instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2022-21598.
CVE ID: CVE-2022-21598 Date Updated: 2024-09-24T19:35:32.824Z Date Published: 2022-10-18T00:00:00 Description: Vulnerability in the Siebel Core - DB Deployment and Configuration product of Oracle Siebel CRM (component: Repository Utilities). Supported versions that are affected are 22.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel Core - DB Deployment and Configuration. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Siebel Core - DB Deployment and Configuration accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuoct2022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0020.
CVE ID: CVE-2014-0020 Date Updated: 2024-08-06T08:58:26.563Z Date Published: 2014-02-06T15:00:00 Description: The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html - http://hg.pidgin.im/pidgin/main/rev/a167504359e5 - https://rhn.redhat.com/errata/RHSA-2014-0139.html - http://hg.pidgin.im/pidgin/main/rev/9f132a6855cd - http://www.debian.org/security/2014/dsa-2859 - http://pidgin.im/news/security/?id=85 - http://hg.pidgin.im/pidgin/main/rev/4d9be297d399 - http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html - http://hg.pidgin.im/pidgin/main/rev/6b0e0566af20 - http://www.ubuntu.com/usn/USN-2100-1 - http://hg.pidgin.im/pidgin/main/rev/7d0fb0c6d8d4 - http://hg.pidgin.im/pidgin/main/rev/5845d9fa7084 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4478.
CVE ID: CVE-2022-4478 Date Updated: 2024-08-03T01:41:45.428Z Date Published: 2023-01-16T15:37:57.578Z Description: The Font Awesome WordPress plugin before 4.3.2 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks against logged-in admins. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/4de75de5-e557-46df-9675-e3f0220f4003 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-30458.
CVE ID: CVE-2024-30458 Date Updated: 2024-08-02T01:32:07.465Z Date Published: 2024-03-29T13:05:15.053Z Description: Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WOOCS – WooCommerce Currency Switcher.This issue affects WOOCS – WooCommerce Currency Switcher: from n/a through 1.4.1.7. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/woocommerce-currency-switcher/wordpress-fox-currency-switcher-professional-for-woocommerce-plugin-1-4-1-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-3501.
CVE ID: CVE-2019-3501 Date Updated: 2024-08-04T19:12:09.523Z Date Published: 2019-01-02T13:00:00 Description: The OUGC Awards plugin before 1.8.19 for MyBB allows XSS via a crafted award reason that is mishandled on the awards page or in a user profile. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/46080/ - https://github.com/Sama34/OUGC-Awards/pull/31 - https://github.com/Sama34/OUGC-Awards/issues/29 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3693.
CVE ID: CVE-2013-3693 Date Updated: 2024-09-16T23:16:47.093Z Date Published: 2013-10-11T22:00:00Z Description: The BlackBerry Universal Device Service in BlackBerry Enterprise Service (BES) 10.0 through 10.1.2 does not properly restrict access to the JBoss Remote Method Invocation (RMI) interface, which allows remote attackers to upload and execute arbitrary packages via a request to port 1098. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://btsc.webapps.blackberry.com/btsc/viewdocument.do%3Bjsessionid=1C7CE6911426BCFAF2A80C3834F4DF0F?externalId=KB35139&sliceId=1&cmd=displayKC&docType=kc&noCount=true&ViewedDocsListHelper=com.kanisa.apps.common.BaseViewedDocsListHelperImpl - http://secunia.com/advisories/55187 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3558.
CVE ID: CVE-2011-3558 Date Updated: 2024-08-06T23:37:48.216Z Date Published: 2011-10-19T21:00:00 Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to HotSpot. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://security.gentoo.org/glsa/glsa-201406-32.xml - http://marc.info/?l=bugtraq&m=134254866602253&w=2 - http://www.securityfocus.com/bid/50242 - http://secunia.com/advisories/48308 - http://marc.info/?l=bugtraq&m=132750579901589&w=2 - http://marc.info/?l=bugtraq&m=132750579901589&w=2 - http://www.redhat.com/support/errata/RHSA-2011-1384.html - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html - http://marc.info/?l=bugtraq&m=134254957702612&w=2 - http://osvdb.org/76510 - http://www.securitytracker.com/id?1026215 - http://www.ubuntu.com/usn/USN-1263-1 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13475 - http://marc.info/?l=bugtraq&m=134254957702612&w=2 - http://www.ibm.com/developerworks/java/jdk/alerts/ - https://exchange.xforce.ibmcloud.com/vulnerabilities/70835 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8065.
CVE ID: CVE-2014-8065 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4024.
CVE ID: CVE-2015-4024 Date Updated: 2024-08-06T06:04:02.812Z Date Published: 2015-06-09T18:00:00 Description: Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2015-1187.html - http://rhn.redhat.com/errata/RHSA-2015-1186.html - http://www.securityfocus.com/bid/74903 - http://www.securitytracker.com/id/1032432 - http://rhn.redhat.com/errata/RHSA-2015-1219.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html - http://lists.opensuse.org/opensuse-updates/2015-06/msg00002.html - https://bugs.php.net/bug.php?id=69364 - http://php.net/ChangeLog-5.php - http://www.debian.org/security/2015/dsa-3280 - http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html - http://rhn.redhat.com/errata/RHSA-2015-1135.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763 - https://support.apple.com/kb/HT205031 - http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158915.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158616.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159031.html - http://rhn.redhat.com/errata/RHSA-2015-1218.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4873.
CVE ID: CVE-2016-4873 Date Updated: 2024-08-06T00:46:38.532Z Date Published: 2017-04-17T15:00:00 Description: Cybozu Office 9.0.0 to 10.4.0 allows remote authenticated attackers to execute unintended operations via the Project function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.cybozu.com/ja-jp/article/9442 - http://www.securityfocus.com/bid/93461 - http://jvn.jp/en/jp/JVN07148816/index.html - http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000189.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3615.
CVE ID: CVE-2023-3615 Date Updated: 2024-08-02T07:01:57.123Z Date Published: 2023-07-17T15:33:25.752Z Description: Mattermost iOS app fails to properly validate the server certificate while initializing the TLS connection allowing a network attacker to intercept the WebSockets connection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mattermost.com/security-updates No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6201.
CVE ID: CVE-2017-6201 Date Updated: 2024-08-05T15:25:49.021Z Date Published: 2018-02-06T16:00:00 Description: A Server Side Request Forgery vulnerability exists in the install app process in Sandstorm before build 0.203. A remote attacker may exploit this issue by providing a URL. It could bypass access control such as firewalls that prevent the attackers from accessing the URLs directly. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sandstorm.io/news/2017-03-02-security-review - https://github.com/sandstorm-io/sandstorm/commit/164997fb958effbc90c5328c166706280a84aaa1 - https://devco.re/blog/2018/01/26/Sandstorm-Security-Review-CVE-2017-6200-en/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-23977.
CVE ID: CVE-2020-23977 Date Updated: 2024-08-04T15:05:11.639Z Date Published: 2020-08-27T13:52:47 Description: KandNconcepts Club CMS 1.1 and 1.2 has cross site scripting via the 'team.php,player.php,club.php' id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://packetstormsecurity.com/files/157049/KandNconcepts-Club-CMS-1.1-1.2-Cross-Site-Scripting-SQL-Injection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43135.
CVE ID: CVE-2022-43135 Date Updated: 2024-08-03T13:26:02.718Z Date Published: 2022-11-16T00:00:00 Description: Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the username parameter at /diagnostic/login.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/junHVV/bug_report/blob/main/vendors/mayuri_k/Online%20Diagnostic%20Lab%20Management%20System/SQLi-1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-40575.
CVE ID: CVE-2024-40575 Date Updated: 2024-08-02T04:33:11.903Z Date Published: 2024-07-24T00:00:00 Description: An issue in Huawei Technologies opengauss (openGauss 5.0.0 build) v.7.3.0 allows a local attacker to cause a denial of service via the modification of table attributes No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://opengauss.org - https://gist.github.com/RuiHuaLiu2023/92059b0fa6c625e3d39001c5a9b2dc71 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8424.
CVE ID: CVE-2020-8424 Date Updated: 2024-08-04T09:56:28.341Z Date Published: 2020-01-28T22:11:01 Description: Cups Easy (Purchase & Inventory) 1.0 is vulnerable to CSRF that leads to admin account takeover via passwordmychange.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/J3rryBl4nks/CUPSEasyExploits - http://packetstormsecurity.com/files/156140/Cups-Easy-1.0-Cross-Site-Request-Forgery.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20829.
CVE ID: CVE-2021-20829 Date Updated: 2024-08-03T17:53:23.057Z Date Published: 2021-09-21T09:25:10 Description: Cross-site scripting vulnerability due to the inadequate tag sanitization in GROWI versions v4.2.19 and earlier allows remote attackers to execute an arbitrary script on the web browser of the user who accesses a specially crafted page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jvn.jp/en/vu/JVNVU94889258/index.html - https://weseek.co.jp/security/2021/09/17/vulnerability/growi-prevent-multiple-xss-addition/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1263.
CVE ID: CVE-2009-1263 Date Updated: 2024-08-07T05:04:49.480Z Date Published: 2009-04-07T23:00:00 Description: SQL injection vulnerability in sub_commententry.php in the BookJoomlas (com_bookjoomlas) component 0.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the gbid parameter in a comment action to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/8353 - http://www.vupen.com/english/advisories/2009/0952 - https://exchange.xforce.ibmcloud.com/vulnerabilities/49682 - http://osvdb.org/53421 - http://www.securityfocus.com/bid/34392 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-22222.
CVE ID: CVE-2020-22222 Date Updated: 2024-08-04T14:51:10.534Z Date Published: 2021-11-05T22:46:01 Description: Stivasoft (Phpjabbers) Fundraising Script v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the pjActionLoadCss function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pastebin.com/cZFwMb5F No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5953.
CVE ID: CVE-2013-5953 Date Updated: 2024-08-06T17:29:41.746Z Date Published: 2014-03-19T14:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in tmpl/layout_editevent.php in the Multi Calendar (com_multicalendar) component 4.0.2, and possibly 4.8.5 and earlier, for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) calid or (2) paletteDefault parameter in an editevent action to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/125738 - http://secunia.com/advisories/57360 - http://archives.neohapsis.com/archives/fulldisclosure/2014-03/0276.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/91820 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2694.
CVE ID: CVE-2011-2694 Date Updated: 2024-08-06T23:08:23.785Z Date Published: 2011-07-29T20:00:00 Description: Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mandriva.com/security/advisories?name=MDVSA-2011:121 - http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 - http://securitytracker.com/id?1025852 - http://jvn.jp/en/jp/JVN63041502/index.html - http://www.debian.org/security/2011/dsa-2290 - http://osvdb.org/74072 - http://secunia.com/advisories/45393 - http://secunia.com/advisories/45496 - http://secunia.com/advisories/45488 - http://samba.org/samba/history/samba-3.5.10.html - http://www.securityfocus.com/bid/48901 - http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 - https://bugzilla.samba.org/show_bug.cgi?id=8289 - http://www.samba.org/samba/security/CVE-2011-2694 - http://ubuntu.com/usn/usn-1182-1 - https://exchange.xforce.ibmcloud.com/vulnerabilities/68844 - https://bugzilla.redhat.com/show_bug.cgi?id=722537 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-13023.
CVE ID: CVE-2018-13023 Date Updated: 2024-08-05T08:52:49.767Z Date Published: 2018-11-27T21:00:00 Description: System command injection vulnerability in wifi_access in Xiaomi Mi Router 3 version 2.22.15 allows attackers to execute system commands via the "timeout" URL parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.securityevaluators.com/hack-routers-get-toys-exploiting-the-mi-router-3-1d7fd42f0838 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4354.
CVE ID: CVE-2018-4354 Date Updated: 2024-08-05T05:11:22.692Z Date Published: 2019-04-03T17:43:16 Description: A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/kb/HT209107 - https://support.apple.com/kb/HT209193 - https://support.apple.com/kb/HT209106 - https://support.apple.com/kb/HT209139 - https://support.apple.com/kb/HT209108 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15747.
CVE ID: CVE-2020-15747 Date Updated: 2021-03-17T12:26:07 Date Published: 2021-03-17T12:26:07 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39397.
CVE ID: CVE-2023-39397 Date Updated: 2024-08-02T18:10:20.432Z Date Published: 2023-08-13T12:32:43.081Z Description: Input parameter verification vulnerability in the communication system. Successful exploitation of this vulnerability may affect availability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2023/8/ - https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6634.
CVE ID: CVE-2024-6634 Date Updated: 2024-08-01T21:41:04.234Z Date Published: 2024-07-27T01:51:06.817Z Description: The Master Currency WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's currencyconverterform shortcode in all versions up to, and including, 1.1.61 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/fea71287-f92e-43e5-adbf-d89fce437e56?source=cve - https://wordpress.org/plugins/mastercurrency-wp/#developers No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2165.
CVE ID: CVE-2019-2165 Date Updated: 2024-08-04T18:42:50.835Z Date Published: 2019-09-27T18:05:12 Description: In libxaac there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112712154 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/android-10 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2656.
CVE ID: CVE-2015-2656 Date Updated: 2024-08-06T05:24:38.237Z Date Published: 2015-07-16T10:00:00 Description: Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-2583, CVE-2015-2624, CVE-2015-2626, CVE-2015-2640, CVE-2015-2654, CVE-2015-4754, CVE-2015-4764, CVE-2015-4775, CVE-2015-4776, CVE-2015-4777, CVE-2015-4778, CVE-2015-4780, CVE-2015-4781, CVE-2015-4782, CVE-2015-4783, CVE-2015-4784, CVE-2015-4785, CVE-2015-4786, CVE-2015-4787, CVE-2015-4789, and CVE-2015-4790. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1068
The MITRE ATT&CK technique T1068: Exploitation for Privilege Escalation is related to the vulnerability CVE-CVE-2019-1609. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as secondary_impact.
Provide detailed information about CVE-2022-47524.
CVE ID: CVE-2022-47524 Date Updated: 2024-08-03T14:55:08.274Z Date Published: 2022-12-23T00:00:00 Description: F-Secure SAFE Browser 19.1 before 19.2 for Android allows an IDN homograph attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.f-secure.com/en/home/support/security-advisories/cve-2022-47524 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1689.
CVE ID: CVE-2022-1689 Date Updated: 2024-08-03T00:10:03.847Z Date Published: 2022-06-06T08:51:24 Description: The Note Press WordPress plugin through 0.1.10 does not sanitise and escape the Update parameter before using it in a SQL statement when updating a note via the admin dashboard, leading to an SQL injection No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/982f84a1-216d-41ed-87bd-433b695cec28 - https://bulletin.iese.de/post/note-press_0-1-10_2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4308.
CVE ID: CVE-2024-4308 Date Updated: 2024-08-01T20:33:53.184Z Date Published: 2024-04-29T12:23:41.188Z Description: SQL injection vulnerability in HubBank affecting version 1.0.2. This vulnerability could allow an attacker to send a specially crafted SQL query to the database through different endpoints (/admin/view_users.php?id=1,/admin/viewloan-trans.php?id=1,/admin/view-deposit.php?id=1,/admin/view-domtrans.php?id=1, /admin/delete_cards.php?id=1,/admin/view_cards.php?id=1 and /admin/view_users.php?id=1, id parameter) and retrieve the information stored in the database. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-hubbank No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9404.
CVE ID: CVE-2016-9404 Date Updated: 2024-08-06T02:50:38.353Z Date Published: 2017-01-31T22:00:00 Description: Cross-site scripting (XSS) vulnerability in MyBB (aka MyBulletinBoard) before 1.8.7 and MyBB Merge System before 1.8.7 might allow remote attackers to inject arbitrary web script or HTML via vectors related to login. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/94395 - http://www.openwall.com/lists/oss-security/2016/11/18/1 - http://www.openwall.com/lists/oss-security/2016/11/10/8 - https://blog.mybb.com/2016/03/11/mybb-1-8-7-merge-system-1-8-7-release/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-40547.
CVE ID: CVE-2024-40547 Date Updated: 2024-08-02T04:33:11.732Z Date Published: 2024-07-12T00:00:00 Description: PublicCMS v4.0.202302.e was discovered to contain an arbitrary file content replacement vulnerability via the component /admin/cmsTemplate/replace. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitee.com/sanluan/PublicCMS/issues/IAAL70 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-48733.
CVE ID: CVE-2022-48733 Date Updated: 2024-09-12T11:48:02.091Z Date Published: 2024-06-20T11:13:20.737Z Description: In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free after failure to create a snapshot At ioctl.c:create_snapshot(), we allocate a pending snapshot structure and then attach it to the transaction's list of pending snapshots. After that we call btrfs_commit_transaction(), and if that returns an error we jump to 'fail' label, where we kfree() the pending snapshot structure. This can result in a later use-after-free of the pending snapshot: 1) We allocated the pending snapshot and added it to the transaction's list of pending snapshots; 2) We call btrfs_commit_transaction(), and it fails either at the first call to btrfs_run_delayed_refs() or btrfs_start_dirty_block_groups(). In both cases, we don't abort the transaction and we release our transaction handle. We jump to the 'fail' label and free the pending snapshot structure. We return with the pending snapshot still in the transaction's list; 3) Another task commits the transaction. This time there's no error at all, and then during the transaction commit it accesses a pointer to the pending snapshot structure that the snapshot creation task has already freed, resulting in a user-after-free. This issue could actually be detected by smatch, which produced the following warning: fs/btrfs/ioctl.c:843 create_snapshot() warn: '&pending_snapshot->list' not removed from list So fix this by not having the snapshot creation ioctl directly add the pending snapshot to the transaction's list. Instead add the pending snapshot to the transaction handle, and then at btrfs_commit_transaction() we add the snapshot to the list only when we can guarantee that any error returned after that point will result in a transaction abort, in which case the ioctl code can safely free the pending snapshot and no one can access it anymore. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/7e4c72dbaf62f8978af8321a24dbd35566d3a78a - https://git.kernel.org/stable/c/a7b717fa15165d3d9245614680bebc48a52ac05d - https://git.kernel.org/stable/c/9372fa1d73da5f1673921e365d0cd2c27ec7adc2 - https://git.kernel.org/stable/c/28b21c558a3753171097193b6f6602a94169093a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5571.
CVE ID: CVE-2024-5571 Date Updated: 2024-08-01T21:18:06.783Z Date Published: 2024-06-05T08:33:15.749Z Description: The EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute within the plugin's EmbedPress PDF widget in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/7becdab6-f952-4649-8cea-4efadf841619?source=cve - https://plugins.trac.wordpress.org/browser/embedpress/tags/4.0.0/EmbedPress/Elementor/Widgets/Embedpress_Pdf.php#L690 - https://plugins.trac.wordpress.org/changeset/3097114/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-25379.
CVE ID: CVE-2021-25379 Date Updated: 2024-08-03T20:03:05.863Z Date Published: 2021-04-09T17:40:06 Description: Intent redirection vulnerability in Gallery prior to version 5.4.16.1 allows attacker to execute privileged action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/ - https://security.samsungmobile.com/serviceWeb.smsb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-9173.
CVE ID: CVE-2018-9173 Date Updated: 2024-08-05T07:17:51.145Z Date Published: 2018-04-02T03:00:00 Description: Cross-site scripting (XSS) vulnerability in admin/template/js/uploadify/uploadify.swf in GetSimple CMS 3.3.13 allows remote attackers to inject arbitrary web script or HTML, as demonstrated by the movieName parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1266 - https://www.exploit-db.com/exploits/44408/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4304.
CVE ID: CVE-2017-4304 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17581.
CVE ID: CVE-2017-17581 Date Updated: 2024-08-05T20:51:32.372Z Date Published: 2017-12-13T09:00:00 Description: FS Quibids Clone 1.0 has SQL Injection via the itechd.php productid parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/43243/ - https://packetstormsecurity.com/files/145253/FS-Quibids-Clone-1.0-SQL-Injection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2773.
CVE ID: CVE-2017-2773 Date Updated: 2024-08-05T14:02:07.773Z Date Published: 2017-06-13T06:00:00 Description: An issue was discovered in Pivotal PCF Elastic Runtime 1.6.x versions prior to 1.6.60, 1.7.x versions prior to 1.7.41, 1.8.x versions prior to 1.8.23, and 1.9.x versions prior to 1.9.1. Incomplete validation logic in JSON Web Token (JWT) libraries can allow unprivileged attackers to impersonate other users in multiple components included in PCF Elastic Runtime, aka an "Unauthenticated JWT signing algorithm in multiple components" issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/97135 - https://pivotal.io/security/cve-2017-2773 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7526.
CVE ID: CVE-2017-7526 Date Updated: 2024-08-05T16:04:11.873Z Date Published: 2018-07-26T13:00:00 Description: libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://usn.ubuntu.com/3733-1/ - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526 - http://www.securitytracker.com/id/1038915 - https://www.debian.org/security/2017/dsa-3960 - https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=78130828e9a140a9de4dafadbc844dbb64cb709a - https://www.debian.org/security/2017/dsa-3901 - https://usn.ubuntu.com/3733-2/ - https://eprint.iacr.org/2017/627 - http://www.securityfocus.com/bid/99338 - https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html - https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=e6a3dc9900433bbc8ad362a595a3837318c28fa9 - https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=8725c99ffa41778f382ca97233183bcd687bb0ce No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4845.
CVE ID: CVE-2015-4845 Date Updated: 2024-08-06T06:25:21.941Z Date Published: 2015-10-21T23:00:00 Description: Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.3, and 12.2.4 allows remote attackers to affect confidentiality via vectors related to Java APIs - AOL/J. NOTE: the previous information is from the October 2015 CPU. Oracle has not commented on third-party claims that this issue allows remote attackers to enumerate database users via a series of requests to Aoljtest.js. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1033877 - http://www.securityfocus.com/archive/1/536770/100/0/threaded - https://erpscan.io/advisories/erpscan-15-025-oracle-e-business-suite-database-user-enumeration-vulnerability/ - http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html - http://www.securityfocus.com/bid/77249 - http://seclists.org/fulldisclosure/2015/Oct/97 - http://packetstormsecurity.com/files/134098/Oracle-E-Business-Suite-12.2.4-Database-User-Enumeration.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29872.
CVE ID: CVE-2021-29872 Date Updated: 2024-09-16T19:56:13.182Z Date Published: 2022-01-18T16:50:10.770490Z Description: IBM Cloud Pak for Automation 21.0.1 and 21.0.2 - Business Automation Studio Component is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. By sending a specially crafted HTTP request, a remote attacker could exploit this vulnerability to inject HTTP HOST header, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 206228. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6541294 - https://exchange.xforce.ibmcloud.com/vulnerabilities/206228 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2570.
CVE ID: CVE-2010-2570 Date Updated: 2024-08-07T02:39:37.320Z Date Published: 2010-12-16T19:00:00 Description: Heap-based buffer overflow in pubconv.dll (aka the Publisher Converter DLL) in Microsoft Publisher 2002 SP3, 2003 SP3, 2007 SP2, and 2010 allows remote attackers to execute arbitrary code via a crafted Publisher file that uses an old file format, aka "Heap Overrun in pubconv.dll Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.us-cert.gov/cas/techalerts/TA10-348A.html - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-103 - http://www.securitytracker.com/id?1024885 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12187 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-5018.
CVE ID: CVE-2020-5018 Date Updated: 2024-09-16T22:30:37.725Z Date Published: 2021-01-08T19:10:23.709979Z Description: IBM Spectrum Protect Plus 10.1.0 through 10.1.6 may include sensitive information in its URLs increasing the risk of such information being caputured by an attacker. IBM X-Force ID: 193654. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6398754 - https://exchange.xforce.ibmcloud.com/vulnerabilities/193654 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14590.
CVE ID: CVE-2018-14590 Date Updated: 2024-08-05T09:29:51.700Z Date Published: 2018-07-24T16:00:00 Description: An issue has been discovered in Bento4 1.5.1-624. A SEGV can occur in AP4_Processor::ProcessFragments in Core/Ap4Processor.cpp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/axiomatic-systems/Bento4/issues/305 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10413.
CVE ID: CVE-2019-10413 Date Updated: 2024-08-04T22:24:17.504Z Date Published: 2019-09-25T15:05:33 Description: Jenkins Data Theorem: CI/CD Plugin 1.3 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1557 - http://www.openwall.com/lists/oss-security/2019/09/25/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1190
The MITRE ATT&CK technique T1190: Exploit Public-Facing Application is related to the vulnerability CVE-CVE-2019-3723. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as exploitation_technique.
Provide detailed information about CVE-2020-7980.
CVE ID: CVE-2020-7980 Date Updated: 2024-08-04T09:48:24.842Z Date Published: 2020-01-25T18:44:51 Description: Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sku11army.blogspot.com/2020/01/intellian-aptus-web-rce-intellian.html - https://github.com/Xh4H/Satellian-CVE-2020-7980 - http://packetstormsecurity.com/files/156143/Satellian-1.12-Remote-Code-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7585.
CVE ID: CVE-2019-7585 Date Updated: 2024-08-04T20:54:28.257Z Date Published: 2019-02-07T18:00:00 Description: An issue was discovered in Waimai Super Cms 20150505. web/Lib/Action/PublicAction.class.php allows time-based SQL Injection via the param array parameter to the /index.php?m=public&a=checkemail URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/caokang/waimai/issues/11 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23839.
CVE ID: CVE-2024-23839 Date Updated: 2024-08-15T19:30:14.320Z Date Published: 2024-02-26T15:48:16.120Z Description: Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.3, specially crafted traffic can cause a heap use after free if the ruleset uses the http.request_header or http.response_header keyword. The vulnerability has been patched in 7.0.3. To work around the vulnerability, avoid the http.request_header and http.response_header keywords. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/OISF/suricata/security/advisories/GHSA-qxj6-hr2p-mmc7 - https://github.com/OISF/suricata/commit/cd731fcaf42e5f7078c9be643bfa0cee2ad53e8f - https://redmine.openinfosecfoundation.org/issues/6657 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2062.
CVE ID: CVE-2015-2062 Date Updated: 2024-08-06T05:02:43.306Z Date Published: 2020-02-08T17:08:14 Description: Multiple SQL injection vulnerabilities in the Huge-IT Slider (slider-image) plugin before 2.7.0 for WordPress allow remote administrators to execute arbitrary SQL commands via the removeslide parameter in a popup_posts or edit_cat action in the sliders_huge_it_slider page to wp-admin/admin.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/130796/WordPress-Huge-IT-Slider-2.6.8-SQL-Injection.html - https://www.htbridge.com/advisory/HTB23250 - http://www.securityfocus.com/archive/1/archive/1/534852/100/0/threaded - https://wordpress.org/support/topic/huge-it-slider-security-vulnerability-notification-sql-injection No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0438.
CVE ID: CVE-2014-0438 Date Updated: 2024-08-06T09:13:10.653Z Date Published: 2014-01-15T02:50:00 Description: Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.52 and 8.53 allows remote authenticated users to affect confidentiality via unknown vectors related to Panel Processor. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/64887 - http://osvdb.org/102043 - http://secunia.com/advisories/56478 - http://www.securitytracker.com/id/1029623 - http://www.securityfocus.com/bid/64758 - http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2549.
CVE ID: CVE-2019-2549 Date Updated: 2024-10-02T15:51:32.856Z Date Published: 2019-01-16T19:00:00 Description: Vulnerability in the Oracle FLEXCUBE Direct Banking component of Oracle Financial Services Applications (subcomponent: Logoff Page). The supported version that is affected is 12.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Direct Banking. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle FLEXCUBE Direct Banking, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Direct Banking accessible data as well as unauthorized read access to a subset of Oracle FLEXCUBE Direct Banking accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/106613 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5480.
CVE ID: CVE-2019-5480 Date Updated: 2024-08-04T19:54:53.591Z Date Published: 2019-09-03T19:19:00 Description: A path traversal vulnerability in <= v0.9.7 of statichttpserver npm module allows attackers to list files in arbitrary folders. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/570035 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-29166.
CVE ID: CVE-2022-29166 Date Updated: 2024-08-03T06:17:54.170Z Date Published: 2022-05-05T23:05:14 Description: matrix-appservice-irc is a Node.js IRC bridge for Matrix. The vulnerability in node-irc allows an attacker to manipulate a Matrix user into executing IRC commands by having them reply to a maliciously crafted message. The vulnerability has been patched in matrix-appservice-irc 0.33.2. Refrain from replying to messages from untrusted participants in IRC-bridged Matrix rooms. There are no known workarounds for this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-37hr-348p-rmf4 - https://matrix.org/blog/2022/05/04/0-34-0-security-release-for-matrix-appservice-irc-high-severity No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0108.
CVE ID: CVE-2021-0108 Date Updated: 2024-08-03T15:32:09.221Z Date Published: 2021-06-09T19:04:58 Description: Uncontrolled search path in the Intel Unite(R) Client for Windows before version 4.2.25031 may allow an authenticated user to potentially enable an escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00506.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-23380.
CVE ID: CVE-2022-23380 Date Updated: 2024-08-03T03:43:45.786Z Date Published: 2022-03-01T13:12:07 Description: There is a SQL injection vulnerability in the background of taocms 3.0.2 in parameter id:action=admin&id=2&ctrl=edit. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/taogogo/taocms/issues/16 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26828.
CVE ID: CVE-2022-26828 Date Updated: 2024-08-03T05:11:45.340Z Date Published: 2022-04-15T19:05:21 Description: Windows Bluetooth Driver Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26828 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15896.
CVE ID: CVE-2018-15896 Date Updated: 2024-08-05T10:10:05.130Z Date Published: 2018-08-28T21:00:00 Description: PHP Scripts Mall Website Seller Script 2.0.5 has XSS via Personal Address or Company Name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gkaim.com/cve-2018-15896-vikas-chaudhary/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26972.
CVE ID: CVE-2024-26972 Date Updated: 2024-08-02T00:21:05.922Z Date Published: 2024-05-01T05:20:04.669Z Description: In the Linux kernel, the following vulnerability has been resolved: ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path For error handling path in ubifs_symlink(), inode will be marked as bad first, then iput() is invoked. If inode->i_link is initialized by fscrypt_encrypt_symlink() in encryption scenario, inode->i_link won't be freed by callchain ubifs_free_inode -> fscrypt_free_inode in error handling path, because make_bad_inode() has changed 'inode->i_mode' as 'S_IFREG'. Following kmemleak is easy to be reproduced by injecting error in ubifs_jnl_update() when doing symlink in encryption scenario: unreferenced object 0xffff888103da3d98 (size 8): comm "ln", pid 1692, jiffies 4294914701 (age 12.045s) backtrace: kmemdup+0x32/0x70 __fscrypt_encrypt_symlink+0xed/0x1c0 ubifs_symlink+0x210/0x300 [ubifs] vfs_symlink+0x216/0x360 do_symlinkat+0x11a/0x190 do_syscall_64+0x3b/0xe0 There are two ways fixing it: 1. Remove make_bad_inode() in error handling path. We can do that because ubifs_evict_inode() will do same processes for good symlink inode and bad symlink inode, for inode->i_nlink checking is before is_bad_inode(). 2. Free inode->i_link before marking inode bad. Method 2 is picked, it has less influence, personally, I think. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/62b5ae00c2b835639002ce898ccb5d82c51073ae - https://git.kernel.org/stable/c/6379b44cdcd67f5f5d986b73953e99700591edfa No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11342.
CVE ID: CVE-2018-11342 Date Updated: 2024-08-05T08:01:52.884Z Date Published: 2018-05-22T01:00:00 Description: A path traversal vulnerability in fileExplorer.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to arbitrarily specify a path to a file on the system to create folders via the dest_folder parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.purehacking.com/blog/matthew-fulton/back-to-the-future-asustor-web-exploitation - https://github.com/mefulton/asustorexploit - http://seclists.org/fulldisclosure/2018/May/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-40832.
CVE ID: CVE-2024-40832 Date Updated: 2024-08-02T04:39:54.814Z Date Published: 2024-07-29T22:17:10.499Z Description: The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.6. An app may be able to view a contact's phone number in system logs. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT214119 - http://seclists.org/fulldisclosure/2024/Jul/18 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43527.
CVE ID: CVE-2021-43527 Date Updated: 2024-08-04T03:55:29.297Z Date Published: 2021-12-08T00:00:00 Description: NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2021-51/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1737470 - https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/ - https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/ - https://www.oracle.com/security-alerts/cpuapr2022.html - https://security.netapp.com/advisory/ntap-20211229-0002/ - https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf - https://www.starwindsoftware.com/security/sw-20220802-0001/ - https://security.gentoo.org/glsa/202212-05 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39667.
CVE ID: CVE-2021-39667 Date Updated: 2024-08-04T02:13:37.716Z Date Published: 2022-03-16T14:04:06 Description: In ih264d_parse_decode_slice of ih264d_parse_slice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-205702093 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2022-03-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7804.
CVE ID: CVE-2019-7804 Date Updated: 2024-08-04T21:02:17.933Z Date Published: 2019-05-22T15:01:17 Description: Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier version, 2017.011.30138 and earlier version, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-18.html - http://www.securityfocus.com/bid/108322 - https://www.zerodayinitiative.com/advisories/ZDI-19-628/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3328.
CVE ID: CVE-2014-3328 Date Updated: 2024-08-06T10:43:04.988Z Date Published: 2014-07-26T10:00:00 Description: The Intercluster Sync Agent Service in Cisco Unified Presence Server allows remote attackers to cause a denial of service via a TCP SYN flood, aka Bug ID CSCun34125. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/68901 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3328 - http://www.securitytracker.com/id/1030643 - https://exchange.xforce.ibmcloud.com/vulnerabilities/94879 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0211.
CVE ID: CVE-2008-0211 Date Updated: 2024-08-07T07:39:33.958Z Date Published: 2008-03-31T23:00:00 Description: Unspecified vulnerability in the BIOS F.04 through F.11 for the HP Compaq Business Notebook PC allows local users to cause a denial of service via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2008/1042/references - http://marc.info/?l=bugtraq&m=120672155821700&w=2 - http://www.securityfocus.com/bid/28494 - http://marc.info/?l=bugtraq&m=120672155821700&w=2 - https://exchange.xforce.ibmcloud.com/vulnerabilities/41520 - http://securitytracker.com/id?1019729 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18252.
CVE ID: CVE-2019-18252 Date Updated: 2024-08-05T01:47:14.154Z Date Published: 2020-06-29T13:58:25 Description: BIOTRONIK CardioMessenger II, The affected products allow credential reuse for multiple authentication purposes. An attacker with adjacent access to the CardioMessenger can disclose its credentials used for connecting to the BIOTRONIK Remote Communication infrastructure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.us-cert.gov/ics/advisories/icsma-20-170-05 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-21180.
CVE ID: CVE-2022-21180 Date Updated: 2024-08-03T02:31:59.118Z Date Published: 2022-06-15T20:04:21 Description: Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00645.html - http://www.openwall.com/lists/oss-security/2022/06/16/1 - https://security.netapp.com/advisory/ntap-20220624-0006/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2310.
CVE ID: CVE-2012-2310 Date Updated: 2024-09-16T19:19:04.250Z Date Published: 2012-07-25T21:00:00Z Description: Cross-site scripting (XSS) vulnerability in the cctags module for Drupal 6.x-1.x before 6.x-1.10 and 7.x-1.x before 7.x-1.10 allows remote authenticated users with certain roles to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://drupal.org/node/1508098 - http://www.openwall.com/lists/oss-security/2012/05/03/2 - http://drupal.org/node/1508100 - http://secunia.com/advisories/49018 - http://www.openwall.com/lists/oss-security/2012/05/03/1 - http://drupal.org/node/1558248 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0304.
CVE ID: CVE-2019-0304 Date Updated: 2024-08-04T17:44:16.439Z Date Published: 2019-06-12T14:21:39 Description: FTP Function of SAP NetWeaver AS ABAP Platform, versions- KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, allows an attacker to inject code or specifically manipulated command that can be executed by the application. An attacker could thereby control the behaviour of the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.support.sap.com/#/notes/2719530 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2365.
CVE ID: CVE-2017-2365 Date Updated: 2024-08-05T13:55:04.090Z Date Published: 2017-02-20T08:35:00 Description: An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/95727 - https://support.apple.com/HT207485 - https://www.exploit-db.com/exploits/41453/ - https://security.gentoo.org/glsa/201706-15 - https://support.apple.com/HT207484 - https://support.apple.com/HT207482 - http://www.securitytracker.com/id/1037668 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2942.
CVE ID: CVE-2019-2942 Date Updated: 2024-10-01T16:30:34.697Z Date Published: 2019-10-16T17:40:55 Description: Vulnerability in the Oracle Advanced Outbound Telephony product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4381.
CVE ID: CVE-2013-4381 Date Updated: 2024-09-17T02:57:18.005Z Date Published: 2013-10-21T18:00:00Z Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5370.
CVE ID: CVE-2013-5370 Date Updated: 2024-08-06T17:06:52.312Z Date Published: 2013-10-01T01:00:00 Description: Unspecified vulnerability in IBM SPSS Collaboration and Deployment Services 4.2.1 and 5.0 through FP2 allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-4042. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21651299 - http://www-01.ibm.com/support/docview.wss?uid=swg1PM95738 - https://exchange.xforce.ibmcloud.com/vulnerabilities/86658 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1321.
CVE ID: CVE-2017-1321 Date Updated: 2024-09-16T17:08:10.634Z Date Published: 2017-07-12T17:00:00Z Description: IBM InfoSphere Information Server 9.1, 11.3, and 11.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 125916. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=swg22004729 - http://www.securityfocus.com/bid/99537 - https://exchange.xforce.ibmcloud.com/vulnerabilities/125916 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12072.
CVE ID: CVE-2018-12072 Date Updated: 2024-08-05T08:24:03.665Z Date Published: 2018-06-17T20:00:00 Description: An issue was discovered in Cloud Media Popcorn A-200 03-05-130708-21-POP-411-000 firmware. It is configured to provide TELNET remote access (without a password) that pops a shell as root. If an attacker can connect to port 23 on the device, he can completely compromise it. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/freetom/2a446a226d0e98807c8b0c1111ef2def No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-44499.
CVE ID: CVE-2021-44499 Date Updated: 2024-08-04T04:25:16.896Z Date Published: 2022-04-15T17:45:29 Description: An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sourceforge.net/projects/fis-gtm/files/ - https://gitlab.com/YottaDB/DB/YDB/-/issues/828 - http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1833.
CVE ID: CVE-2015-1833 Date Updated: 2024-08-06T04:54:16.299Z Date Published: 2015-05-29T15:00:00 Description: XML external entity (XXE) vulnerability in Apache Jackrabbit before 2.0.6, 2.2.x before 2.2.14, 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before 2.8.1, and 2.10.x before 2.10.1 allows remote attackers to read arbitrary files and send requests to intranet servers via a crafted WebDAV request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2015/dsa-3298 - http://www.securityfocus.com/bid/74761 - https://www.exploit-db.com/exploits/37110/ - http://mail-archives.apache.org/mod_mbox/jackrabbit-announce/201505.mbox/%3C555DA644.8080908%40greenbytes.de%3E - http://www.securityfocus.com/archive/1/535582/100/0/threaded - http://www.apache.org/dist/jackrabbit/2.10.1/RELEASE-NOTES.txt - https://issues.apache.org/jira/browse/JCR-3883 - http://packetstormsecurity.com/files/132005/Jackrabbit-WebDAV-XXE-Injection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-5122.
CVE ID: CVE-2009-5122 Date Updated: 2024-08-07T07:32:22.229Z Date Published: 2012-08-23T10:00:00 Description: The Personal Email Manager component in Websense Email Security before 7.2 allows remote attackers to obtain potentially sensitive information from the JBoss status page via an unspecified query. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.websense.com/content/support/library/email/v72wes/release_notes/WES72_ReleaseNotes.pdf - https://exchange.xforce.ibmcloud.com/vulnerabilities/78449 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10451.
CVE ID: CVE-2016-10451 Date Updated: 2024-09-17T00:26:50.725Z Date Published: 2018-04-18T14:00:00Z Description: In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, and SDX20, privilege escalation may occur due to inherently insecure treatment of local files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2018-04-01 - http://www.securityfocus.com/bid/103671 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2669.
CVE ID: CVE-2009-2669 Date Updated: 2024-08-07T05:59:56.276Z Date Published: 2009-08-05T19:00:00 Description: A certain debugging component in IBM AIX 5.3 and 6.1 does not properly handle the (1) _LIB_INIT_DBG and (2) _LIB_INIT_DBG_FILE environment variables, which allows local users to gain privileges by leveraging a setuid-root program to create an arbitrary root-owned file with world-writable permissions, related to libC.a (aka the XL C++ runtime library) in AIX 5.3 and libc.a in AIX 6.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=isg1IZ54593 - http://www.ibm.com/support/docview.wss?uid=isg1IZ56204 - http://secunia.com/advisories/36156 - http://aix.software.ibm.com/aix/efixes/security/libC_advisory.asc - http://www.ibm.com/support/docview.wss?uid=isg1IZ56203 - http://www.ibm.com/support/docview.wss?uid=isg1IZ54090 - http://www.ibm.com/support/docview.wss?uid=isg1IZ54091 - http://www.securityfocus.com/bid/35934 - http://www.ibm.com/support/docview.wss?uid=isg1IZ56205 - http://www.vupen.com/english/advisories/2009/2151 - http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=815 - http://www.ibm.com/support/docview.wss?uid=isg1IZ56206 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-36947.
CVE ID: CVE-2021-36947 Date Updated: 2024-08-04T01:09:07.182Z Date Published: 2021-08-12T18:12:35 Description: Windows Print Spooler Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36947 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25841.
CVE ID: CVE-2024-25841 Date Updated: 2024-08-01T23:52:06.034Z Date Published: 2024-02-27T00:00:00 Description: In the module "So Flexibilite" (soflexibilite) from Common-Services for PrestaShop < 4.1.26, a guest (authenticated customer) can perform Cross Site Scripting (XSS) injection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://addons.prestashop.com/fr/transporteurs/2704-colissimo-domicile-et-points-de-retrait.html - https://security.friendsofpresta.org/modules/2024/02/27/soflexibilite.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2366.
CVE ID: CVE-2008-2366 Date Updated: 2024-08-07T08:58:02.116Z Date Published: 2008-06-16T18:26:00 Description: Untrusted search path vulnerability in a certain Red Hat build script for OpenOffice.org (OOo) 1.1.x on Red Hat Enterprise Linux (RHEL) 3 and 4 allows local users to gain privileges via a malicious library in the current working directory, related to incorrect quoting of the ORIGIN symbol for use in the RPATH library path. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=450532 - http://secunia.com/advisories/30633 - http://www.securityfocus.com/bid/29695 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11361 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43322 - http://www.redhat.com/support/errata/RHSA-2008-0538.html - http://securitytracker.com/id?1020278 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22914.
CVE ID: CVE-2022-22914 Date Updated: 2024-08-03T03:28:42.459Z Date Published: 2022-02-17T20:50:36 Description: An incorrect access control issue in the component FileManager of Ovidentia CMS 6.0 allows authenticated attackers to to view and download content in the upload directory via path traversal. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://ovidentia.com - https://gitlab.com/albadotpy/ovidentia-information-disclosure-on-upload-directory-content No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-8890.
CVE ID: CVE-2024-8890 Date Updated: 2024-09-18T14:36:22.074Z Date Published: 2024-09-18T13:03:31.453Z Description: An attacker with access to the network where the CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could obtain legitimate credentials or steal sessions due to the fact that the device only implements the HTTP protocol. This fact prevents a secure communication channel from being established. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43662.
CVE ID: CVE-2022-43662 Date Updated: 2024-08-03T13:40:05.648Z Date Published: 2023-01-09T02:23:02.577Z Description: Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2022/2022-12.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-35982.
CVE ID: CVE-2021-35982 Date Updated: 2024-09-16T19:30:38.219Z Date Published: 2021-09-29T15:36:38.931877Z Description: Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Uncontrolled Search Path Element vulnerability. A local attacker with non-administrative privileges can plant a malicious DLL to achieve arbitrary code execution in the context of the current user via DLL hijacking. Exploitation of this issue requires user interaction. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb21-55.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4602.
CVE ID: CVE-2022-4602 Date Updated: 2024-08-03T01:41:45.769Z Date Published: 2022-12-18T00:00:00 Description: A vulnerability was found in Shoplazza LifeStyle 1.1. It has been rated as problematic. This issue affects some unknown processing of the file /admin/api/theme-edit/ of the component Review Flow Handler. The manipulation of the argument Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-216197 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://seclists.org/fulldisclosure/2022/Dec/11 - https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt - https://vuldb.com/?id.216197 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1003075.
CVE ID: CVE-2019-1003075 Date Updated: 2024-08-05T03:07:17.907Z Date Published: 2019-04-04T15:38:48 Description: Jenkins Audit to Database Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/107790 - http://www.openwall.com/lists/oss-security/2019/04/12/2 - https://jenkins.io/security/advisory/2019-04-03/#SECURITY-966 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6357.
CVE ID: CVE-2016-6357 Date Updated: 2024-08-06T01:29:19.255Z Date Published: 2016-10-28T10:00:00 Description: A vulnerability in the configured security policies, including drop email filtering, in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass a configured drop filter by using an email with a corrupted attachment. More Information: CSCuz01651. Known Affected Releases: 10.0.9-015 9.7.1-066 9.9.6-026. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa5 - http://www.securityfocus.com/bid/93909 - http://www.securitytracker.com/id/1037114 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3909.
CVE ID: CVE-2020-3909 Date Updated: 2024-08-04T07:52:20.628Z Date Published: 2020-04-01T17:53:04 Description: A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Multiple issues in libxml2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT211100 - https://support.apple.com/HT211102 - https://support.apple.com/HT211101 - https://support.apple.com/HT211103 - https://support.apple.com/HT211105 - https://support.apple.com/HT211106 - https://support.apple.com/HT211107 - https://www.oracle.com/security-alerts/cpuoct2020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1374.
CVE ID: CVE-2020-1374 Date Updated: 2024-08-04T06:32:01.169Z Date Published: 2020-07-14T22:54:17 Description: A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server, aka 'Remote Desktop Client Remote Code Execution Vulnerability'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1374 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4737.
CVE ID: CVE-2008-4737 Date Updated: 2024-09-17T03:02:40.791Z Date Published: 2008-10-24T10:00:00Z Description: Cross-site scripting (XSS) vulnerability in wholite.cgi in WhoDomLite 1.1.3 allows remote attackers to inject arbitrary web script or HTML via the dom parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32085 - http://www.osvdb.org/48630 - http://yee7.com/forums/showthread.php?p=8021 - http://www.tryag.com/cc/showthread.php?t=27577 - http://www.securityfocus.com/bid/31436 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3912.
CVE ID: CVE-2015-3912 Date Updated: 2024-08-06T05:56:16.117Z Date Published: 2015-05-21T19:00:00 Description: Huawei E355s Mobile WiFi with firmware before 22.158.45.02.625 and WEBUI before 13.100.04.01.625 allows remote attackers to obtain sensitive configuration information by sniffing the network or sending unspecified commands. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-425435.htm - http://www.securityfocus.com/bid/74397 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6037.
CVE ID: CVE-2012-6037 Date Updated: 2024-08-06T21:21:28.357Z Date Published: 2012-11-24T20:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Mahara 1.4.x before 1.4.5 and 1.5.x before 1.5.4, and other versions including 1.2, allow remote attackers to inject arbitrary web script or HTML via a CSV header with "unknown fields," which are not properly handled in error messages in the (1) bulk user, (2) group, and (3) group member upload capabilities. NOTE: this issue was originally part of CVE-2012-2243, but that ID was SPLIT due to different issues by different researchers. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mahara.org/interaction/forum/topic.php?id=4937 - http://www.debian.org/security/2012/dsa-2591 - https://bugs.launchpad.net/mahara/+bug/1063480 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39096.
CVE ID: CVE-2023-39096 Date Updated: 2024-08-02T18:02:06.154Z Date Published: 2023-08-03T00:00:00 Description: WebBoss.io CMS v3.7.0.1 contains a stored Cross-Site Scripting (XSS) vulnerability due to lack of input validation and output encoding. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.realinfosec.net/advisories/WEBBOSS-P-XSS-2023-0xt2tt.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.