-UyTKCPGg
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-44401.
|
CVE ID: CVE-2021-44401
Date Updated: 2024-08-04T04:17:25.194Z
Date Published: 2022-01-28T21:42:44
Description:
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. PtzCtrl param is not object. An attacker can send an HTTP request to trigger this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-49639.
|
CVE ID: CVE-2023-49639
Date Updated: 2024-08-02T22:01:25.912Z
Date Published: 2024-01-04T13:57:12.848Z
Description:
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'customer_details' parameter of the buyer_invoice_submit.php resource does not validate the characters received and they are sent unfiltered to the database.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://fluidattacks.com/advisories/zimerman/
- https://www.kashipara.com/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-39894.
|
CVE ID: CVE-2022-39894
Date Updated: 2024-08-03T12:07:42.950Z
Date Published: 2022-12-08T00:00:00
Description:
Improper access control vulnerability in ContactListStartActivityHelper in Phone prior to SMR Dec-2022 Release 1 allows to access sensitive information via implicit intent.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=12
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-15035.
|
CVE ID: CVE-2020-15035
Date Updated: 2024-08-04T13:00:52.155Z
Date Published: 2020-07-07T15:27:23
Description:
NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Monitoring-Map.php hde parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.nedi.ch/download/
- https://gist.github.com/sudoninja-noob/c1722c118abc7a562a9a0de726266a19
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2008-1298.
|
CVE ID: CVE-2008-1298
Date Updated: 2024-08-07T08:17:33.600Z
Date Published: 2008-03-12T17:00:00
Description:
SQL injection vulnerability in Hadith module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the cat parameter in a viewcat action to modules.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/archive/1/489323/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41092
- http://www.securityfocus.com/bid/28171
- http://securityreason.com/securityalert/3730
- http://www.rbt-4.net/forum/viewthread.php?forum_id=51&thread_id=3078
- http://secunia.com/advisories/29322
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-5168.
|
CVE ID: CVE-2010-5168
Date Updated: 2024-09-16T22:02:02.744Z
Date Published: 2012-08-25T21:00:00Z
Description:
Race condition in Symantec Norton Internet Security 2010 17.5.0.127 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html
- http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/
- http://www.securityfocus.com/bid/39924
- http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php
- http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html
- http://www.osvdb.org/67660
- http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/
- http://www.f-secure.com/weblog/archives/00001949.html
- http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-6763.
|
CVE ID: CVE-2017-6763
Date Updated: 2024-08-05T15:41:17.131Z
Date Published: 2017-08-07T06:00:00
Description:
A vulnerability in the implementation of the H.264 protocol in Cisco Meeting Server (CMS) 2.1.4 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability exists because the affected application does not properly validate Fragmentation Unit (FU-A) protocol packets. An attacker could exploit this vulnerability by sending a crafted H.264 FU-A packet through the affected application. A successful exploit could allow the attacker to cause a DoS condition on the affected system due to an unexpected restart of the CMS media process on the system. Although the CMS platform continues to operate and only the single, affected CMS media process is restarted, a brief interruption of media traffic for certain users could occur. Cisco Bug IDs: CSCve10131.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCve10131
- http://www.securityfocus.com/bid/100111
- http://www.securitytracker.com/id/1039058
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-ms
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-3202.
|
CVE ID: CVE-2017-3202
Date Updated: 2024-08-05T14:16:28.241Z
Date Published: 2018-06-11T17:00:00
Description:
The Java implementation of AMF3 deserializers used in Flamingo amf-serializer by Exadel, version 2.2.0, may allow instantiation of arbitrary classes via their public parameter-less constructor and subsequently call arbitrary Java Beans setter methods. The ability to exploit this vulnerability depends on the availability of classes in the class path that make use of deserialization. A remote attacker with the ability to spoof or control information may be able to send serialized Java objects with pre-set properties that result in arbitrary code execution when deserialized.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://codewhitesec.blogspot.com/2017/04/amf.html
- https://www.kb.cert.org/vuls/id/307983
- http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-execution
- http://www.securityfocus.com/bid/97380
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2009-0757.
|
CVE ID: CVE-2009-0757
Date Updated: 2024-08-07T04:48:51.933Z
Date Published: 2009-03-03T16:00:00
Description:
Multiple buffer overflows in GNU MPFR 2.4.0 allow context-dependent attackers to cause a denial of service (crash) via the (1) mpfr_snprintf and (2) mpfr_vsnprintf functions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/34204
- http://www.ubuntu.com/usn/USN-772-1
- http://mpfr.loria.fr/mpfr-2.4.1/
- http://www.securityfocus.com/bid/33945
- http://www.openwall.com/lists/oss-security/2009/03/02/4
- http://secunia.com/advisories/35028
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-7134.
|
CVE ID: CVE-2015-7134
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-40607.
|
CVE ID: CVE-2021-40607
Date Updated: 2024-08-04T02:44:10.850Z
Date Published: 2022-06-28T11:04:06
Description:
The schm_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/gpac/gpac/issues/1879
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-4203.
|
CVE ID: CVE-2020-4203
Date Updated: 2024-09-16T17:14:21.559Z
Date Published: 2020-03-19T13:40:15.081520Z
Description:
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.8 could potentially disclose highly sensitive information to a privileged user due to improper access controls. IBM X-Force ID: 174956.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/6090934
- https://exchange.xforce.ibmcloud.com/vulnerabilities/174956
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-8723.
|
CVE ID: CVE-2024-8723
Date Updated: 2024-09-26T14:57:16.876Z
Date Published: 2024-09-26T02:03:23.016Z
Description:
The 012 Ps Multi Languages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via translated titles in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/30a1517e-5ea5-47a1-afe8-9543e1ffd199?source=cve
- https://plugins.svn.wordpress.org/012-ps-multi-languages/trunk/includes/ps-multilingual-edit-post.php
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-1970.
|
CVE ID: CVE-2014-1970
Date Updated: 2024-08-06T09:58:15.575Z
Date Published: 2014-03-20T15:00:00
Description:
Directory traversal vulnerability in the ES File Explorer File Manager application before 3.0.4 for Android allows remote attackers to overwrite or create arbitrary files via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://jvn.jp/en/jp/JVN70029459/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2014-000033
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-5837.
|
CVE ID: CVE-2018-5837
Date Updated: 2024-08-05T05:47:55.801Z
Date Published: 2018-09-20T13:00:00
Description:
In Snapdragon (Automobile, Mobile, Wear) in version IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG which produced repeating output much earlier than expected.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins
- https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-6317.
|
CVE ID: CVE-2018-6317
Date Updated: 2024-08-05T06:01:48.622Z
Date Published: 2018-02-02T21:00:00
Description:
The remote management interface in Claymore Dual Miner 10.5 and earlier is vulnerable to an unauthenticated format string vulnerability, allowing remote attackers to read memory or cause a denial of service.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://medium.com/%40res1n/claymore-dual-gpu-miner-10-5-format-strings-vulnerability-916ab3d2db30
- https://www.exploit-db.com/exploits/43972/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-47691.
|
CVE ID: CVE-2023-47691
Date Updated: 2024-03-20T12:54:38.068Z
Date Published: 2024-03-07T13:30:47.564Z
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-12157.
|
CVE ID: CVE-2019-12157
Date Updated: 2024-08-04T23:10:30.824Z
Date Published: 2019-10-02T18:51:36
Description:
In JetBrains UpSource versions before 2018.2 build 1293, there is credential disclosure via RPC commands.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-24014.
|
CVE ID: CVE-2023-24014
Date Updated: 2024-08-02T10:49:08.878Z
Date Published: 2023-06-07T20:50:29.115Z
Description:
Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and prior are
vulnerable to heap-based buffer overflow, which could allow an attacker
to execute arbitrary code.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.cisa.gov/news-events/ics-advisories/icsa-23-157-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-26196.
|
CVE ID: CVE-2024-26196
Date Updated: 2024-08-01T23:59:32.558Z
Date Published: 2024-02-29T20:27:10.655Z
Description:
Microsoft Edge for Android (Chromium-based) Information Disclosure Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26196
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-7942.
|
CVE ID: CVE-2020-7942
Date Updated: 2024-08-04T09:48:24.553Z
Date Published: 2020-02-19T20:52:03
Description:
Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 and 5.5.19 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior. Affected software versions: Puppet 6.x prior to 6.13.0 Puppet Agent 6.x prior to 6.13.0 Puppet 5.5.x prior to 5.5.19 Puppet Agent 5.5.x prior to 5.5.19 Resolved in: Puppet 6.13.0 Puppet Agent 6.13.0 Puppet 5.5.19 Puppet Agent 5.5.19
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://puppet.com/security/cve/CVE-2020-7942/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.