instruction
stringlengths 49
63
⌀ | input
stringlengths 0
69
| output
stringlengths 221
18.7k
|
|---|---|---|
Provide detailed information about CVE-2019-5759.
|
CVE ID: CVE-2019-5759
Date Updated: 2024-08-04T20:01:52.146Z
Date Published: 2019-02-19T17:00:00
Description:
Incorrect lifetime handling in HTML select elements in Google Chrome on Android and Mac prior to 72.0.3626.81 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/106767
- https://access.redhat.com/errata/RHSA-2019:0309
- https://www.debian.org/security/2019/dsa-4395
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://crbug.com/912211
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2009-1670.
|
CVE ID: CVE-2009-1670
Date Updated: 2024-08-07T05:20:35.192Z
Date Published: 2009-05-18T18:00:00
Description:
user/index.php in TCPDB 3.8 does not require administrative authentication, which allows remote attackers to add admin accounts via unspecified vectors. NOTE: some of these details are obtained from third party information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/34866
- https://www.exploit-db.com/exploits/8626
- http://secunia.com/advisories/34966
- http://osvdb.org/54282
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50371
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-2468.
|
CVE ID: CVE-2013-2468
Date Updated: 2024-08-06T15:36:46.621Z
Date Published: 2013-06-18T22:00:00
Description:
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2466.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://rhn.redhat.com/errata/RHSA-2013-1060.html
- http://marc.info/?l=bugtraq&m=137545592101387&w=2
- https://access.redhat.com/errata/RHSA-2014:0414
- http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19478
- http://marc.info/?l=bugtraq&m=137545505800971&w=2
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html
- http://secunia.com/advisories/54154
- http://rhn.redhat.com/errata/RHSA-2013-1455.html
- http://rhn.redhat.com/errata/RHSA-2013-1059.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19605
- http://www-01.ibm.com/support/docview.wss?uid=swg21644197
- http://www.us-cert.gov/ncas/alerts/TA13-169A
- http://rhn.redhat.com/errata/RHSA-2013-0963.html
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html
- http://rhn.redhat.com/errata/RHSA-2013-1456.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17206
- http://www.securityfocus.com/bid/60637
- http://www-01.ibm.com/support/docview.wss?uid=swg21642336
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-0637.
|
CVE ID: CVE-2020-0637
Date Updated: 2024-08-04T06:11:04.594Z
Date Published: 2020-01-14T23:11:35
Description:
An information disclosure vulnerability exists when Remote Desktop Web Access improperly handles credential information, aka 'Remote Desktop Web Access Information Disclosure Vulnerability'.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0637
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-25727.
|
CVE ID: CVE-2022-25727
Date Updated: 2024-08-03T04:49:42.821Z
Date Published: 2022-11-15T00:00:00
Description:
Memory Corruption in modem due to improper length check while copying into memory in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/november-2022-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-9007.
|
CVE ID: CVE-2018-9007
Date Updated: 2024-08-05T07:10:47.339Z
Date Published: 2018-03-25T03:00:00
Description:
In Advanced SystemCare Ultimate 11.0.1.58, the driver file (Monitor_x86.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c4060c4.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/D0neMkj/POC_BSOD/tree/master/Advanced%20SystemCare%20Utimate/Monitor_win7_x86.sys-0x9c4060c4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-1681.
|
CVE ID: CVE-2020-1681
Date Updated: 2024-09-16T16:13:35.639Z
Date Published: 2020-10-16T20:31:34.966071Z
Description:
Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device running Juniper Networks Junos OS Evolved can cause the ndp process to crash, resulting in a Denial of Service (DoS). The process automatically restarts without intervention, but a continuous receipt of the malformed NDP packets could leaded to an extended Denial of Service condition. During this time, IPv6 neighbor learning will be affected. The issue occurs when parsing the incoming malformed NDP packet. Rather than simply discarding the packet, the process asserts, performing a controlled exit and restart, thereby avoiding any chance of an unhandled exception. Exploitation of this vulnerability is limited to a temporary denial of service, and cannot be leveraged to cause additional impact on the system. This issue is limited to the processing of IPv6 NDP packets. IPv4 packet processing cannot trigger, and is unaffected by this vulnerability. This issue affects all Juniper Networks Junos OS Evolved versions prior to 20.1R2-EVO. Junos OS is unaffected by this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.juniper.net/JSA11078
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-7047.
|
CVE ID: CVE-2015-7047
Date Updated: 2024-08-06T07:36:35.317Z
Date Published: 2015-12-11T11:00:00
Description:
The kernel in Apple iOS before 9.2, OS X before 10.11.2, tvOS before 9.1, and watchOS before 2.1 allows local users to gain privileges via a crafted mach message that is misparsed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/HT205635
- https://support.apple.com/HT205637
- http://www.securitytracker.com/id/1034344
- http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html
- https://www.exploit-db.com/exploits/39371/
- https://www.exploit-db.com/exploits/39373/
- http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html
- http://www.securityfocus.com/bid/78719
- http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html
- https://support.apple.com/HT205641
- https://support.apple.com/HT205640
- https://www.exploit-db.com/exploits/39374/
- http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html
- https://www.exploit-db.com/exploits/39375/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-37701.
|
CVE ID: CVE-2021-37701
Date Updated: 2024-08-04T01:23:01.526Z
Date Published: 2021-08-31T00:00:00
Description:
The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.npmjs.com/package/tar
- https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.debian.org/security/2021/dsa-5008
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-5150.
|
CVE ID: CVE-2019-5150
Date Updated: 2024-08-04T19:47:56.603Z
Date Published: 2019-10-31T19:32:12
Description:
An exploitable SQL injection vulnerability exist in YouPHPTube 7.7. When the "VideoTags" plugin is enabled, a specially crafted unauthenticated HTTP request can cause a SQL injection, possibly leading to denial of service, exfiltration of the database and local file inclusion, which could potentially further lead to code execution. An attacker can send an HTTP request to trigger this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0940
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
null |
Describe the vulnerability CVE-CVE-2019-1753
|
CVE-CVE-2019-1753 is a vulnerability in Cisco IOS XE Software. It is related to the MITRE ATT&CK technique T1190: Exploit Public-Facing Application. The vulnerability is classified as a exploitation_technique type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2019 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
|
Provide detailed information about CVE-2012-0218.
|
CVE ID: CVE-2012-0218
Date Updated: 2024-08-06T18:16:19.768Z
Date Published: 2012-12-03T21:00:00
Description:
Xen 3.4, 4.0, and 4.1, when the guest OS has not registered a handler for a syscall or sysenter instruction, does not properly clear a flag for exception injection when injecting a General Protection Fault, which allows local PV guest OS users to cause a denial of service (guest crash) by later triggering an exception that would normally be handled within Xen.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://www.debian.org/security/2012/dsa-2501
- http://lists.xen.org/archives/html/xen-announce/2012-06/msg00003.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-4109.
|
CVE ID: CVE-2017-4109
Date Updated: 2018-03-16T13:57:01
Date Published: 2018-03-16T14:04:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-26413.
|
CVE ID: CVE-2023-26413
Date Updated: 2024-08-02T11:46:24.496Z
Date Published: 2023-04-13T00:00:00
Description:
Adobe Substance 3D Designer version 12.4.0 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/substance3d_designer/apsb23-28.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-2460.
|
CVE ID: CVE-2024-2460
Date Updated: 2024-08-05T19:26:58.394Z
Date Published: 2024-03-20T02:35:41.153Z
Description:
The GamiPress – Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gamipress_button' shortcode in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/af39e563-5d88-460d-b02d-1aaa111c89dd?source=cve
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3051778%40gamipress-button&new=3051778%40gamipress-button&sfp_email=&sfph_mail=
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-34610.
|
CVE ID: CVE-2022-34610
Date Updated: 2024-08-03T09:15:15.614Z
Date Published: 2022-07-20T13:41:21
Description:
H3C Magic R200 R200V200R004L02 was discovered to contain a stack overflow via the URL /ihomers/app.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/Darry-lang1/vuln/tree/main/H3C/12
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-1402.
|
CVE ID: CVE-2013-1402
Date Updated: 2024-09-17T00:52:18.845Z
Date Published: 2013-02-14T22:00:00Z
Description:
DigiLIBE 3.4 and possibly other versions sends a redirect but does not exit, which allows remote attackers to obtain sensitive configuration information via a direct request to configuration/general_configuration.html.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://archives.neohapsis.com/archives/bugtraq/2013-01/0095.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-0003.
|
CVE ID: CVE-2011-0003
Date Updated: 2024-08-06T21:36:02.223Z
Date Published: 2011-01-11T01:00:00
Description:
MediaWiki before 1.16.1, when user or site JavaScript or CSS is enabled, allows remote attackers to conduct clickjacking attacks via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2011/01/04/12
- http://www.vupen.com/english/advisories/2011/0017
- https://bugzilla.wikimedia.org/show_bug.cgi?id=26561
- http://www.osvdb.org/70272
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-January/000093.html
- http://www.openwall.com/lists/oss-security/2011/01/04/6
- http://secunia.com/advisories/42810
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64476
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-1787.
|
CVE ID: CVE-2019-1787
Date Updated: 2024-08-04T18:28:42.867Z
Date Published: 2019-04-08T19:10:16
Description:
A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12181
- https://security.gentoo.org/glsa/201904-12
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00019.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-9375.
|
CVE ID: CVE-2019-9375
Date Updated: 2024-08-04T21:46:30.464Z
Date Published: 2019-09-27T18:05:17
Description:
In hostapd, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-129344244
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/android-10
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-25144.
|
CVE ID: CVE-2023-25144
Date Updated: 2024-08-02T11:18:35.220Z
Date Published: 2023-03-07T22:19:31.521Z
Description:
An improper access control vulnerability in the Trend Micro Apex One agent could allow a local attacker to gain elevated privileges and create arbitrary directories with arbitrary ownership.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://success.trendmicro.com/solution/000292209
- https://www.zerodayinitiative.com/advisories/ZDI-23-171/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-16906.
|
CVE ID: CVE-2017-16906
Date Updated: 2024-08-05T20:35:21.350Z
Date Published: 2017-11-20T20:00:00
Description:
In Horde Groupware 5.2.19-5.2.22, there is XSS via the URL field in a "Calendar -> New Event" action.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html
- https://github.com/horde/kronolith/commit/09d90141292f9ec516a7a2007bf828ce2bbdf60d
- https://github.com/starnightcyber/Miscellaneous/blob/master/Horde/README.md
- https://lists.debian.org/debian-lts-announce/2020/08/msg00049.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-14111.
|
CVE ID: CVE-2019-14111
Date Updated: 2024-08-05T00:12:42.515Z
Date Published: 2020-04-16T10:46:15
Description:
Possible buffer overflow while handling NAN reception of NMF in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ6018, IPQ8074, Nicobar, QCA6390, QCA8081, QCN7605, QCS404, QCS405, Rennell, SC7180, SC8180X, SM6150, SM7150, SM8150, SXR2130
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-11452.
|
CVE ID: CVE-2018-11452
Date Updated: 2024-08-05T08:10:14.304Z
Date Published: 2018-07-23T21:00:00
Description:
A vulnerability has been identified in Firmware variant IEC 61850 for EN100 Ethernet module (All versions < V4.33), Firmware variant PROFINET IO for EN100 Ethernet module (All versions), Firmware variant Modbus TCP for EN100 Ethernet module (All versions), Firmware variant DNP3 TCP for EN100 Ethernet module (All versions), Firmware variant IEC104 for EN100 Ethernet module (All versions < V1.22). Specially crafted packets to port 102/tcp could cause a denial-of-service condition in the EN100 communication module if oscillographs are running. A manual restart is required to recover the EN100 module functionality. Successful exploitation requires an attacker with network access to send multiple packets to the EN100 module. As a precondition the IEC 61850-MMS communication needs to be activated on the affected EN100 modules. No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the network functionality of the device, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cert-portal.siemens.com/productcert/pdf/ssa-635129.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-325546.pdf
- https://www.securityfocus.com/bid/106221
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-6616.
|
CVE ID: CVE-2012-6616
Date Updated: 2024-09-16T23:32:10.062Z
Date Published: 2013-12-24T20:00:00Z
Description:
The mov_text_decode_frame function in libavcodec/movtextdec.c in FFmpeg before 1.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via crafted 3GPP TS 26.245 data.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=68e48ed72e0597ae61bc3e9e6e6d9edcb1a00073
- https://trac.ffmpeg.org/ticket/2087
- http://www.ffmpeg.org/security.html
- http://www.osvdb.org/93242
- http://secunia.com/advisories/51964
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-3912.
|
CVE ID: CVE-2024-3912
Date Updated: 2024-08-01T20:26:57.193Z
Date Published: 2024-06-14T09:29:00.161Z
Description:
Certain models of ASUS routers have an arbitrary firmware upload vulnerability. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary system commands on the device.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.twcert.org.tw/tw/cp-132-7875-872d3-1.html
- https://www.twcert.org.tw/en/cp-139-7876-396bd-2.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-31137.
|
CVE ID: CVE-2023-31137
Date Updated: 2024-08-02T14:45:25.771Z
Date Published: 2023-05-09T13:56:46.219Z
Description:
MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vulnerability in the DNS packet decompression function allows an attacker to cause a Denial of Service by triggering an abnormal program termination.
The vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file. When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass, if the `rdlength` is smaller than `rdata`, the result of the line `Decompress.c:886` is a negative number `len = rdlength - total;`. This value is then passed to the `decomp_append_bytes` function without proper validation, causing the program to attempt to allocate a massive chunk of memory that is impossible to allocate. Consequently, the program exits with an error code of 64, causing a Denial of Service.
One proposed fix for this vulnerability is to patch `Decompress.c:887` by breaking `if(len <= 0)`, which has been incorporated in version 3.5.0036 via commit bab062bde40b2ae8a91eecd522e84d8b993bab58.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c
- https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58
- https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/
- https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html
- https://www.debian.org/security/2023/dsa-5441
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-0976.
|
CVE ID: CVE-2020-0976
Date Updated: 2024-08-04T06:18:03.624Z
Date Published: 2020-04-15T15:13:11
Description:
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-0972, CVE-2020-0975, CVE-2020-0977.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0976
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-5137.
|
CVE ID: CVE-2014-5137
Date Updated: 2024-08-06T11:34:37.411Z
Date Published: 2014-09-02T14:00:00
Description:
Innovative Interfaces Sierra Library Services Platform 1.2_3 provides different responses for login request depending on whether the user account exists, which allows remote attackers to enumerate account names via a series of login requests, possibly related to the Webpac Pro submodule.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/archive/1/533267/100/0/threaded
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-1680.
|
CVE ID: CVE-2020-1680
Date Updated: 2024-09-17T00:55:30.460Z
Date Published: 2020-10-16T20:31:34.538089Z
Description:
On Juniper Networks MX Series with MS-MIC or MS-MPC card configured with NAT64 configuration, receipt of a malformed IPv6 packet may crash the MS-PIC component on MS-MIC or MS-MPC. This issue occurs when a multiservice card is translating the malformed IPv6 packet to IPv4 packet. An unauthenticated attacker can continuously send crafted IPv6 packets through the device causing repetitive MS-PIC process crashes, resulting in an extended Denial of Service condition. This issue affects Juniper Networks Junos OS on MX Series: 15.1 versions prior to 15.1R7-S7; 15.1X53 versions prior to 15.1X53-D593; 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S6; 17.4 versions prior to 17.4R2-S11, 17.4R3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D41, 18.2X75-D430, 18.2X75-D53, 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3; 18.4 versions prior to 18.4R2-S5, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.juniper.net/JSA11077
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-27775.
|
CVE ID: CVE-2022-27775
Date Updated: 2024-08-03T05:32:59.833Z
Date Published: 2022-06-01T00:00:00
Description:
An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://hackerone.com/reports/1546268
- https://security.netapp.com/advisory/ntap-20220609-0008/
- https://www.debian.org/security/2022/dsa-5197
- https://security.gentoo.org/glsa/202212-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-33995.
|
CVE ID: CVE-2022-33995
Date Updated: 2024-08-03T08:16:15.966Z
Date Published: 2022-06-21T14:37:46
Description:
A path traversal issue in entry attachments in Devolutions Remote Desktop Manager before 2022.2 allows attackers to create or overwrite files in an arbitrary location.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://devolutions.net
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-20300.
|
CVE ID: CVE-2022-20300
Date Updated: 2024-08-03T02:10:44.007Z
Date Published: 2022-08-11T15:21:27
Description:
In Content, there is a possible way to check if the given account exists on the device due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-200956588
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/android-13
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-35694.
|
CVE ID: CVE-2024-35694
Date Updated: 2024-08-02T03:14:53.819Z
Date Published: 2024-06-08T14:27:47.897Z
Description:
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPMobile.App allows Reflected XSS.This issue affects WPMobile.App: from n/a through 11.41.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/wpappninja/wordpress-wpmobile-app-plugin-11-41-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2009-3487.
|
CVE ID: CVE-2009-3487
Date Updated: 2024-09-16T18:29:08.561Z
Date Published: 2009-09-30T15:00:00Z
Description:
Multiple cross-site scripting (XSS) vulnerabilities in the J-Web interface in Juniper JUNOS 8.5R1.14 allow remote authenticated users to inject arbitrary web script or HTML via (1) the JEXEC_OUTID parameter in a JEXEC_MODE_RELAY_OUTPUT action to the jexec program; the (2) act, (3) refresh-time, or (4) ifid parameter to scripter.php; (5) the revision parameter in a rollback action to the configuration program; the m[] parameter to the (6) monitor, (7) manage, (8) events, (9) configuration, or (10) alarms program; (11) the m[] parameter to the default URI; (12) the m[] parameter in a browse action to the default URI; (13) the wizard-next parameter in an https action to the configuration program; or the (14) Contact Information, (15) System Description, (16) Local Engine ID, (17) System Location, or (18) System Name Override SNMP parameter, related to the configuration program.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2009/2784
- http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr09-10
- http://www.securityfocus.com/bid/36537
- http://secunia.com/advisories/36829
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-1446.
|
CVE ID: CVE-2024-1446
Date Updated: 2024-08-01T18:40:21.225Z
Date Published: 2024-05-22T06:50:33.049Z
Description:
The NextScripts: Social Networks Auto-Poster plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.4.3. This is due to missing or incorrect nonce validation on the nxssnap-reposter page. This makes it possible for unauthenticated attackers to delete arbitrary posts or pages via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/306b23ee-7dcb-4281-a218-21168998c4b9?source=cve
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3084635%40social-networks-auto-poster-facebook-twitter-g%2Ftrunk&old=3004433%40social-networks-auto-poster-facebook-twitter-g%2Ftrunk&sfp_email=&sfph_mail=#file17
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-5884.
|
CVE ID: CVE-2015-5884
Date Updated: 2024-08-06T07:06:33.922Z
Date Published: 2015-10-09T01:00:00
Description:
The Mail Drop feature in Mail in Apple OS X before 10.11 mishandles encryption parameters for attachments, which makes it easier for remote attackers to obtain sensitive information by sniffing the network during transmission of an S/MIME e-mail message with a large attachment.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1033703
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- https://support.apple.com/HT205267
- http://www.securityfocus.com/bid/76908
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-39724.
|
CVE ID: CVE-2021-39724
Date Updated: 2024-08-04T02:13:38.384Z
Date Published: 2022-03-16T14:03:52
Description:
In TuningProviderBase::GetTuningTreeSet of tuning_provider_base.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205753190References: N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/pixel/2022-03-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-2369.
|
CVE ID: CVE-2024-2369
Date Updated: 2024-08-01T19:11:53.453Z
Date Published: 2024-04-02T05:00:01.384Z
Description:
The Page Builder Gutenberg Blocks WordPress plugin before 3.1.7 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/252dfc35-4c8c-4304-aa09-73dfe986b10d/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-1268.
|
CVE ID: CVE-2016-1268
Date Updated: 2024-08-05T22:48:13.666Z
Date Published: 2016-04-15T14:00:00
Description:
The administrative web services interface in Juniper ScreenOS before 6.3.0r21 allows remote attackers to cause a denial of service (reboot) via a crafted SSL packet.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10732
- http://www.securitytracker.com/id/1035666
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-25446.
|
CVE ID: CVE-2024-25446
Date Updated: 2024-08-01T23:44:09.119Z
Date Published: 2024-02-09T00:00:00
Description:
An issue in the HuginBase::PTools::setDestImage function of Hugin v2022.0.0 allows attackers to cause a heap buffer overflow via parsing a crafted image.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugs.launchpad.net/hugin/+bug/2025037
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NAV7IMHCOIMBEIW42KM2QUJ4MDQLNW3Z/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-24132.
|
CVE ID: CVE-2021-24132
Date Updated: 2024-08-03T19:21:18.202Z
Date Published: 2021-03-18T14:57:48
Description:
The Slider by 10Web WordPress plugin, versions before 1.2.36, in the bulk_action, export_full and save_slider_db functionalities of the plugin were vulnerable, allowing a high privileged user (Admin), or medium one such as Contributor+ (if "Role Options" is turn on for other users) to perform a SQL Injection attacks.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-6342.
|
CVE ID: CVE-2020-6342
Date Updated: 2024-08-04T09:02:39.655Z
Date Published: 2020-09-09T12:44:17
Description:
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated U3D file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://launchpad.support.sap.com/#/notes/2960815
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700
- https://www.zerodayinitiative.com/advisories/ZDI-20-1152/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-2795.
|
CVE ID: CVE-2022-2795
Date Updated: 2024-09-17T03:03:19.543Z
Date Published: 2022-09-21T10:15:25.796304Z
Description:
By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.isc.org/docs/cve-2022-2795
- http://www.openwall.com/lists/oss-security/2022/09/21/3
- https://www.debian.org/security/2022/dsa-5235
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/
- https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html
- https://security.gentoo.org/glsa/202210-25
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-2155.
|
CVE ID: CVE-2019-2155
Date Updated: 2024-08-04T18:42:50.492Z
Date Published: 2019-09-27T18:05:12
Description:
In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117655547
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/android-10
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-9684.
|
CVE ID: CVE-2017-9684
Date Updated: 2024-09-16T18:29:29.646Z
Date Published: 2017-08-18T19:00:00Z
Description:
In all Qualcomm products with Android releases from CAF using the Linux kernel, a race condition in a USB driver can lead to a Use After Free condition.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/2017-06-01
- http://www.securityfocus.com/bid/100213
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-15877.
|
CVE ID: CVE-2017-15877
Date Updated: 2024-08-05T20:04:50.396Z
Date Published: 2017-12-18T17:00:00
Description:
Insecure Permissions vulnerability in db.php file in GPWeb 8.4.61 allows remote attackers to view the password and user database.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.augustopereira.com.br/blog/seguranca-gpweb-8-4-61-multiplas-falhas-sqli-manipulacao-de-privilegios-uploads-sem-restricoes-exposicao-de-informacao-sensivel
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-46153.
|
CVE ID: CVE-2021-46153
Date Updated: 2024-08-04T05:02:11.274Z
Date Published: 2022-02-09T15:17:16
Description:
A vulnerability has been identified in Simcenter Femap V2020.2 (All versions), Simcenter Femap V2021.1 (All versions). Affected application contains a memory corruption vulnerability while parsing NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14645, ZDI-CAN-15305, ZDI-CAN-15589, ZDI-CAN-15599)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cert-portal.siemens.com/productcert/pdf/ssa-609880.pdf
- https://www.zerodayinitiative.com/advisories/ZDI-22-299/
- https://www.zerodayinitiative.com/advisories/ZDI-22-300/
- https://www.zerodayinitiative.com/advisories/ZDI-22-297/
- https://www.zerodayinitiative.com/advisories/ZDI-22-298/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-2841.
|
CVE ID: CVE-2015-2841
Date Updated: 2024-08-06T05:24:38.887Z
Date Published: 2015-04-03T14:00:00
Description:
Citrix NetScaler AppFirewall, as used in NetScaler 10.5, allows remote attackers to bypass intended firewall restrictions via a crafted Content-Type header, as demonstrated by the application/octet-stream and text/xml Content-Types.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://securitytracker.com/id/1031928
- https://www.exploit-db.com/exploits/36369/
- http://seclists.org/fulldisclosure/2015/Mar/95
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-14668.
|
CVE ID: CVE-2020-14668
Date Updated: 2024-09-27T18:25:03.559Z
Date Published: 2020-07-15T17:34:33
Description:
Vulnerability in the Oracle E-Business Intelligence product of Oracle E-Business Suite (component: DBI Setups). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E-Business Intelligence. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle E-Business Intelligence, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle E-Business Intelligence accessible data as well as unauthorized update, insert or delete access to some of Oracle E-Business Intelligence accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpujul2020.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-48806.
|
CVE ID: CVE-2022-48806
Date Updated: 2024-09-11T17:34:13.770Z
Date Published: 2024-07-16T11:43:57.598Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX
Commit effa453168a7 ("i2c: i801: Don't silently correct invalid transfer
size") revealed that ee1004_eeprom_read() did not properly limit how
many bytes to read at once.
In particular, i2c_smbus_read_i2c_block_data_or_emulated() takes the
length to read as an u8. If count == 256 after taking into account the
offset and page boundary, the cast to u8 overflows. And this is common
when user space tries to read the entire EEPROM at once.
To fix it, limit each read to I2C_SMBUS_BLOCK_MAX (32) bytes, already
the maximum length i2c_smbus_read_i2c_block_data_or_emulated() allows.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/3937c35493ee2847aaefcfa5460e94b7443eef49
- https://git.kernel.org/stable/c/a37960df7eac3cc8094bd1ab84864e9e32c91345
- https://git.kernel.org/stable/c/9a5f471ae380f9fcb9756d453c12ca1f8595a93c
- https://git.kernel.org/stable/c/9443ddeb3754e9e382a396b50adc1961301713ce
- https://git.kernel.org/stable/c/c0689e46be23160d925dca95dfc411f1a0462708
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-25786.
|
CVE ID: CVE-2021-25786
Date Updated: 2024-08-03T20:11:28.412Z
Date Published: 2023-08-11T00:00:00
Description:
An issue was discovered in QPDF version 10.0.4, allows remote attackers to execute arbitrary code via crafted .pdf file to Pl_ASCII85Decoder::write parameter in libqpdf.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/qpdf/qpdf/issues/492
- https://lists.debian.org/debian-lts-announce/2023/08/msg00037.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-5344.
|
CVE ID: CVE-2016-5344
Date Updated: 2024-08-06T01:00:58.048Z
Date Published: 2016-08-30T17:00:00
Description:
Multiple integer overflows in the MDSS driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service or possibly have unspecified other impact via a large size value, related to mdss_compat_utils.c, mdss_fb.c, and mdss_rotator.c.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=1d2297267c24f2c44bd0ecb244ddb8bc880a29b7
- https://www.codeaurora.org/integer-overflow-mdss-driver-cve-2016-5344
- http://source.android.com/security/bulletin/2016-10-01.html
- http://www.securityfocus.com/bid/92695
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-33139.
|
CVE ID: CVE-2023-33139
Date Updated: 2024-10-02T16:39:30.480Z
Date Published: 2023-06-13T23:25:55.404Z
Description:
Visual Studio Information Disclosure Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33139
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-4733.
|
CVE ID: CVE-2018-4733
Date Updated: 2023-09-14T18:43:10.890Z
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-0083.
|
CVE ID: CVE-2013-0083
Date Updated: 2024-08-06T14:18:07.759Z
Date Published: 2013-03-13T00:00:00
Description:
Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via crafted content, leading to administrative command execution, aka "SharePoint XSS Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-024
- http://www.us-cert.gov/ncas/alerts/TA13-071A
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-4521.
|
CVE ID: CVE-2014-4521
Date Updated: 2024-08-06T11:20:26.032Z
Date Published: 2014-07-01T14:00:00
Description:
Cross-site scripting (XSS) vulnerability in client-assist.php in the dsIDXpress IDX plugin before 2.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the action parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://wordpress.org/plugins/dsidxpress/changelog
- http://codevigilant.com/disclosure/wp-plugin-dsidxpress-a3-cross-site-scripting-xss
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-33633.
|
CVE ID: CVE-2023-33633
Date Updated: 2024-08-02T15:47:06.468Z
Date Published: 2023-05-31T00:00:00
Description:
H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the UpdateWanParams interface at /goform/aspForm.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://hackmd.io/%400dayResearch/UpdateWanParams
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-20809.
|
CVE ID: CVE-2024-20809
Date Updated: 2024-08-01T22:06:36.226Z
Date Published: 2024-01-04T01:10:18.092Z
Description:
Improper access control vulnerability in Nearby device scanning prior version 11.1.14.7 allows local attacker to access data.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-4197.
|
CVE ID: CVE-2024-4197
Date Updated: 2024-08-01T20:33:52.976Z
Date Published: 2024-06-25T04:01:17.685Z
Description:
An unrestricted file upload vulnerability in Avaya IP Office was discovered that could allow remote command or code execution via the One-X component. Affected versions include all versions prior to 11.1.3.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://download.avaya.com/css/public/documents/101090768
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-40380.
|
CVE ID: CVE-2021-40380
Date Updated: 2024-08-04T02:44:09.568Z
Date Published: 2021-09-01T17:16:04
Description:
An issue was discovered on Compro IP70 2.08_7130218, IP570 2.08_7130520, IP60, and TN540 devices. cameralist.cgi and setcamera.cgi disclose credentials.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/icekam/0day/blob/main/Compro-Technology-Camera-has-multiple-vulnerabilities.md
- http://packetstormsecurity.com/files/164027/Compro-Technology-IP-Camera-Credential-Disclosure.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-41450.
|
CVE ID: CVE-2023-41450
Date Updated: 2024-09-23T20:31:53.619Z
Date Published: 2023-09-28T00:00:00
Description:
An issue in phpkobo AjaxNewsTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the reque parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://ajaxnewsticker.com
- http://phpkobo.com
- https://gist.github.com/RNPG/e11af10e1bd3606de8b568033d932589
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2008-7202.
|
CVE ID: CVE-2008-7202
Date Updated: 2024-09-17T04:25:33.719Z
Date Published: 2009-09-10T10:00:00Z
Description:
Multiple cross-site scripting (XSS) vulnerabilities in OpenWebMail before 2.53 (Stable) allow remote attackers to inject arbitrary web script or HTML via unknown vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://archives.neohapsis.com/archives/apps/freshmeat/2008-01/0032.html
- http://freshmeat.net/projects/openwebmail/releases/270453
- http://osvdb.org/40581
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-3890.
|
CVE ID: CVE-2010-3890
Date Updated: 2024-08-07T03:26:12.201Z
Date Published: 2010-11-12T20:00:00
Description:
Cross-site scripting (XSS) vulnerability in IBM OmniFind Enterprise Edition before 9.1 allows remote attackers to inject arbitrary web script or HTML via the command parameter to the administration interface, as demonstrated by the command parameter to ESAdmin/collection.do.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/archive/1/514688/100/0/threaded
- http://www.securityfocus.com/bid/44740
- http://security.fatihkilic.de/advisory/fkilic-sa-2010-ibm-omnifind.txt
- http://www.vupen.com/english/advisories/2010/2933
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-5620.
|
CVE ID: CVE-2019-5620
Date Updated: 2024-09-17T03:28:34.323Z
Date Published: 2020-04-29T22:15:27.966812Z
Description:
ABB MicroSCADA Pro SYS600 version 9.3 suffers from an instance of CWE-306: Missing Authentication for Critical Function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.rapid7.com/db/modules/exploit/windows/scada/abb_wserver_exec
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-5165.
|
CVE ID: CVE-2024-5165
Date Updated: 2024-08-01T21:03:11.075Z
Date Published: 2024-05-23T09:56:31.696Z
Description:
In Eclipse Ditto versions 3.0.0 to 3.5.5, the user input of several input fields of the Eclipse Ditto Explorer User Interface https://eclipse.dev/ditto/user-interface.html was not properly neutralized and thus vulnerable to both Reflected and Stored XSS (Cross Site Scripting).
Several inputs were not persisted at the backend of Eclipse Ditto, but only in local browser storage to save settings of "environments" of the UI and e.g. the last performed "search queries", resulting in a "Reflected XSS" vulnerability.
However, several other inputs were persisted at the backend of Eclipse Ditto, leading to a "Stored XSS" vulnerability. Those mean that authenticated and authorized users at Eclipse Ditto can persist Things in Ditto which can - when being displayed by other users also being authorized to see those Things in the Eclipse Ditto UI - cause scripts to be executed in the browser of other users.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gitlab.eclipse.org/security/cve-assignement/-/issues/23
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/211
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/210
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/209
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/207
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/204
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/202
- https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/201
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-9238.
|
CVE ID: CVE-2020-9238
Date Updated: 2024-08-04T10:19:20.063Z
Date Published: 2020-10-12T13:23:19
Description:
Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have a buffer overflow vulnerability. A function in a module does not verify inputs sufficiently. Attackers can exploit this vulnerability by sending specific request. This could compromise normal service of the affected device.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200930-01-bufferoverflow-en
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-0832.
|
CVE ID: CVE-2015-0832
Date Updated: 2024-08-06T04:26:11.059Z
Date Published: 2015-02-25T11:00:00
Description:
Mozilla Firefox before 36.0 does not properly recognize the equivalence of domain names with and without a trailing . (dot) character, which allows man-in-the-middle attackers to bypass the HPKP and HSTS protection mechanisms by constructing a URL with this character and leveraging access to an X.509 certificate for a domain with this character.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.mozilla.org/show_bug.cgi?id=1065909
- http://www.mozilla.org/security/announce/2015/mfsa2015-13.html
- http://www.securityfocus.com/bid/72752
- https://security.gentoo.org/glsa/201504-01
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html
- http://www.ubuntu.com/usn/USN-2505-1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-46199.
|
CVE ID: CVE-2023-46199
Date Updated: 2024-09-06T18:46:19.325Z
Date Published: 2023-10-27T07:47:58.267Z
Description:
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Triberr plugin <= 4.1.1 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/triberr-wordpress-plugin/wordpress-triberr-plugin-4-1-1-cross-site-scripting-xss?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-33681.
|
CVE ID: CVE-2022-33681
Date Updated: 2024-08-03T08:09:22.286Z
Date Published: 2022-09-23T09:25:13
Description:
Delayed TLS hostname verification in the Pulsar Java Client and the Pulsar Proxy make each client vulnerable to a man in the middle attack. Connections from the Pulsar Java Client to the Pulsar Broker/Proxy and connections from the Pulsar Proxy to the Pulsar Broker are vulnerable. Authentication data is sent before verifying the server’s TLS certificate matches the hostname, which means authentication data could be exposed to an attacker. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack by providing the client with a cryptographically valid certificate for an unrelated host. Because the client sends authentication data before performing hostname verification, an attacker could gain access to the client’s authentication data. The client eventually closes the connection when it verifies the hostname and identifies the targeted hostname does not match a hostname on the certificate. Because the client eventually closes the connection, the value of the intercepted authentication data depends on the authentication method used by the client. Token based authentication and username/password authentication methods are vulnerable because the authentication data can be used to impersonate the client in a separate session. This issue affects Apache Pulsar Java Client versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0; 2.6.4 and earlier.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.apache.org/thread/fpo6x10trvn20hlk0dmnr5vlz5v4kl3d
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-5529.
|
CVE ID: CVE-2018-5529
Date Updated: 2024-09-16T18:55:42.284Z
Date Published: 2018-07-12T18:00:00Z
Description:
The svpn component of the F5 BIG-IP APM client prior to version 7.1.7 for Linux and Mac OS X runs as a privileged process and can allow an unprivileged user to assume super-user privileges on the local client host. A malicious local unprivileged user may gain knowledge of sensitive information, manipulate certain data, or disrupt service.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/104730
- https://support.f5.com/csp/article/K52171282
- https://github.com/mirchr/security-research/blob/master/vulnerabilities/F5/CVE-2018-5529.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-36762.
|
CVE ID: CVE-2023-36762
Date Updated: 2024-08-02T17:01:07.879Z
Date Published: 2023-09-12T16:58:45.514Z
Description:
Microsoft Word Remote Code Execution Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36762
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-2208.
|
CVE ID: CVE-2012-2208
Date Updated: 2024-08-06T19:26:08.983Z
Date Published: 2012-08-14T22:00:00
Description:
Directory traversal vulnerability in upgrade.php in Piwigo before 2.3.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.exploit-db.com/exploits/18782
- http://piwigo.org/forum/viewtopic.php?id=19173
- https://www.htbridge.com/advisory/HTB23085
- http://piwigo.org/releases/2.3.4
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75185
- http://www.securityfocus.com/bid/53245
- http://secunia.com/advisories/48903
- http://piwigo.org/bugs/view.php?id=2607
- http://archives.neohapsis.com/archives/bugtraq/2012-04/0196.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-2157.
|
CVE ID: CVE-2020-2157
Date Updated: 2024-08-04T07:01:41.117Z
Date Published: 2020-03-09T15:01:05
Description:
Jenkins Skytap Cloud CI Plugin 2.07 and earlier transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1522
- http://www.openwall.com/lists/oss-security/2020/03/09/1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-5654.
|
CVE ID: CVE-2015-5654
Date Updated: 2024-08-06T06:59:03.704Z
Date Published: 2015-10-11T01:00:00
Description:
Cross-site scripting (XSS) vulnerability in Dojo Toolkit before 1.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/77026
- http://jvndb.jvn.jp/jvndb/JVNDB-2015-000153
- http://jvn.jp/en/jp/JVN13456571/index.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21975256
- http://www.securitytracker.com/id/1034848
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-36190.
|
CVE ID: CVE-2024-36190
Date Updated: 2024-08-02T03:30:13.164Z
Date Published: 2024-06-13T07:53:14.103Z
Description:
Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. Exploitation of this issue typically requires user interaction, such as convincing a user to click on a specially crafted link or to submit a form that triggers the vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-4321.
|
CVE ID: CVE-2021-4321
Date Updated: 2024-08-03T17:23:10.437Z
Date Published: 2023-07-28T23:26:53.981Z
Description:
Policy bypass in Blink in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html
- https://crbug.com/1161891
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-0398.
|
CVE ID: CVE-2016-0398
Date Updated: 2024-08-05T22:15:24.368Z
Date Published: 2016-07-02T14:00:00
Description:
IBM Cognos Analytics (CA) 11.0 before 11.0.2 allows remote attackers to conduct content-spoofing attacks via a crafted URL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg21977070
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-16892.
|
CVE ID: CVE-2018-16892
Date Updated: 2020-11-05T23:11:51
Date Published: 2020-11-05T23:11:51
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-13928.
|
CVE ID: CVE-2020-13928
Date Updated: 2024-08-04T12:32:14.230Z
Date Published: 2020-09-16T17:38:38
Description:
Apache Atlas before 2.1.0 contain a XSS vulnerability. While saving search or rendering elements values are not sanitized correctly and because of that it triggers the XSS vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.apache.org/thread.html/ra468036f913be41b0c8fea74f91d53e273b0bfa838a4b140a5dcd463%40%3Cuser.atlas.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-3001.
|
CVE ID: CVE-2010-3001
Date Updated: 2024-08-07T02:55:46.384Z
Date Published: 2010-08-30T19:00:00
Description:
Unspecified vulnerability in an ActiveX control in the Internet Explorer (IE) plugin in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows has unknown impact and attack vectors related to "multiple browser windows."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2010/2216
- http://secunia.com/advisories/41096
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61424
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7507
- http://service.real.com/realplayer/security/08262010_player/en/
- http://www.securitytracker.com/id?1024370
- http://secunia.com/advisories/41154
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-7528.
|
CVE ID: CVE-2024-7528
Date Updated: 2024-08-09T15:10:55.362Z
Date Published: 2024-08-06T12:38:14.946Z
Description:
Incorrect garbage collection interaction in IndexedDB could have led to a use-after-free. This vulnerability affects Firefox < 129, Firefox ESR < 128.1, and Thunderbird < 128.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.mozilla.org/show_bug.cgi?id=1895951
- https://www.mozilla.org/security/advisories/mfsa2024-33/
- https://www.mozilla.org/security/advisories/mfsa2024-35/
- https://www.mozilla.org/security/advisories/mfsa2024-37/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-4444.
|
CVE ID: CVE-2017-4444
Date Updated: 2018-03-16T13:57:01
Date Published: 2018-03-16T14:04:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-0895.
|
CVE ID: CVE-2019-0895
Date Updated: 2024-08-04T17:58:59.910Z
Date Published: 2019-05-16T18:17:01
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0889, CVE-2019-0890, CVE-2019-0891, CVE-2019-0893, CVE-2019-0894, CVE-2019-0896, CVE-2019-0897, CVE-2019-0898, CVE-2019-0899, CVE-2019-0900, CVE-2019-0901, CVE-2019-0902.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0895
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-8833.
|
CVE ID: CVE-2019-8833
Date Updated: 2024-08-04T21:31:37.509Z
Date Published: 2020-10-27T19:54:46
Description:
A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.3 and iPadOS 13.3, watchOS 6.1.1, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, tvOS 13.3. An application may be able to execute arbitrary code with kernel privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT210785
- https://support.apple.com/en-us/HT210788
- https://support.apple.com/en-us/HT210789
- https://support.apple.com/en-us/HT210790
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-37469.
|
CVE ID: CVE-2023-37469
Date Updated: 2024-10-02T18:26:44.156Z
Date Published: 2023-08-24T22:12:10.234Z
Description:
CasaOS is an open-source personal cloud system. Prior to version 0.4.4, if an authenticated user using CasaOS is able to successfully connect to a controlled SMB server, they are able to execute arbitrary commands. Version 0.4.4 contains a patch for the issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://securitylab.github.com/advisories/GHSL-2022-119_CasaOS/
- https://github.com/IceWhaleTech/CasaOS/commit/af440eac5563644854ff33f72041e52d3fd1f47c
- https://github.com/IceWhaleTech/CasaOS/blob/96e92842357230098c771bc41fd3baf46189b859/route/v1/samba.go#L121
- https://github.com/IceWhaleTech/CasaOS/blob/96e92842357230098c771bc41fd3baf46189b859/service/connections.go#L58
- https://github.com/IceWhaleTech/CasaOS/releases/tag/v0.4.4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-0418.
|
CVE ID: CVE-2020-0418
Date Updated: 2024-08-04T06:02:52.127Z
Date Published: 2020-11-10T12:47:40
Description:
In getPermissionInfosForGroup of Utils.java, there is a logic error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153879813
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/2020-11-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-24681.
|
CVE ID: CVE-2024-24681
Date Updated: 2024-08-01T23:28:11.066Z
Date Published: 2024-02-23T00:00:00
Description:
An issue was discovered in Yealink Configuration Encrypt Tool (AES version) and Yealink Configuration Encrypt Tool (RSA version before 1.2). There is a single hardcoded key (used to encrypt provisioning documents) across customers' installations.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/gitaware/CVE/tree/main/CVE-2024-24681
- https://seclists.org/fulldisclosure/2024/Feb/22
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-2232.
|
CVE ID: CVE-2017-2232
Date Updated: 2024-08-05T13:48:04.294Z
Date Published: 2017-07-07T13:00:00
Description:
Untrusted search path vulnerability in Installer of Shinseiyo Sogo Soft (4.8A) and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://jvn.jp/en/jp/JVN23389212/index.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-32563.
|
CVE ID: CVE-2021-32563
Date Updated: 2024-08-03T23:25:30.561Z
Date Published: 2021-05-11T00:00:00
Description:
An issue was discovered in Thunar before 4.16.7 and 4.17.x before 4.17.2. When called with a regular file as a command-line argument, it delegates to a different program (based on the file type) without user confirmation. This could be used to achieve code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gitlab.xfce.org/xfce/thunar/-/commit/9165a61f95e43cc0b5abf9b98eee2818a0191e0b
- https://gitlab.xfce.org/xfce/thunar/-/commit/3b54d9d7dbd7fd16235e2141c43a7f18718f5664
- https://www.openwall.com/lists/oss-security/2021/05/09/2
- https://gitlab.xfce.org/xfce/thunar/-/tags
- http://www.openwall.com/lists/oss-security/2021/05/11/3
- https://gitlab.xfce.org/xfce/thunar/-/commit/1b85b96ebf7cb9bf6a3ddf1acee7643643fdf92d
- http://www.openwall.com/lists/oss-security/2023/01/05/1
- http://www.openwall.com/lists/oss-security/2023/01/05/2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-8913.
|
CVE ID: CVE-2014-8913
Date Updated: 2024-08-06T13:33:13.175Z
Date Published: 2015-01-21T11:00:00
Description:
Cross-site scripting (XSS) vulnerability in the Process Portal in IBM Business Process Manager 8.0 through 8.0.1.3, 8.5.0 through 8.5.0.1, and 8.5.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2014-8914.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/62205
- http://www-01.ibm.com/support/docview.wss?uid=swg21693239
- http://www.securitytracker.com/id/1031614
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99284
- http://www-01.ibm.com/support/docview.wss?uid=swg1JR51742
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-4109.
|
CVE ID: CVE-2016-4109
Date Updated: 2024-08-06T00:17:31.211Z
Date Published: 2016-05-11T10:00:00
Description:
Unspecified vulnerability in Adobe Flash Player 21.0.0.213 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-064.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html
- http://www.securityfocus.com/bid/90618
- http://www.securitytracker.com/id/1035827
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-064
- https://helpx.adobe.com/security/products/flash-player/apsb16-15.html
- http://rhn.redhat.com/errata/RHSA-2016-1079.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-14599.
|
CVE ID: CVE-2019-14599
Date Updated: 2024-08-05T00:19:41.342Z
Date Published: 2019-12-16T19:08:04
Description:
Unquoted service path in Control Center-I version 2.1.0.0 and earlier may allow an authenticated user to potentially enable escalation of privilege via local access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00299.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-18630.
|
CVE ID: CVE-2019-18630
Date Updated: 2024-08-05T01:54:14.544Z
Date Published: 2021-03-04T22:07:44
Description:
On Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200, portions of the drive containing executable code were not encrypted thus leaving it open to potential cryptographic information disclosure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://securitydocs.business.xerox.com/wp-content/uploads/2021/03/cert_Security_Mini_Bulletin_XRX20I_for_ALB80xx-C80xx_v1.2.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-20107.
|
CVE ID: CVE-2018-20107
Date Updated: 2021-01-06T16:15:40
Date Published: 2019-03-05T20:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-2864.
|
CVE ID: CVE-2024-2864
Date Updated: 2024-08-01T19:25:42.153Z
Date Published: 2024-03-25T10:51:19.470Z
Description:
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in KaineLabs Youzify - Buddypress Moderation.This issue affects Youzify - Buddypress Moderation: from n/a through 1.2.5.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/youzify-moderation/wordpress-youzify-buddypress-moderation-plugin-2-0-0-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-4843.
|
CVE ID: CVE-2019-4843
Date Updated: 2019-12-30T16:19:30
Date Published: 2019-12-30T16:19:30
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-13802.
|
CVE ID: CVE-2018-13802
Date Updated: 2024-09-16T16:39:08.335Z
Date Published: 2018-10-10T17:00:00Z
Description:
A vulnerability has been identified in ROX II (All versions < V2.12.1). An authenticated attacker with a high-privileged user account access via SSH could circumvent restrictions in place and execute arbitrary operating system commands. Successful exploitation requires that the attacker has network access to the SSH interface in on port 22/tcp. The attacker must be authenticated to exploit the vulnerability. The vulnerability could allow an attacker to execute arbitrary code on the device.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://ics-cert.us-cert.gov/advisories/ICSA-18-282-03
- https://cert-portal.siemens.com/productcert/pdf/ssa-493830.pdf
- http://www.securityfocus.com/bid/105545
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2009-1542.
|
CVE ID: CVE-2009-1542
Date Updated: 2024-08-07T05:20:33.430Z
Date Published: 2009-07-15T15:00:00
Description:
The Virtual Machine Monitor (VMM) in Microsoft Virtual PC 2004 SP1, 2007, and 2007 SP1, and Microsoft Virtual Server 2005 R2 SP1, does not enforce CPU privilege-level requirements for all machine instructions, which allows guest OS users to execute arbitrary kernel-mode code and gain privileges within the guest OS via a crafted application, aka "Virtual PC and Virtual Server Privileged Instruction Decoding Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2009/1890
- http://secunia.com/advisories/35808
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-033
- http://www.securitytracker.com/id?1022544
- http://www.us-cert.gov/cas/techalerts/TA09-195A.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6166
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-33238.
|
CVE ID: CVE-2022-33238
Date Updated: 2024-08-03T08:01:20.538Z
Date Published: 2022-12-13T00:00:00
Description:
Transient DOS due to loop with unreachable exit condition in WLAN while processing an incoming FTM frames. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/december-2022-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.