instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2017-11294.
CVE ID: CVE-2017-11294 Date Updated: 2024-08-05T18:05:29.933Z Date Published: 2017-12-09T06:00:00 Description: An issue was discovered in Adobe Shockwave 12.2.9.199 and earlier. An exploitable memory corruption vulnerability exists. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/101836 - https://helpx.adobe.com/security/products/shockwave/apsb17-40.html - http://www.securitytracker.com/id/1039784 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39268.
CVE ID: CVE-2023-39268 Date Updated: 2024-09-27T19:51:59.087Z Date Published: 2023-08-29T19:38:58.346Z Description: A memory corruption vulnerability in ArubaOS-Switch could lead to unauthenticated remote code execution by receiving specially crafted packets. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-013.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41153.
CVE ID: CVE-2022-41153 Date Updated: 2024-08-03T12:35:49.329Z Date Published: 2023-01-26T00:00:00 Description: This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18343. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tracker-software.com/product/pdf-xchange-editor/history - https://www.zerodayinitiative.com/advisories/ZDI-22-1350/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0861.
CVE ID: CVE-2013-0861 Date Updated: 2024-08-06T14:41:47.621Z Date Published: 2013-11-23T18:00:00 Description: The avcodec_decode_audio4 function in libavcodec/utils.c in FFmpeg before 1.0.4 and 1.1.x before 1.1.1 allows remote attackers to trigger memory corruption via vectors related to the channel layout. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=43c6b45a53a186a187f7266e4d6bd3c2620519f1 - http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=4cd1dad91ae97fe1f0dd534c3f5566787566f137 - http://www.ffmpeg.org/security.html - https://security.gentoo.org/glsa/201603-06 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15363.
CVE ID: CVE-2019-15363 Date Updated: 2024-08-05T00:42:03.713Z Date Published: 2019-11-14T16:25:09 Description: The Leagoo Power 5 Android device with a build fingerprint of LEAGOO/Power_5/Power_5:8.1.0/O11019/1532686195:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.kryptowire.com/android-firmware-2019/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-5421.
CVE ID: CVE-2018-5421 Date Updated: 2019-03-05T19:57:01 Date Published: 2019-03-05T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20552.
CVE ID: CVE-2018-20552 Date Updated: 2024-09-16T22:21:00.324Z Date Published: 2018-12-28T13:00:00Z Description: Tcpreplay before 4.3.1 has a heap-based buffer over-read in packet2tree in tree.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/appneta/tcpreplay/issues/530 - https://github.com/appneta/tcpreplay/pull/532/commits/6b830a1640ca20528032c89a4fdd8291a4d2d8b2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6095.
CVE ID: CVE-2024-6095 Date Updated: 2024-08-01T21:33:03.282Z Date Published: 2024-07-06T17:48:46.735Z Description: A vulnerability in the /models/apply endpoint of mudler/localai versions 2.15.0 allows for Server-Side Request Forgery (SSRF) and partial Local File Inclusion (LFI). The endpoint supports both http(s):// and file:// schemes, where the latter can lead to LFI. However, the output is limited due to the length of the error message. This vulnerability can be exploited by an attacker with network access to the LocalAI instance, potentially allowing unauthorized access to internal HTTP(s) servers and partial reading of local files. The issue is fixed in version 2.17. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.com/bounties/4799262d-72dc-43c8-bc99-81d0dce996dc - https://github.com/mudler/localai/commit/2fc6fe806b903ac0a70218b21b5c84443a1b0866 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38752.
CVE ID: CVE-2023-38752 Date Updated: 2024-08-02T17:54:38.527Z Date Published: 2023-08-09T03:29:51.888Z Description: Improper authorization vulnerability in Special Interest Group Network for Analysis and Liaison versions 4.4.0 to 4.7.7 allows the authorized API users to view the attribute information of the poster that is set as"non-disclosure" in the system settings. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jpcert.or.jp/press/2023/PR20230807_notice.html - https://jvn.jp/en/jp/JVN83334799/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4637.
CVE ID: CVE-2024-4637 Date Updated: 2024-08-01T20:47:41.443Z Date Published: 2024-06-04T09:31:47.483Z Description: The Slider Revolution plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 6.7.10 due to insufficient input sanitization and output escaping on the user supplied Elementor 'wrapperid' and 'zindex' display attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/457b5066-da37-4877-9abe-c912bc201f29?source=cve - https://www.sliderrevolution.com/documentation/changelog/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-20170.
CVE ID: CVE-2017-20170 Date Updated: 2024-08-05T21:45:26.060Z Date Published: 2023-01-17T13:58:03.233Z Description: A vulnerability was found in ollpu parontalli. It has been classified as critical. Affected is an unknown function of the file httpdocs/index.php. The manipulation of the argument s leads to sql injection. The patch is identified as 6891bb2dec57dca6daabc15a6d2808c8896620e5. It is recommended to apply a patch to fix this issue. VDB-218418 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.218418 - https://vuldb.com/?ctiid.218418 - https://github.com/ollpu/parontalli/commit/6891bb2dec57dca6daabc15a6d2808c8896620e5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-44955.
CVE ID: CVE-2022-44955 Date Updated: 2024-08-03T14:01:31.439Z Date Published: 2022-12-02T00:00:00 Description: webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the Chat function. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Messages field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://webtareas.com - https://github.com/anhdq201/webtareas/issues/5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5421.
CVE ID: CVE-2014-5421 Date Updated: 2024-08-06T11:41:49.123Z Date Published: 2014-10-19T01:00:00 Description: CareFusion Pyxis SupplyStation 8.1 with hardware test tool 1.0.16 and earlier has a hardcoded database password, which makes it easier for local users to gain privileges by leveraging cabinet access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-14-288-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6532.
CVE ID: CVE-2019-6532 Date Updated: 2024-08-04T20:23:21.586Z Date Published: 2019-06-07T13:58:48 Description: Panasonic FPWIN Pro version 7.3.0.0 and prior allows attacker-created project files to be loaded by an authenticated user triggering incompatible type errors because the resource does not have expected properties. This may lead to remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-19-157-02 - http://www.securityfocus.com/bid/108683 - https://www.zerodayinitiative.com/advisories/ZDI-19-568/ - https://www.zerodayinitiative.com/advisories/ZDI-19-566/ - https://www.zerodayinitiative.com/advisories/ZDI-19-570/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7114.
CVE ID: CVE-2016-7114 Date Updated: 2024-09-16T22:50:42.737Z Date Published: 2016-09-06T00:00:00Z Description: A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02; SIPROTEC 7SJ686 : All versions < V 4.87; SIPROTEC 7UT686 : All versions < V 4.02; SIPROTEC 7SD686 : All versions < V 4.05; SIPROTEC 7SJ66 : All versions < V 4.30. Attackers with network access to the device's web interface (port 80/tcp) could possibly circumvent authentication and perform certain administrative operations. A legitimate user must be logged into the web interface for the attack to be successful. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/92745 - https://www.siemens.com/cert/pool/cert/siemens_security_advisory_SSA-323211.pdf - https://ics-cert.us-cert.gov/advisories/ICSA-17-187-03 - http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-630413.pdf - http://www.securityfocus.com/bid/99471 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-3139.
CVE ID: CVE-2021-3139 Date Updated: 2024-08-03T16:45:51.388Z Date Published: 2021-01-13T15:33:45 Description: In Open-iSCSI tcmu-runner 1.3.x, 1.4.x, and 1.5.x through 1.5.2, xcopy_locate_udev in tcmur_cmd_handler.c lacks a check for transport-layer restrictions, allowing remote attackers to read or write files via directory traversal in an XCOPY request. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. NOTE: relative to CVE-2020-28374, this is a similar mistake in a different algorithm. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.suse.com/show_bug.cgi?id=1178372 - https://bugzilla.suse.com/attachment.cgi?id=844938 - https://www.openwall.com/lists/oss-security/2021/01/12/12 - http://www.openwall.com/lists/oss-security/2021/01/13/5 - https://github.com/open-iscsi/tcmu-runner/pull/644 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5064.
CVE ID: CVE-2019-5064 Date Updated: 2024-08-04T19:47:55.691Z Date Published: 2020-01-03T16:57:39 Description: An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, before version 4.2.0. A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuApr2021.html - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853 - https://github.com/opencv/opencv/issues/15857 - https://www.oracle.com//security-alerts/cpujul2021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1872.
CVE ID: CVE-2009-1872 Date Updated: 2024-08-07T05:27:54.747Z Date Published: 2009-08-18T22:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Adobe ColdFusion Server 8.0.1, 8, and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the startRow parameter to administrator/logviewer/searchlog.cfm, or the query string to (2) wizards/common/_logintowizard.cfm, (3) wizards/common/_authenticatewizarduser.cfm, or (4) administrator/enter.cfm. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.adobe.com/support/security/bulletins/apsb09-12.html - http://osvdb.org/57182 - http://osvdb.org/57183 - http://www.dsecrg.com/pages/vul/show.php?id=122 - http://osvdb.org/57185 - http://osvdb.org/57184 - http://www.securityfocus.com/archive/1/505803/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27808.
CVE ID: CVE-2023-27808 Date Updated: 2024-08-02T12:23:29.292Z Date Published: 2023-04-07T00:00:00 Description: H3C Magic R100 R100V100R005.bin was discovered to contain a stack overflow via the DeltriggerList interface at /goform/aspForm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackmd.io/%400dayResearch/DeltriggerList No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7334.
CVE ID: CVE-2019-7334 Date Updated: 2024-09-16T18:04:01.934Z Date Published: 2019-02-04T19:00:00Z Description: Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'Exportfile' parameter value in the view export (export.php) because proper filtration is omitted. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ZoneMinder/zoneminder/issues/2443 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16266.
CVE ID: CVE-2017-16266 Date Updated: 2024-08-05T20:20:05.562Z Date Published: 2023-01-11T21:39:38.710Z Description: Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_b, at 0x9d016530, the value for the `grp` key is copied using `strcpy` to the buffer at `$sp+0x1b4`.This buffer is 8 bytes large, sending anything longer will cause a buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4478.
CVE ID: CVE-2015-4478 Date Updated: 2024-08-06T06:18:11.315Z Date Published: 2015-08-16T01:00:00 Description: Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html - https://bugzilla.mozilla.org/show_bug.cgi?id=1105914 - http://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html - http://www.ubuntu.com/usn/USN-2702-3 - http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html - http://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html - http://rhn.redhat.com/errata/RHSA-2015-1586.html - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html - http://www.securitytracker.com/id/1033247 - http://www.ubuntu.com/usn/USN-2702-2 - http://www.ubuntu.com/usn/USN-2702-1 - https://security.gentoo.org/glsa/201605-06 - http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html - http://www.mozilla.org/security/announce/2015/mfsa2015-82.html - http://www.debian.org/security/2015/dsa-3333 - http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-23270.
CVE ID: CVE-2021-23270 Date Updated: 2024-08-03T19:05:55.638Z Date Published: 2021-04-12T17:40:59 Description: In Gargoyle OS 1.12.0, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ericpaulbishop/gargoyle/commit/24afe944a6ffff53d84a748384e276a4e95912ec No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38612.
CVE ID: CVE-2023-38612 Date Updated: 2024-08-02T17:46:56.558Z Date Published: 2024-01-10T22:03:45.130Z Description: The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, iOS 16.7 and iPadOS 16.7, iOS 17 and iPadOS 17, macOS Sonoma 14, macOS Ventura 13.6. An app may be able to access protected user data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213938 - https://support.apple.com/en-us/HT213932 - https://support.apple.com/en-us/HT213927 - https://support.apple.com/en-us/HT213931 - https://support.apple.com/en-us/HT213940 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35089.
CVE ID: CVE-2022-35089 Date Updated: 2024-08-03T09:29:17.160Z Date Published: 2022-09-20T23:56:14 Description: SWFTools commit 772e55a2 was discovered to contain a heap-buffer-overflow via getTransparentColor at /home/bupt/Desktop/swftools/src/gif2swf. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/matthiaskramm/swftools/issues/181 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35089.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10870.
CVE ID: CVE-2018-10870 Date Updated: 2024-08-05T07:46:47.511Z Date Published: 2018-07-19T22:00:00 Description: redhat-certification does not properly sanitize paths in rhcertStore.py:__saveResultsFile. A remote attacker could use this flaw to overwrite any file, potentially gaining remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10870 - https://access.redhat.com/errata/RHSA-2018:2373 - http://www.securityfocus.com/bid/104857 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8308.
CVE ID: CVE-2016-8308 Date Updated: 2024-08-06T02:20:30.584Z Date Published: 2017-01-27T22:01:00 Description: Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Applications (subcomponent: Product / Instrument Search). Supported versions that are affected are 2.0.1, 2.2.0 and 12.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle FLEXCUBE Private Banking accessible data. CVSS v3.0 Base Score 4.3 (Integrity impacts). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/95475 - http://www.securitytracker.com/id/1037636 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6930.
CVE ID: CVE-2014-6930 Date Updated: 2024-08-06T12:31:47.143Z Date Published: 2014-10-04T10:00:00 Description: The Abram Radio Groove! (aka com.nobexinc.wls_79226887.rc) application 3.2.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing - http://www.kb.cert.org/vuls/id/951217 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2673.
CVE ID: CVE-2009-2673 Date Updated: 2024-08-07T05:59:56.917Z Date Published: 2009-08-05T19:00:00 Description: The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://rhn.redhat.com/errata/RHSA-2009-1200.html - https://rhn.redhat.com/errata/RHSA-2009-1199.html - http://secunia.com/advisories/36162 - http://www.vupen.com/english/advisories/2009/2543 - http://secunia.com/advisories/37460 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8558 - http://security.gentoo.org/glsa/glsa-200911-02.xml - http://www.vmware.com/security/advisories/VMSA-2009-0016.html - http://marc.info/?l=bugtraq&m=125787273209737&w=2 - http://secunia.com/advisories/36199 - http://secunia.com/advisories/36248 - http://www.mandriva.com/security/advisories?name=MDVSA-2009:209 - https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html - http://marc.info/?l=bugtraq&m=125787273209737&w=2 - http://java.sun.com/javase/6/webnotes/6u15.html - http://www.securityfocus.com/archive/1/507985/100/0/threaded - http://www.us-cert.gov/cas/techalerts/TA09-294A.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10263 - http://www.securityfocus.com/bid/35943 - http://secunia.com/advisories/36180 - http://osvdb.org/56785 - http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html - http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1 - http://sunsolve.sun.com/search/document.do?assetkey=1-66-263409-1 - http://secunia.com/advisories/36176 - https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html - http://www.securitytracker.com/id?1022659 - http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html - http://secunia.com/advisories/37300 - http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html - http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html - https://rhn.redhat.com/errata/RHSA-2009-1201.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/52338 - http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00003.html - http://secunia.com/advisories/37386 - http://java.sun.com/j2se/1.5.0/ReleaseNotes.html#150_20 - http://www.vupen.com/english/advisories/2009/3316 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-44278.
CVE ID: CVE-2022-44278 Date Updated: 2024-08-03T13:47:05.701Z Date Published: 2022-11-23T00:00:00 Description: Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=user/manage_user&id=. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Onetpaer/bug_report/blob/main/vendors/oretnom23/sanitization-management-system/SQLi-1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41106.
CVE ID: CVE-2023-41106 Date Updated: 2024-08-02T18:54:02.815Z Date Published: 2023-12-07T00:00:00 Description: An issue was discovered in Zimbra Collaboration (ZCS) before 10.0.3. An attacker can gain access to a Zimbra account. This is also fixed in 9.0.0 Patch 35 and 8.8.15 Patch 42. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - https://wiki.zimbra.com/wiki/Security_Center - http://www.openwall.com/lists/oss-security/2023/11/17/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1444.
CVE ID: CVE-2023-1444 Date Updated: 2024-08-02T05:49:11.414Z Date Published: 2023-03-17T06:33:20.430Z Description: A vulnerability was found in Filseclab Twister Antivirus 8. It has been rated as critical. This issue affects the function 0x8011206B in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223289 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.223289 - https://vuldb.com/?ctiid.223289 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1444 - https://drive.google.com/file/d/1KrkezTwgmt5CnhzlyyWVNLIAeiMvuDEr/view No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7503.
CVE ID: CVE-2015-7503 Date Updated: 2024-08-06T07:51:28.216Z Date Published: 2017-10-10T16:00:00 Description: Zend Framework before 2.4.9, zend-framework/zend-crypt 2.4.x before 2.4.9, and 2.5.x before 2.5.2 allows remote attackers to recover the RSA private key. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://framework.zend.com/security/advisory/ZF2015-10 - https://bugzilla.redhat.com/show_bug.cgi?id=1283137 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20570.
CVE ID: CVE-2023-20570 Date Updated: 2024-08-02T09:05:36.265Z Date Published: 2024-02-13T17:14:09.431Z Description: Insufficient verification of data authenticity in the configuration state machine may allow a local attacker to potentially load arbitrary bitstreams. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8002.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3292.
CVE ID: CVE-2022-3292 Date Updated: 2024-08-03T01:07:06.509Z Date Published: 2022-09-28T20:15:13 Description: Use of Cache Containing Sensitive Information in GitHub repository ikus060/rdiffweb prior to 2.4.8. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/e9309018-e94f-4e15-b7d1-5d38b6021c5d - https://github.com/ikus060/rdiffweb/commit/2406780831618405a13113377a784f3102465f40 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25632.
CVE ID: CVE-2024-25632 Date Updated: 2024-10-01T15:00:01.610Z Date Published: 2024-10-01T14:36:50.451Z Description: eLabFTW is an open source electronic lab notebook for research labs. In the context of eLabFTW, an administrator is a user account with certain privileges to manage users and content in their assigned team/teams. A user may be an administrator in one team and a regular user in another. The vulnerability allows a regular user to become administrator of a team where they are a member, under a reasonable configuration. Additionally, in eLabFTW versions subsequent to v5.0.0, the vulnerability may allow an initially unauthenticated user to gain administrative privileges over an arbitrary team. The vulnerability does not affect system administrator status. Users should upgrade to version 5.1.0. System administrators are advised to turn off local user registration, saml_team_create and not allow administrators to import users into teams, unless strictly required. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/elabftw/elabftw/security/advisories/GHSA-6m7p-gh9f-5mgg No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28556.
CVE ID: CVE-2024-28556 Date Updated: 2024-08-02T00:56:57.840Z Date Published: 2024-04-15T00:00:00 Description: SQL Injection vulnerability in Sourcecodester php task management system v1.0, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via crafted payload to admin-manage-user.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xuanluansec/vul/blob/main/vul/1/README.md - https://github.com/xuanluansec/vul/issues/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-40110.
CVE ID: CVE-2021-40110 Date Updated: 2024-08-04T02:27:31.846Z Date Published: 2022-01-04T08:55:22 Description: In Apache James, using Jazzer fuzzer, we identified that an IMAP user can craft IMAP LIST commands to orchestrate a Denial Of Service using a vulnerable Regular expression. This affected Apache James prior to 3.6.1 We recommend upgrading to Apache James 3.6.1 or higher , which enforce the use of RE2J regular expression engine to execute regex in linear time without back-tracking. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.openwall.com/lists/oss-security/2022/01/04/2 - http://www.openwall.com/lists/oss-security/2022/01/04/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18622.
CVE ID: CVE-2018-18622 Date Updated: 2024-09-17T03:18:45.539Z Date Published: 2018-10-23T18:00:00Z Description: An issue was discovered in Waimai Super Cms 20150505. There is XSS via the index.php?m=public&a=doregister username parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/caokang/waimai/issues/8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6712.
CVE ID: CVE-2013-6712 Date Updated: 2024-08-06T17:46:22.680Z Date Published: 2013-11-28T02:00:00 Description: The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2013/dsa-2816 - https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322 - https://support.apple.com/HT204659 - http://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html - http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=12fe4e90be7bfa2a763197079f68f5568a14e071 - http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html - http://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html - http://rhn.redhat.com/errata/RHSA-2014-1765.html - https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322 - http://www.ubuntu.com/usn/USN-2055-1 - https://bugs.php.net/bug.php?id=66060 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33278.
CVE ID: CVE-2023-33278 Date Updated: 2024-08-02T15:39:36.253Z Date Published: 2023-05-25T00:00:00 Description: In the Store Commander scexportcustomers module for PrestaShop through 3.6.1, sensitive SQL calls can be executed with a trivial HTTP request and exploited to forge a blind SQL injection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.storecommander.com/en/addons/480-customer-export-pro.html - https://friends-of-presta.github.io/security-advisories/modules/2023/05/25/scexportcustomers.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31070.
CVE ID: CVE-2021-31070 Date Updated: 2021-08-24T18:52:46 Date Published: 2021-08-24T18:52:46 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-0904.
CVE ID: CVE-2022-0904 Date Updated: 2024-08-02T23:47:42.621Z Date Published: 2022-03-09T15:21:17 Description: A stack overflow bug in the document extractor in Mattermost Server in versions up to and including 6.3.2 allows an attacker to crash the server via submitting a maliciously crafted Apple Pages document. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mattermost.com/security-updates/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-29059.
CVE ID: CVE-2024-29059 Date Updated: 2024-08-12T17:38:51.372Z Date Published: 2024-03-22T23:09:05.745Z Description: .NET Framework Information Disclosure Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-26497.
CVE ID: CVE-2023-26497 Date Updated: 2024-08-02T11:53:54.239Z Date Published: 2023-03-21T00:00:00 Description: An issue was discovered in Samsung Baseband Modem Chipset for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, and Exynos Auto T5125. Memory corruption can occur when processing Session Description Negotiation for Video Configuration Attribute. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://semiconductor.samsung.com/processor/modem/ - https://semiconductor.samsung.com/processor/mobile-processor/ - https://semiconductor.samsung.com/support/quality-support/product-security-updates/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8132.
CVE ID: CVE-2016-8132 Date Updated: 2021-03-01T23:08:00 Date Published: 2021-03-01T23:08:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36537.
CVE ID: CVE-2024-36537 Date Updated: 2024-08-02T03:37:05.335Z Date Published: 2024-07-24T00:00:00 Description: Insecure permissions in cert-manager v1.14.4 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/HouqiyuA/27879a6366a65fcd5f6c6fcbcf68d8e3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-37616.
CVE ID: CVE-2021-37616 Date Updated: 2024-08-04T01:23:01.227Z Date Published: 2021-08-09T00:00:00 Description: Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A null pointer dereference was found in Exiv2 versions v0.27.4 and earlier. The null pointer dereference is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the interpreted (translated) data, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p t` or `-P t`). The bug is fixed in version v0.27.5. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Exiv2/exiv2/security/advisories/GHSA-54f7-vvj7-545w - https://github.com/Exiv2/exiv2/pull/1758 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ - https://security.gentoo.org/glsa/202312-06 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4494.
CVE ID: CVE-2022-4494 Date Updated: 2024-08-03T01:41:45.540Z Date Published: 2022-12-14T00:00:00 Description: A vulnerability, which was classified as critical, has been found in bspkrs MCPMappingViewer. Affected by this issue is the function extractZip of the file src/main/java/bspkrs/mmv/RemoteZipHandler.java of the component ZIP File Handler. The manipulation leads to path traversal. The attack may be launched remotely. The name of the patch is 6e602746c96b4756c271d080dae7d22ad804a1bd. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-215804. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/bspkrs/MCPMappingViewer/commit/6e602746c96b4756c271d080dae7d22ad804a1bd - https://vuldb.com/?id.215804 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3499.
CVE ID: CVE-2011-3499 Date Updated: 2024-08-06T23:37:47.866Z Date Published: 2011-09-16T17:00:00 Description: Progea Movicon / PowerHMI 11.2.1085 and earlier allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via an EIDP packet with a large size field, which writes a zero byte to an arbitrary memory location. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://aluigi.altervista.org/adv/movicon_3-adv.txt - https://exchange.xforce.ibmcloud.com/vulnerabilities/69789 - http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-01.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26597.
CVE ID: CVE-2022-26597 Date Updated: 2024-08-03T05:11:42.693Z Date Published: 2022-04-25T15:02:53 Description: Cross-site scripting (XSS) vulnerability in the Layout module's Open Graph integration in Liferay Portal 7.3.0 through 7.4.0, and Liferay DXP 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the site name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://liferay.com No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5409.
CVE ID: CVE-2008-5409 Date Updated: 2024-08-07T10:49:12.963Z Date Published: 2008-12-09T11:00:00 Description: Unspecified vulnerability in the pdf.xmd module in (1) BitDefender Free Edition 10 and Antivirus Standard 10, (2) BullGuard Internet Security 8.5, and (3) Software602 Groupware Server 6.0.08.1118 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, possibly related to included compressed streams that were processed with the ASCIIHexDecode filter. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32789 - http://secunia.com/advisories/27805 - http://osvdb.org/50205 - https://www.exploit-db.com/exploits/7178 - http://osvdb.org/50103 - http://www.securityfocus.com/bid/32396 - https://exchange.xforce.ibmcloud.com/vulnerabilities/46750 - http://secunia.com/advisories/32814 - http://osvdb.org/50010 - http://milw0rm.com/sploits/2008-BitDefenderDOS.zip No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1251.
CVE ID: CVE-2018-1251 Date Updated: 2024-09-16T18:03:36.680Z Date Published: 2018-09-28T18:00:00Z Description: Dell EMC Unity and UnityVSA versions prior to 4.3.1.1525703027 contains a URL Redirection vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to redirect Unity users to arbitrary web URLs by tricking the victim user to click on a maliciously crafted Unisphere URL. Attacker could potentially phish information, including Unisphere users' credentials, from the victim once they are redirected. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://seclists.org/fulldisclosure/2018/Sep/30 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3468.
CVE ID: CVE-2012-3468 Date Updated: 2024-09-17T01:12:00.485Z Date Published: 2012-08-12T21:00:00Z Description: Multiple SQL injection vulnerabilities in the Ushahidi Platform before 2.5 allow remote attackers to execute arbitrary SQL commands via vectors related to (1) the verify function in application/controllers/alerts.php, (2) the save_all function in application/models/settings.php, or (3) the media type to the timeline function in application/controllers/json.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ushahidi/Ushahidi_Web/commit/d954093 - http://openwall.com/lists/oss-security/2012/08/09/5 - https://github.com/ushahidi/Ushahidi_Web/commit/4764792 - https://github.com/ushahidi/Ushahidi_Web/commit/fdb48d1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-20025.
CVE ID: CVE-2024-20025 Date Updated: 2024-08-26T20:56:23.653Z Date Published: 2024-03-04T02:43:35.600Z Description: In da, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541686; Issue ID: ALPS08541686. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/March-2024 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31143.
CVE ID: CVE-2021-31143 Date Updated: 2021-08-24T18:53:54 Date Published: 2021-08-24T18:53:54 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34610.
CVE ID: CVE-2023-34610 Date Updated: 2024-08-02T16:17:02.633Z Date Published: 2023-06-14T00:00:00 Description: An issue was discovered json-io thru 4.14.0 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jdereg/json-io/issues/169 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6083.
CVE ID: CVE-2008-6083 Date Updated: 2024-08-07T11:20:24.335Z Date Published: 2009-02-06T11:00:00 Description: Directory traversal vulnerability in header.php in TXTshop beta 1.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/497752/100/0/threaded - https://exchange.xforce.ibmcloud.com/vulnerabilities/46063 - https://www.exploit-db.com/exploits/6816 - http://www.securityfocus.com/bid/31885 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-12818.
CVE ID: CVE-2017-12818 Date Updated: 2024-09-16T20:47:00.271Z Date Published: 2017-10-03T13:00:00Z Description: Stack overflow in custom XML-parser in Gemalto's HASP SRM, Sentinel HASP and Sentinel LDK products prior to Sentinel LDK RTE version 7.55 leads to remote denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-18-093-01 - https://ics-cert.kaspersky.com/advisories/klcert-advisories/2017/10/02/klcert-17-004-sentinel-ldk-rte-stack-overflow-in-custom-xml-parser-leads-to-remote-denial-of-service/ - https://cert-portal.siemens.com/productcert/pdf/ssa-727467.pdf - http://www.securityfocus.com/bid/102906 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6891.
CVE ID: CVE-2008-6891 Date Updated: 2024-08-07T11:49:02.691Z Date Published: 2009-08-03T14:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in ASP Forum Script allow remote attackers to inject arbitrary web script or HTML via the (1) forum_id parameter to (a) new_message.asp and (b) messages.asp, and the (2) query string to default.asp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/47002 - http://www.securityfocus.com/bid/32571 - http://packetstormsecurity.org/0812-exploits/aspforum-cmsqlxss.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0608.
CVE ID: CVE-2013-0608 Date Updated: 2024-08-06T14:33:05.220Z Date Published: 2013-01-10T11:00:00 Description: Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "logic error," a different vulnerability than CVE-2013-0607, CVE-2013-0611, CVE-2013-0614, and CVE-2013-0618. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16037 - http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html - http://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html - http://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html - http://www.adobe.com/support/security/bulletins/apsb13-02.html - http://rhn.redhat.com/errata/RHSA-2013-0150.html - http://security.gentoo.org/glsa/glsa-201308-03.xml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12153.
CVE ID: CVE-2018-12153 Date Updated: 2024-09-16T23:15:48.744Z Date Published: 2018-10-10T18:00:00Z Description: Denial of Service in Unified Shader Compiler in Intel Graphics Drivers before 10.18.x.5056 (aka 15.33.x.5056), 10.18.x.5057 (aka 15.36.x.5057) and 20.19.x.5058 (aka 15.40.x.5058) may allow an unprivileged user from a virtual machine guest to potentially crash the host system via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/105582 - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00166.html - https://support.apple.com/kb/HT210634 - https://support.apple.com/kb/HT210722 - http://seclists.org/fulldisclosure/2019/Oct/56 - http://seclists.org/fulldisclosure/2019/Oct/55 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34273.
CVE ID: CVE-2023-34273 Date Updated: 2024-08-02T16:01:54.313Z Date Published: 2024-05-03T01:57:03.602Z Description: Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fatek Automation FvDesigner. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of FPJ files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18183. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-771/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5710.
CVE ID: CVE-2024-5710 Date Updated: 2024-08-01T21:18:07.053Z Date Published: 2024-06-27T18:41:19.900Z Description: berriai/litellm version 1.34.34 is vulnerable to improper access control in its team management functionality. This vulnerability allows attackers to perform unauthorized actions such as creating, updating, viewing, deleting, blocking, and unblocking any teams, as well as adding or deleting any member to or from any teams. The vulnerability stems from insufficient access control checks in various team management endpoints, enabling attackers to exploit these functionalities without proper authorization. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.com/bounties/70897f59-a966-4d93-b71e-745e3da91970 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-22754.
CVE ID: CVE-2023-22754 Date Updated: 2024-08-02T10:20:30.250Z Date Published: 2023-02-28T16:34:48.324Z Description: There are buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution by sending specially crafted packets via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-4127.
CVE ID: CVE-2020-4127 Date Updated: 2024-08-04T07:52:20.933Z Date Published: 2020-11-30T21:41:53 Description: HCL Domino is susceptible to a Login CSRF vulnerability. With a valid credential, an attacker could trick a user into accessing a system under another ID or use an intranet user's system to access internal systems from the internet. Fixes are available in HCL Domino versions 9.0.1 FP10 IF6, 10.0.1 FP6 and 11.0.1 FP1 and later. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0085409 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0852.
CVE ID: CVE-2011-0852 Date Updated: 2024-08-06T22:05:54.468Z Date Published: 2011-07-20T22:36:00 Description: Unspecified vulnerability in the Security Management component in Oracle Database Server 10.1.0.5, 10.2.0.3, and 10.2.0.4; and Oracle Enterprise Manager Grid Control 10.1.0.6; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Audit Administration. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.us-cert.gov/cas/techalerts/TA11-201A.html - http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3221.
CVE ID: CVE-2023-3221 Date Updated: 2024-09-30T18:47:09.349Z Date Published: 2023-09-04T12:31:30.699Z Description: User enumeration vulnerability in Password Recovery plugin 1.2 version for Roundcube, which could allow a remote attacker to create a test script against the password recovery function to enumerate all users in the database. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-roundcube-password-recovery-plugin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-29354.
CVE ID: CVE-2023-29354 Date Updated: 2024-08-02T14:07:45.872Z Date Published: 2023-05-05T22:22:37.311Z Description: Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29354 - https://security.gentoo.org/glsa/202309-17 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4578.
CVE ID: CVE-2018-4578 Date Updated: 2023-09-14T18:42:12.845Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3796.
CVE ID: CVE-2014-3796 Date Updated: 2024-08-06T10:57:17.838Z Date Published: 2014-09-15T14:00:00 Description: VMware NSX 6.0 before 6.0.6, and vCloud Networking and Security (vCNS) 5.1 before 5.1.4.2 and 5.5 before 5.5.3, does not properly validate input, which allows attackers to obtain sensitive information via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vmware.com/security/advisories/VMSA-2014-0009.html - http://www.securitytracker.com/id/1030835 - http://secunia.com/advisories/59938 - https://exchange.xforce.ibmcloud.com/vulnerabilities/95926 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18125.
CVE ID: CVE-2017-18125 Date Updated: 2024-09-16T20:12:18.855Z Date Published: 2018-04-11T15:00:00Z Description: In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 835, SD 845, SD 850, when secure camera is activated it stores captured data in protected buffers. The TEE application which uses secure camera expects those buffers to contain data captured during the current camera session. It is possible though for HLOS to put aside and reuse one or more of the protected buffers with previously captured data during next camera session. Such data reuse must be prevented as the TEE applications expects to receive valid data captured during the current session only. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2018-04-01 - http://www.securityfocus.com/bid/103671 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-32644.
CVE ID: CVE-2024-32644 Date Updated: 2024-08-02T02:13:40.251Z Date Published: 2024-04-19T14:53:44.423Z Description: Evmos is a scalable, high-throughput Proof-of-Stake EVM blockchain that is fully compatible and interoperable with Ethereum. Prior to 17.0.0, there is a way to mint arbitrary tokens due to the possibility to have two different states not in sync during the execution of a transaction. The exploit is based on the fact that to sync the Cosmos SDK state and the EVM one, we rely on the `stateDB.Commit()` method. When we call this method, we iterate though all the `dirtyStorage` and, **if and only if** it is different than the `originStorage`, we set the new state. Setting the new state means we update the Cosmos SDK KVStore. If a contract storage state that is the same before and after a transaction, but is changed during the transaction and can call an external contract after the change, it can be exploited to make the transaction similar to non-atomic. The vulnerability is **critical** since this could lead to drain of funds through creative SC interactions. The issue has been patched in versions >=V17.0.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/evmos/evmos/security/advisories/GHSA-3fp5-2xwh-fxm6 - https://github.com/evmos/evmos/commit/08982b5ee726b97bc50eaf58d1914829648b6a5f - https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/statedb.go#L460-L465 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-19934.
CVE ID: CVE-2018-19934 Date Updated: 2024-08-05T11:51:17.852Z Date Published: 2019-03-17T19:35:49 Description: SolarWinds Serv-U FTP Server 15.1.6.25 has reflected cross-site scripting (XSS) in the Web management interface via URL path and HTTP POST parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/151474/SolarWinds-Serv-U-FTP-15.1.6.25-Cross-Site-Scripting.html - http://seclists.org/fulldisclosure/2019/Feb/5 - https://www.themissinglink.com.au/security-advisories-cve-2018-19934 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3746.
CVE ID: CVE-2012-3746 Date Updated: 2024-08-06T20:21:03.496Z Date Published: 2012-09-20T21:00:00 Description: UIWebView in UIKit in Apple iOS before 6 does not properly use the Data Protection feature, which allows context-dependent attackers to obtain cleartext file content by leveraging direct access to a device's filesystem. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html - http://support.apple.com/kb/HT5503 - http://osvdb.org/85633 - https://exchange.xforce.ibmcloud.com/vulnerabilities/78706 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5889.
CVE ID: CVE-2016-5889 Date Updated: 2024-08-06T01:15:09.830Z Date Published: 2017-05-10T14:00:00 Description: IBM Interact 8.6, 9.0, 9.1, and 10.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 115085. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=swg22002149 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26526.
CVE ID: CVE-2022-26526 Date Updated: 2024-08-03T05:03:32.786Z Date Published: 2022-03-17T14:57:36 Description: Anaconda Anaconda3 (Anaconda Distribution) through 2021.11.0.0 and Miniconda3 through 4.11.0.0 can create a world-writable directory under %PROGRAMDATA% and place that directory into the system PATH environment variable. Thus, for example, local users can gain privileges by placing a Trojan horse file into that directory. (This problem can only happen in a non-default installation. The person who installs the product must specify that it is being installed for all users. Also, the person who installs the product must specify that the system PATH should be changed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.conda.io/en/latest/miniconda.html - https://github.com/continuumio/anaconda-issues/issues - https://improsec.com/tech-blog/privilege-escalation-vulnerability-in-anaconda3-and-miniconda3 - https://repo.anaconda.com/miniconda/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-9363.
CVE ID: CVE-2018-9363 Date Updated: 2024-09-16T18:38:38.597Z Date Published: 2018-11-06T17:00:00Z Description: In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://usn.ubuntu.com/3797-2/ - https://usn.ubuntu.com/3797-1/ - https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html - https://usn.ubuntu.com/3820-1/ - https://usn.ubuntu.com/3820-2/ - https://access.redhat.com/errata/RHSA-2018:2948 - https://www.debian.org/security/2018/dsa-4308 - https://source.android.com/security/bulletin/2018-06-01 - https://usn.ubuntu.com/3822-2/ - https://usn.ubuntu.com/3822-1/ - https://usn.ubuntu.com/3820-3/ - https://access.redhat.com/errata/RHSA-2019:2043 - https://access.redhat.com/errata/RHSA-2019:2029 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2968.
CVE ID: CVE-2012-2968 Date Updated: 2024-09-17T00:50:54.884Z Date Published: 2012-08-12T16:00:00Z Description: Directory traversal vulnerability in Caucho Quercus, as distributed in Resin before 4.0.29, allows remote attackers to create files in arbitrary directories via a .. (dot dot) in a pathname within an HTTP request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/309979 - http://en.securitylab.ru/lab/ - http://en.securitylab.ru/lab/PT-2012-05 - http://caucho.com/resin-4.0/changes/changes.xtp No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1577.
CVE ID: CVE-2010-1577 Date Updated: 2024-08-07T01:28:42.356Z Date Published: 2010-07-27T22:00:00 Description: Directory traversal vulnerability in Cisco Internet Streamer, as used in Cisco Content Delivery System (CDS) 2.2.x, 2.3.x, 2.4.x, and 2.5.x before 2.5.7 allows remote attackers to read arbitrary files via a crafted URL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.cisco.com/en/US/products/products_security_advisory09186a0080b3bd1c.shtml - https://exchange.xforce.ibmcloud.com/vulnerabilities/60567 - http://www.securitytracker.com/id?1024234 - http://osvdb.org/66508 - http://secunia.com/advisories/40701 - http://www.vupen.com/english/advisories/2010/1881 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5987.
CVE ID: CVE-2024-5987 Date Updated: 2024-08-29T14:04:01.371Z Date Published: 2024-08-29T05:30:57.345Z Description: The WP Accessibility Helper (WAH) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'save_contrast_variations' and 'save_empty_contrast_variations' functions in all versions up to, and including, 0.6.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to edit or delete contrast settings. Please note these issues were patched in 0.6.2.8, though it broke functionality and the vendor has not responded to our follow-ups. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/d3beee75-0480-4504-a177-45f8cd32cf36?source=cve - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3117664%40wp-accessibility-helper&new=3117664%40wp-accessibility-helper&sfp_email=&sfph_mail= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3124.
CVE ID: CVE-2015-3124 Date Updated: 2024-08-06T05:39:30.479Z Date Published: 2015-07-09T16:00:00 Description: Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/37849/ - http://www.securitytracker.com/id/1032810 - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html - http://rhn.redhat.com/errata/RHSA-2015-1214.html - http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html - https://security.gentoo.org/glsa/201507-13 - https://helpx.adobe.com/security/products/flash-player/apsb15-16.html - http://www.securityfocus.com/bid/75590 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24939.
CVE ID: CVE-2024-24939 Date Updated: 2024-08-01T23:36:20.565Z Date Published: 2024-02-06T09:21:29.788Z Description: In JetBrains Rider before 2023.3.3 logging of environment variables containing secret values was possible No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jetbrains.com/privacy-security/issues-fixed/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-35762.
CVE ID: CVE-2023-35762 Date Updated: 2024-08-29T20:44:07.383Z Date Published: 2023-11-20T16:25:56.318Z Description: Versions of INEA ME RTU firmware 3.36b and prior are vulnerable to operating system (OS) command injection, which could allow remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33205.
CVE ID: CVE-2021-33205 Date Updated: 2024-08-03T23:42:20.227Z Date Published: 2021-06-11T11:31:08 Description: Western Digital EdgeRover before 0.25 has an escalation of privileges vulnerability where a low privileged user could load malicious content into directories with higher privileges, because of how Node.js is used. An attacker can gain admin privileges and carry out malicious activities such as creating a fake library and stealing user credentials. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.westerndigital.com/support/productsecurity/wdc-21007-edgerover-windows-app-ver-0-25 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-36260.
CVE ID: CVE-2020-36260 Date Updated: 2022-08-22T15:02:09 Date Published: 2022-08-22T15:02:09 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39400.
CVE ID: CVE-2024-39400 Date Updated: 2024-08-14T14:15:17.538Z Date Published: 2024-08-14T11:57:07.948Z Description: Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an admin attacker to inject and execute arbitrary JavaScript code within the context of the user's browser session. Exploitation of this issue requires user interaction, such as convincing a victim to click on a malicious link. Confidentiality and integrity impact is high as it affects other admin accounts. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/magento/apsb24-61.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-46048.
CVE ID: CVE-2024-46048 Date Updated: 2024-09-13T15:45:54.151Z Date Published: 2024-09-13T00:00:00 Description: Tenda FH451 v1.0.0.9 has a command injection vulnerability in the formexeCommand function i No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/BenJpopo/V/blob/main/Tenda/FH451/formexeCommand.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9977.
CVE ID: CVE-2014-9977 Date Updated: 2024-09-17T03:12:22.033Z Date Published: 2017-08-18T18:00:00Z Description: In all Qualcomm products with Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in PlayReady DRM. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-07-01 - http://www.securityfocus.com/bid/99467 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-31480.
CVE ID: CVE-2024-31480 Date Updated: 2024-08-02T01:52:57.134Z Date Published: 2024-05-14T22:34:42.949Z Description: Unauthenticated Denial of Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-7198.
CVE ID: CVE-2008-7198 Date Updated: 2024-09-16T23:31:16.860Z Date Published: 2009-09-10T10:00:00Z Description: Multiple unspecified vulnerabilities in phpns before 2.1.1beta1 have unknown impact and attack vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/40571 - http://archives.neohapsis.com/archives/apps/freshmeat/2008-01/0029.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49930.
CVE ID: CVE-2023-49930 Date Updated: 2024-08-02T22:09:49.619Z Date Published: 2024-02-28T00:00:00 Description: An issue was discovered in Couchbase Server before 7.2.4. cURL calls to /diag/eval are not sufficiently restricted. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://forums.couchbase.com/tags/security - https://docs.couchbase.com/server/current/release-notes/relnotes.html - https://www.couchbase.com/alerts/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10516.
CVE ID: CVE-2016-10516 Date Updated: 2024-08-06T03:21:52.162Z Date Published: 2017-10-23T16:00:00 Description: Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML via a field that contains an exception message. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://blog.neargle.com/2016/09/21/flask-src-review-get-a-xss-from-debuger/ - https://lists.debian.org/debian-lts-announce/2017/11/msg00037.html - https://github.com/pallets/werkzeug/pull/1001 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1527.
CVE ID: CVE-2008-1527 Date Updated: 2024-08-07T08:24:42.614Z Date Published: 2008-03-26T10:00:00 Description: ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), support authentication over HTTP via a hash string in the hiddenPassword field, which allows remote attackers to obtain access via a replay attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/489009/100/0/threaded - http://www.gnucitizen.org/projects/router-hacking-challenge/ - http://www.procheckup.com/Hacking_ZyXEL_Gateways.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4535.
CVE ID: CVE-2008-4535 Date Updated: 2024-08-07T10:17:09.809Z Date Published: 2008-10-10T18:00:00 Description: Cross-site scripting (XSS) vulnerability in EC-CUBE Ver2 2.1.2a and earlier, EC-CUBE Ver2 Beta(RC) 2.2.0-beta and earlier, and EC-CUBE Community Edition Nighly-Build r17623 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2008-4536 and CVE-2008-4537. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/31509 - http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000064.html - http://jvn.jp/en/jp/JVN99916563/index.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/45591 - http://www.ec-cube.net/release/detail.php?release_id=193 - http://secunia.com/advisories/32065 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8718.
CVE ID: CVE-2020-8718 Date Updated: 2024-08-04T10:12:09.520Z Date Published: 2020-08-13T02:43:18 Description: Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html - https://security.netapp.com/advisory/ntap-20200814-0002/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0231.
CVE ID: CVE-2018-0231 Date Updated: 2024-08-05T03:21:13.898Z Date Published: 2018-04-19T20:00:00 Description: A vulnerability in the Transport Layer Security (TLS) library of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a reload of the affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a malicious TLS message to an interface enabled for Secure Layer Socket (SSL) services on an affected device. Messages using SSL Version 3 (SSLv3) or SSL Version 2 (SSLv2) cannot be be used to exploit this vulnerability. An exploit could allow the attacker to cause a buffer underflow, triggering a crash on an affected device. This vulnerability affects Cisco ASA Software and Cisco FTD Software that is running on the following Cisco products: Adaptive Security Virtual Appliance (ASAv), Firepower Threat Defense Virtual (FTDv), Firepower 2100 Series Security Appliance. Cisco Bug IDs: CSCve18902, CSCve34335, CSCve38446. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-asa3 - http://www.securitytracker.com/id/1040725 - https://ics-cert.us-cert.gov/advisories/ICSA-18-184-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18598.
CVE ID: CVE-2017-18598 Date Updated: 2024-08-05T21:28:55.933Z Date Published: 2019-09-10T10:58:20 Description: The Qards plugin through 2017-10-11 for WordPress has XSS via a remote document specified in the url parameter to html2canvasproxy.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpvulndb.com/vulnerabilities/8934 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2200.
CVE ID: CVE-2011-2200 Date Updated: 2024-08-06T22:53:17.198Z Date Published: 2011-06-22T22:00:00 Description: The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct unspecified state-modification attacks via crafted messages. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://openwall.com/lists/oss-security/2011/06/13/12 - http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.2&id=6519a1f77c61d753d4c97efd6e15630eb275336e - http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.4 - http://lists.freedesktop.org/archives/dbus/2011-May/014408.html - http://www.redhat.com/support/errata/RHSA-2011-1132.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/67974 - https://bugs.freedesktop.org/show_bug.cgi?id=38120 - http://cgit.freedesktop.org/dbus/dbus/tree/NEWS?h=dbus-1.2 - http://secunia.com/advisories/44896 - https://bugzilla.redhat.com/show_bug.cgi?id=712676 - http://openwall.com/lists/oss-security/2011/06/12/1 - http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.4&id=c3223ba6c401ba81df1305851312a47c485e6cd7 - http://openwall.com/lists/oss-security/2011/06/12/2 - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629938 - http://lists.freedesktop.org/archives/dbus/2007-March/007357.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1568.
CVE ID: CVE-2020-1568 Date Updated: 2024-08-04T06:39:10.544Z Date Published: 2020-08-17T19:13:45 Description: A remote code execution vulnerability exists when Microsoft Edge PDF Reader improperly handles objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit the vulnerability, in a web-based attack scenario, an attacker could host a website that contains malicious PDF content. In addition, compromised websites and websites that accept or host user-provided content could contain specially crafted PDF content that could exploit the vulnerability. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could trick a user into clicking a link that takes the user to the attacker's site. The security update addresses the vulnerability by modifying how Microsoft Edge PDF Reader handles objects in memory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1568 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.