instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2024-45172.
CVE ID: CVE-2024-45172 Date Updated: 2024-09-06T06:03:36.295Z Date Published: 2024-09-04T00:00:00 Description: An issue was discovered in za-internet C-MOR Video Surveillance 5.2401 and 6.00PL01. Due to missing protection mechanisms, the C-MOR web interface is vulnerable to cross-site request forgery (CSRF) attacks. The C-MOR web interface offers no protection against cross-site request forgery (CSRF) attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-022.txt - https://www.syss.de/pentest-blog/mehrere-sicherheitsschwachstellen-in-videoueberwachungssoftware-c-mor-syss-2024-020-bis-030 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6861.
CVE ID: CVE-2013-6861 Date Updated: 2024-09-16T22:39:53.640Z Date Published: 2013-11-23T18:00:00Z Description: Unspecified vulnerability in SAP Sybase Adaptive Server Enterprise (ASE) 15.0.3 before 15.0.3 ESD#4.3, 15.5 before 15.5 ESD#5.3, and 15.7 before 15.7 SP50 or 15.7 SP100 allows local users to obtain sensitive information via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://service.sap.com/sap/support/notes/1809246 - http://www.sybase.com/detail?id=1099371 - http://scn.sap.com/docs/DOC-8218 - http://secunia.com/advisories/55537 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-20340.
CVE ID: CVE-2020-20340 Date Updated: 2024-08-04T14:15:29.006Z Date Published: 2021-09-01T19:30:31 Description: A SQL injection vulnerability in the 4.edu.php\conn\function.php component of S-CMS v1.0 allows attackers to access sensitive database information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/mntn0x/POC/blob/master/S-CMS/S-CMS-SQL%E6%B3%A8%E5%85%A5.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5754.
CVE ID: CVE-2023-5754 Date Updated: 2024-08-02T08:07:32.658Z Date Published: 2023-10-26T19:47:06.226Z Description: Sielco PolyEco1000 uses a weak set of default administrative credentials that can be easily guessed in remote password attacks and gain full control of the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0788.
CVE ID: CVE-2017-0788 Date Updated: 2024-09-16T18:33:57.751Z Date Published: 2017-09-08T20:00:00Z Description: A elevation of privilege vulnerability in the Broadcom wi-fi driver. Product: Android. Versions: Android kernel. Android ID: A-37722328. References: B-V2017053103. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-09-01 - http://www.securityfocus.com/bid/100655 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-44199.
CVE ID: CVE-2022-44199 Date Updated: 2024-08-03T13:47:05.727Z Date Published: 2022-11-22T00:00:00 Description: Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter openvpn_server_ip. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.netgear.com/about/security/ - https://github.com/RobinWang825/IoT_vuln/tree/main/Netgear/R7000P/16 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43855.
CVE ID: CVE-2022-43855 Date Updated: 2024-08-03T13:40:06.581Z Date Published: 2024-03-08T17:52:57.326Z Description: IBM SPSS Statistics 26.0, 27.0.1, and 28.0 could allow a local user to create multiple files that could exhaust the file handles capacity and cause a denial of service. IBM X-Force ID: 230235. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7130881 - https://exchange.xforce.ibmcloud.com/vulnerabilities/239235 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-8214.
CVE ID: CVE-2017-8214 Date Updated: 2024-09-16T19:56:55.971Z Date Published: 2017-11-22T19:00:00Z Description: Honor 8,Honor V8,Honor 9,Honor V9,Nova 2,Nova 2 Plus,P9,P10 Plus,Toronto Huawei smart phones with software of versions earlier than FRD-AL00C00B391, versions earlier than FRD-DL00C00B391, versions earlier than KNT-AL10C00B391, versions earlier than KNT-AL20C00B391, versions earlier than KNT-UL10C00B391, versions earlier than KNT-TL10C00B391, versions earlier than Stanford-AL00C00B175, versions earlier than Stanford-AL10C00B175, versions earlier than Stanford-TL00C01B175, versions earlier than Duke-AL20C00B191, versions earlier than Duke-TL30C01B191, versions earlier than Picasso-AL00C00B162, versions earlier than Picasso-TL00C01B162 , versions earlier than Barca-AL00C00B162, versions earlier than Barca-TL00C00B162, versions earlier than EVA-AL10C00B396SP03, versions earlier than EVA-CL00C92B396, versions earlier than EVA-DL00C17B396, versions earlier than EVA-TL00C01B396 , versions earlier than Vicky-AL00AC00B172, versions earlier than Toronto-AL00AC00B191, versions earlier than Toronto-TL10C01B191 have an unlock code verification bypassing vulnerability. An attacker with the root privilege of a mobile can exploit this vulnerability to bypass the unlock code verification and unlock the mobile phone bootloader. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170807-01-smartphone-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16764.
CVE ID: CVE-2020-16764 Date Updated: 2021-12-20T22:51:14 Date Published: 2021-12-20T22:51:14 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6806.
CVE ID: CVE-2019-6806 Date Updated: 2024-08-04T20:31:04.311Z Date Published: 2019-05-22T20:04:46 Description: A CWE-200: Information Exposure vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause the disclosure of SNMP information when reading variables in the controller using Modbus. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/ - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0769 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0432.
CVE ID: CVE-2013-0432 Date Updated: 2024-08-06T14:25:10.241Z Date Published: 2013-02-02T00:00:00 Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient clipboard access premission checks." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://security.gentoo.org/glsa/glsa-201406-32.xml - http://www.mandriva.com/security/advisories?name=MDVSA-2013:095 - http://marc.info/?l=bugtraq&m=136570436423916&w=2 - http://www.us-cert.gov/cas/techalerts/TA13-032A.html - http://rhn.redhat.com/errata/RHSA-2013-0236.html - http://rhn.redhat.com/errata/RHSA-2013-1455.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16567 - http://www.kb.cert.org/vuls/id/858729 - http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00034.html - http://rhn.redhat.com/errata/RHSA-2013-0237.html - http://marc.info/?l=bugtraq&m=136439120408139&w=2 - http://rhn.redhat.com/errata/RHSA-2013-0247.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19489 - http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=907219 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19181 - http://marc.info/?l=bugtraq&m=136733161405818&w=2 - http://marc.info/?l=bugtraq&m=136439120408139&w=2 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19426 - http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html - http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html - http://rhn.redhat.com/errata/RHSA-2013-0246.html - http://icedtea.classpath.org/hg/release/icedtea7-forest-2.3/jdk/rev/e46d557465da - http://rhn.redhat.com/errata/RHSA-2013-1456.html - http://marc.info/?l=bugtraq&m=136570436423916&w=2 - http://rhn.redhat.com/errata/RHSA-2013-0245.html - http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html - http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.6/NEWS - http://marc.info/?l=bugtraq&m=136733161405818&w=2 - http://www.securityfocus.com/bid/57727 - https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0056 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-36071.
CVE ID: CVE-2020-36071 Date Updated: 2024-08-04T17:16:14.107Z Date Published: 2023-04-06T00:00:00 Description: SQL injection vulnerability found in Tailor Management System v.1 allows a remote authenticated attacker to execute arbitrary code via the customer parameter of the email.php page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Abdallah-Fouad-X/CVE-s/blob/main/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-23889.
CVE ID: CVE-2021-23889 Date Updated: 2024-08-03T19:14:09.155Z Date Published: 2021-03-26T09:30:15 Description: Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO) prior to 5.10 Update 10 allows ePO administrators to inject arbitrary web script or HTML via multiple parameters where the administrator's entries were not correctly sanitized. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kc.mcafee.com/corporate/index?page=content&id=SB10352 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8196.
CVE ID: CVE-2016-8196 Date Updated: 2021-04-09T16:16:24 Date Published: 2021-04-09T16:16:24 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-20046.
CVE ID: CVE-2024-20046 Date Updated: 2024-08-01T21:52:31.553Z Date Published: 2024-04-01T02:35:05.911Z Description: In battery, there is a possible escalation of privilege due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08485622; Issue ID: ALPS08485622. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/April-2024 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1961.
CVE ID: CVE-2013-1961 Date Updated: 2024-08-06T15:20:37.334Z Date Published: 2013-07-03T18:00:00 Description: Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/53237 - http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105253.html - http://www.debian.org/security/2013/dsa-2698 - http://secunia.com/advisories/53765 - http://lists.opensuse.org/opensuse-updates/2013-06/msg00080.html - https://bugzilla.redhat.com/show_bug.cgi?id=952131 - http://rhn.redhat.com/errata/RHSA-2014-0223.html - http://seclists.org/oss-sec/2013/q2/254 - http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105828.html - http://www.securityfocus.com/bid/59607 - http://lists.opensuse.org/opensuse-updates/2013-06/msg00058.html - http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104916.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46862.
CVE ID: CVE-2023-46862 Date Updated: 2024-08-02T20:53:21.892Z Date Published: 2023-10-29T00:00:00 Description: An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/torvalds/linux/commit/7644b1a1c9a7ae8ab99175989bfc8676055edb46 - https://bugzilla.kernel.org/show_bug.cgi?id=218032#c4 - https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27019.
CVE ID: CVE-2023-27019 Date Updated: 2024-08-02T12:01:32.273Z Date Published: 2023-04-07T00:00:00 Description: Tenda AC10 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the sub_458FBC function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/8/8.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2859.
CVE ID: CVE-2023-2859 Date Updated: 2024-08-02T06:33:05.672Z Date Published: 2023-05-24T00:00:00 Description: Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.9. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/d7b8ea75-c74a-4721-89bb-12e5c80fb0ba - https://github.com/nilsteampassnet/teampass/commit/1f51482a0c4d152ca876844212b0f8f3cb9387af No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2335.
CVE ID: CVE-2018-2335 Date Updated: 2019-01-22T17:57:02 Date Published: 2019-01-22T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-44487.
CVE ID: CVE-2023-44487 Date Updated: 2024-08-19T07:48:04.546Z Date Published: 2023-10-10T00:00:00 Description: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73 - https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/ - https://aws.amazon.com/security/security-bulletins/AWS-2023-011/ - https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack - https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/ - https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/ - https://news.ycombinator.com/item?id=37831062 - https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/ - https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack - https://github.com/envoyproxy/envoy/pull/30055 - https://github.com/haproxy/haproxy/issues/2312 - https://github.com/eclipse/jetty.project/issues/10679 - https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764 - https://github.com/nghttp2/nghttp2/pull/1961 - https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61 - https://github.com/alibaba/tengine/issues/1872 - https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2 - https://news.ycombinator.com/item?id=37830987 - https://news.ycombinator.com/item?id=37830998 - https://github.com/caddyserver/caddy/issues/5877 - https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/ - https://github.com/bcdannyboy/CVE-2023-44487 - https://github.com/grpc/grpc-go/pull/6703 - https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244 - https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0 - https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html - https://my.f5.com/manage/s/article/K000137106 - https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/ - https://bugzilla.proxmox.com/show_bug.cgi?id=4988 - https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9 - https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected - https://github.com/microsoft/CBL-Mariner/pull/6381 - https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo - https://github.com/facebook/proxygen/pull/466 - https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088 - https://github.com/micrictor/http2-rst-stream - https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve - https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/ - https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf - https://github.com/h2o/h2o/pull/3291 - https://github.com/nodejs/node/pull/50121 - https://github.com/dotnet/announcements/issues/277 - https://github.com/golang/go/issues/63417 - https://github.com/advisories/GHSA-vx74-f528-fxqg - https://github.com/apache/trafficserver/pull/10564 - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487 - https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14 - https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q - https://www.openwall.com/lists/oss-security/2023/10/10/6 - https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487 - https://github.com/opensearch-project/data-prepper/issues/3474 - https://github.com/kubernetes/kubernetes/pull/121120 - https://github.com/oqtane/oqtane.framework/discussions/3367 - https://github.com/advisories/GHSA-xpw8-rcwv-8f8p - https://netty.io/news/2023/10/10/4-1-100-Final.html - https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487 - https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/ - https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack - https://news.ycombinator.com/item?id=37837043 - https://github.com/kazu-yamamoto/http2/issues/93 - https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html - https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1 - https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113 - https://www.debian.org/security/2023/dsa-5522 - https://www.debian.org/security/2023/dsa-5521 - https://access.redhat.com/security/cve/cve-2023-44487 - https://github.com/ninenines/cowboy/issues/1615 - https://github.com/varnishcache/varnish-cache/issues/3996 - https://github.com/tempesta-tech/tempesta/issues/1986 - https://blog.vespa.ai/cve-2023-44487/ - https://github.com/etcd-io/etcd/issues/16740 - https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event - https://istio.io/latest/news/security/istio-security-2023-004/ - https://github.com/junkurihara/rust-rpxy/issues/97 - https://bugzilla.suse.com/show_bug.cgi?id=1216123 - https://bugzilla.redhat.com/show_bug.cgi?id=2242803 - https://ubuntu.com/security/CVE-2023-44487 - https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125 - https://github.com/advisories/GHSA-qppj-fm5r-hxr3 - https://github.com/apache/httpd-site/pull/10 - https://github.com/projectcontour/contour/pull/5826 - https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632 - https://github.com/line/armeria/pull/5232 - https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/ - https://security.paloaltonetworks.com/CVE-2023-44487 - https://github.com/akka/akka-http/issues/4323 - https://github.com/openresty/openresty/issues/930 - https://github.com/apache/apisix/issues/10320 - https://github.com/Azure/AKS/issues/3947 - https://github.com/Kong/kong/discussions/11741 - https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487 - https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/ - https://github.com/caddyserver/caddy/releases/tag/v2.7.5 - https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html - http://www.openwall.com/lists/oss-security/2023/10/13/4 - http://www.openwall.com/lists/oss-security/2023/10/13/9 - https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/ - https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/ - https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/ - https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html - https://security.netapp.com/advisory/ntap-20231016-0001/ - https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html - http://www.openwall.com/lists/oss-security/2023/10/18/4 - http://www.openwall.com/lists/oss-security/2023/10/18/8 - http://www.openwall.com/lists/oss-security/2023/10/19/6 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/ - http://www.openwall.com/lists/oss-security/2023/10/20/8 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/ - https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html - https://www.debian.org/security/2023/dsa-5540 - https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html - https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/ - https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html - https://www.debian.org/security/2023/dsa-5549 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/ - https://www.debian.org/security/2023/dsa-5558 - https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html - https://security.gentoo.org/glsa/202311-09 - https://www.debian.org/security/2023/dsa-5570 - https://security.netapp.com/advisory/ntap-20240426-0007/ - https://security.netapp.com/advisory/ntap-20240621-0006/ - https://security.netapp.com/advisory/ntap-20240621-0007/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4322.
CVE ID: CVE-2018-4322 Date Updated: 2024-08-05T05:11:22.688Z Date Published: 2019-04-03T17:43:14 Description: This issue was addressed with improved entitlements. This issue affected versions prior to iOS 12. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/kb/HT209106 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3766.
CVE ID: CVE-2013-3766 Date Updated: 2024-09-16T16:12:27.692Z Date Published: 2013-10-16T15:00:00Z Description: Unspecified vulnerability in the Primavera P6 Enterprise Project Portfolio Management component in Oracle Primavera Products Suite 8.1, 8.2, and 8.3 allows remote authenticated users to affect integrity via unknown vectors related to Web Access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27073.
CVE ID: CVE-2023-27073 Date Updated: 2024-08-02T12:01:32.304Z Date Published: 2023-03-14T00:00:00 Description: A Cross-Site Request Forgery (CSRF) in Online Food Ordering System v1.0 allows attackers to change user details and credentials via a crafted POST request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://projectworlds.in/free-projects/php-projects/food-ordering-system-project-in-php/ - https://github.com/bhaveshkush007/CVEs/blob/main/CVE-2023-27073.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27621.
CVE ID: CVE-2021-27621 Date Updated: 2024-08-03T21:26:10.597Z Date Published: 2021-06-09T13:25:25 Description: Information Disclosure vulnerability in UserAdmin application in SAP NetWeaver Application Server for Java, versions - 7.11,7.20,7.30,7.31,7.40 and 7.50 allows attackers to access restricted information by entering malicious server name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999 - https://launchpad.support.sap.com/#/notes/3023299 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7790.
CVE ID: CVE-2019-7790 Date Updated: 2024-08-04T20:54:28.480Z Date Published: 2019-05-22T13:58:13 Description: Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-18.html - http://www.securityfocus.com/bid/108326 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20005.
CVE ID: CVE-2018-20005 Date Updated: 2024-08-05T11:51:18.106Z Date Published: 2018-12-10T06:00:00 Description: An issue has been found in Mini-XML (aka mxml) 2.12. It is a use-after-free in mxmlWalkNext in mxml-search.c, as demonstrated by mxmldoc. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/michaelrsweet/mxml/issues/234 - https://github.com/fouzhe/security/tree/master/mxml#heap-use-after-free-in-function-mxmlwalknext - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N53IJHDYR5HVQLKH4J6B27OEQLGKSGY5/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RNWF6BAU7S42O4LE4B74KIMHFE2HDNMI/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4657.
CVE ID: CVE-2017-4657 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0415.
CVE ID: CVE-2016-0415 Date Updated: 2024-08-05T22:15:24.405Z Date Published: 2016-01-21T02:00:00 Description: Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control 11.1.0.1, 12.1.0.4, and 12.1.0.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to UI Framework. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html - http://www.securitytracker.com/id/1034734 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0741.
CVE ID: CVE-2014-0741 Date Updated: 2024-08-06T09:27:19.484Z Date Published: 2014-02-27T01:00:00 Description: The certificate-import feature in the Certificate Authority Proxy Function (CAPF) CLI implementation in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier allows local users to read or modify arbitrary files via a crafted command, aka Bug ID CSCum95461. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/viewAlert.x?alertId=33046 - http://www.securitytracker.com/id/1029843 - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0741 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5027.
CVE ID: CVE-2014-5027 Date Updated: 2024-08-06T11:34:37.207Z Date Published: 2014-07-25T19:00:00 Description: Cross-site scripting (XSS) vulnerability in Review Board 1.7.x before 1.7.27 and 2.0.x before 2.0.4 allows remote attackers to inject arbitrary web script or HTML via a query parameter to a diff fragment page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/oss-sec/2014/q3/207 - https://www.reviewboard.org/docs/releasenotes/reviewboard/2.0.4 - http://secunia.com/advisories/60243 - https://www.reviewboard.org/news/2014/07/22/review-board-1-7-27-and-2-0-3-security-releases - http://seclists.org/oss-sec/2014/q3/219 - http://www.securityfocus.com/bid/68858 - https://www.reviewboard.org/docs/releasenotes/reviewboard/1.7.27 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-1641.
CVE ID: CVE-2021-1641 Date Updated: 2024-08-03T16:18:10.874Z Date Published: 2021-01-12T19:41:57 Description: Microsoft SharePoint Server Spoofing Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1641 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2067.
CVE ID: CVE-2008-2067 Date Updated: 2024-08-07T08:49:56.934Z Date Published: 2008-05-02T23:00:00 Description: SQL injection vulnerability in bb_admin.php in miniBB 2.2a allows remote attackers to execute arbitrary SQL commands via the whatus parameter in a searchusers2 action. NOTE: it was later reported that other versions before 3.0.1 are also vulnerable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.minibb.com/download.php?file=minibb_update - http://www.securityfocus.com/bid/61116 - https://exchange.xforce.ibmcloud.com/vulnerabilities/42270 - http://secunia.com/advisories/30004 - http://www.securityfocus.com/archive/1/491375/100/0/threaded - http://seclists.org/fulldisclosure/2013/Jul/102 - https://www.mavitunasecurity.com/xss-and-sql-injection-vulnerabilities-in-minibb/ - http://www.minibb.com/forums/news-9/minibb-3.0.1-released-stable-fixed-secured-dedicated-6059.html - http://securityreason.com/securityalert/3846 - http://osvdb.org/95121 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7475.
CVE ID: CVE-2016-7475 Date Updated: 2024-09-17T01:15:55.297Z Date Published: 2018-10-08T19:00:00Z Description: Under some circumstances on BIG-IP 12.0.0-12.1.0, 11.6.0-11.6.1, or 11.4.0-11.5.4 HF1, the Traffic Management Microkernel (TMM) may not properly clean-up pool member network connections when using SPDY or HTTP/2 virtual server profiles. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.f5.com/csp/article/K01587042 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15931.
CVE ID: CVE-2019-15931 Date Updated: 2024-08-05T01:03:32.586Z Date Published: 2019-12-12T13:38:23 Description: Intesync Solismed 3.3sp allows Directory Traversal, a different vulnerability than CVE-2019-16246. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.bishopfox.com/blog/news-category/advisories/ - https://www.solismed.com/ - https://bishopfox.com - https://know.bishopfox.com/advisories/solismed-critical No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-31218.
CVE ID: CVE-2023-31218 Date Updated: 2024-08-02T14:53:30.249Z Date Published: 2023-08-18T13:28:46.662Z Description: Cross-Site Request Forgery (CSRF) leading to Stored Cross-Site Scripting (XSS) vulnerability in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional plugin <= 1.0.6 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/bulk-editor/wordpress-wolf-wordpress-posts-bulk-editor-and-manager-professional-plugin-1-0-6-cross-site-scripting-xss-via-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0509.
CVE ID: CVE-2011-0509 Date Updated: 2024-08-06T21:58:25.457Z Date Published: 2011-01-20T18:00:00 Description: Cross-site scripting (XSS) vulnerability in Vaadin before 6.4.9 allows remote attackers to inject arbitrary web script or HTML via unknown vectors related to the index page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/45779 - http://vaadin.com/download/release/6.4/6.4.9/release-notes.html - http://dev.vaadin.com/ticket/6257 - http://osvdb.org/70398 - http://secunia.com/advisories/42879 - https://exchange.xforce.ibmcloud.com/vulnerabilities/64626 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27419.
CVE ID: CVE-2021-27419 Date Updated: 2024-08-03T20:48:17.251Z Date Published: 2022-05-03T20:20:49 Description: uClibc-ng versions prior to 1.0.37 are vulnerable to integer wrap-around in functions malloc-simple. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsa-21-119-04 - https://downloads.uclibc-ng.org/releases/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0244.
CVE ID: CVE-2024-0244 Date Updated: 2024-08-01T17:41:16.189Z Date Published: 2024-02-06T00:24:03.211Z Description: Buffer overflow in CPCA PCFAX number process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*:Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS MF750C Series/Color imageCLASS X MF1333C firmware v03.07 and earlier sold in US. i-SENSYS MF754Cdw/C1333iF firmware v03.07 and earlier sold in Europe. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://psirt.canon/advisory-information/cp2024-001/ - https://canon.jp/support/support-info/240205vulnerability-response - https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers - https://www.canon-europe.com/support/product-security-latest-news/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3326.
CVE ID: CVE-2009-3326 Date Updated: 2024-08-07T06:22:24.413Z Date Published: 2009-09-23T10:00:00 Description: SQL injection vulnerability in index.php in CMScontrol Content Management System 7.x allows remote attackers to execute arbitrary SQL commands via the id_menu parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/9727 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34592.
CVE ID: CVE-2022-34592 Date Updated: 2024-08-03T09:15:15.573Z Date Published: 2022-07-07T00:00:00 Description: Wavlink WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability via the function obtw. This vulnerability allows attackers to execute arbitrary commands via a crafted POST request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/winmt/CVE/blob/main/WAVLINK%20WL-WN575A3/README.md - https://github.com/winmt/my-vuls/tree/main/WAVLINK%20WL-WN575A3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-25474.
CVE ID: CVE-2020-25474 Date Updated: 2024-08-04T15:33:05.616Z Date Published: 2020-11-24T14:48:30 Description: SimplePHPscripts News Script PHP Pro 2.3 is affected by a Cross Site Scripting (XSS) vulnerability via the editor_name parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://websec.nl - https://news.websec.nl - https://www.linkedin.com/feed/update/urn:li:activity:6736997788850122752 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6372.
CVE ID: CVE-2008-6372 Date Updated: 2024-08-07T11:27:35.780Z Date Published: 2009-03-02T19:00:00 Description: SQL injection vulnerability in default.asp in Ocean12 FAQ Manager Pro 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter in a Cat action. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/46945 - http://www.securityfocus.com/bid/32524 - http://secunia.com/advisories/32930 - https://www.exploit-db.com/exploits/7271 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-9011.
CVE ID: CVE-2024-9011 Date Updated: 2024-09-20T17:30:13.367Z Date Published: 2024-09-20T00:00:06.610Z Description: A vulnerability, which was classified as critical, was found in code-projects Crud Operation System 1.0. Affected is an unknown function of the file updata.php. The manipulation of the argument sid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.278166 - https://vuldb.com/?ctiid.278166 - https://vuldb.com/?submit.410396 - https://github.com/ppp-src/a/issues/14 - https://code-projects.org/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-28898.
CVE ID: CVE-2020-28898 Date Updated: 2024-08-04T16:40:59.837Z Date Published: 2021-04-15T18:03:16 Description: In QED ResourceXpress through 4.9k, a large numeric or alphanumeric value submitted in specific URL parameters causes a server error in script execution due to insufficient input validation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://resourcexpress.atlassian.net/wiki/spaces/RSG/pages/1318289409/v2021.2+-+March+2021 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-9350.
CVE ID: CVE-2017-9350 Date Updated: 2024-08-05T17:02:44.363Z Date Published: 2017-06-02T05:04:00 Description: In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by checking for a negative length. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13649 - https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dbc7cb0bbdd501fa96e0cb98668f6d6bf17ac4e6 - https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1212 - http://www.securityfocus.com/bid/98806 - http://www.securitytracker.com/id/1038612 - https://www.wireshark.org/security/wnpa-sec-2017-28.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3676.
CVE ID: CVE-2015-3676 Date Updated: 2024-08-06T05:47:57.781Z Date Published: 2015-07-03T01:00:00 Description: AppleGraphicsControl in Apple OS X before 10.10.4 allows attackers to obtain sensitive memory-layout information via a crafted app. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html - http://www.securityfocus.com/bid/75493 - http://www.securitytracker.com/id/1032760 - http://support.apple.com/kb/HT204942 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6675.
CVE ID: CVE-2013-6675 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13578.
CVE ID: CVE-2020-13578 Date Updated: 2024-08-04T12:25:16.139Z Date Published: 2021-02-10T00:00:00 Description: A denial-of-service vulnerability exists in the WS-Security plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1189 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMTJ3SJJ22SFLBLPKFADV7NVBH7UFA23/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JINMAJB4WQASTKTNSPQL3V7YMSYPKIA2/ - https://lists.debian.org/debian-lts-announce/2024/02/msg00015.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23128.
CVE ID: CVE-2024-23128 Date Updated: 2024-08-01T22:59:30.695Z Date Published: 2024-02-22T03:18:00.232Z Description: A maliciously crafted MODEL file, when parsed in libodxdll.dll and ASMDATAX229A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 - https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 - https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8206.
CVE ID: CVE-2018-8206 Date Updated: 2024-08-05T06:46:13.608Z Date Published: 2018-07-11T00:00:00 Description: A denial of service vulnerability exists when Windows improperly handles File Transfer Protocol (FTP) connections, aka "Windows FTP Server Denial of Service Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8206 - http://www.securityfocus.com/bid/104629 - http://www.securitytracker.com/id/1041262 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21653.
CVE ID: CVE-2023-21653 Date Updated: 2024-08-02T09:44:01.946Z Date Published: 2023-09-05T06:23:56.700Z Description: Transient DOS in Modem while processing RRC reconfiguration message. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1695.
CVE ID: CVE-2017-1695 Date Updated: 2024-09-17T02:53:17.348Z Date Published: 2019-02-15T20:00:00Z Description: IBM QRadar SIEM 7.2 and 7.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 134177. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/107060 - https://exchange.xforce.ibmcloud.com/vulnerabilities/134177 - https://www.ibm.com/support/docview.wss?uid=ibm10719107 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-47067.
CVE ID: CVE-2024-47067 Date Updated: 2024-09-30T17:24:16.581Z Date Published: 2024-09-30T15:39:28.219Z Description: AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://securitylab.github.com/advisories/GHSL-2023-220_Alist/ - https://github.com/alist-org/alist/commit/6100647310594868e931f3de1188ddd8bde93b78 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-43871.
CVE ID: CVE-2024-43871 Date Updated: 2024-09-15T17:54:39.420Z Date Published: 2024-08-21T00:06:22.964Z Description: In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu() It will cause memory leakage when use driver API devm_free_percpu() to free memory allocated by devm_alloc_percpu(), fixed by using devres_release() instead of devres_destroy() within devm_free_percpu(). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/700e8abd65b10792b2f179ce4e858f2ca2880f85 - https://git.kernel.org/stable/c/b044588a16a978cd891cb3d665dd7ae06850d5bf - https://git.kernel.org/stable/c/ef56dcdca8f2a53abc3a83d388b8336447533d85 - https://git.kernel.org/stable/c/3047f99caec240a88ccd06197af2868da1af6a96 - https://git.kernel.org/stable/c/3dcd0673e47664bc6c719ad47dadac6d55d5950d - https://git.kernel.org/stable/c/b67552d7c61f52f1271031adfa7834545ae99701 - https://git.kernel.org/stable/c/95065edb8ebb27771d5f1e898eef6ab43dc6c87c - https://git.kernel.org/stable/c/bd50a974097bb82d52a458bd3ee39fb723129a0c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19232.
CVE ID: CVE-2019-19232 Date Updated: 2024-08-05T02:09:39.576Z Date Published: 2019-12-19T20:37:09 Description: In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that this is not a vulnerability because running a command via sudo as a user not present in the local password database is an intentional feature. Because this behavior surprised some users, sudo 1.8.30 introduced an option to enable/disable this behavior with the default being disabled. However, this does not change the fact that sudo was behaving as intended, and as documented, in earlier versions No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sudo.ws/stable.html - https://www.sudo.ws/devel.html#1.8.30b2 - https://security.netapp.com/advisory/ntap-20200103-0004/ - https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58812 - https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58979 - https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/2019/12/warnmeldung_cb-k20-0001.html - https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1018-5506 - https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58103 - https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-19232 - https://access.redhat.com/security/cve/cve-2019-19232 - https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs76870 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IY6DZ7WMDKU4ZDML6MJLDAPG42B5WVUC/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6TKF36KOQUVJNBHSVJFA7BU3CCEYD2F/ - https://support.apple.com/kb/HT211100 - http://seclists.org/fulldisclosure/2020/Mar/31 - https://support.apple.com/en-gb/HT211100 - https://www.tenable.com/plugins/nessus/133936 - https://www.oracle.com/security-alerts/bulletinapr2020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24844.
CVE ID: CVE-2022-24844 Date Updated: 2024-08-03T04:20:50.699Z Date Published: 2022-04-13T21:10:10 Description: Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. The problem occurs in the following code in server/service/system/sys_auto_code_pgsql.go, which means that PostgreSQL must be used as the database for this vulnerability to occur. Users must: Require JWT login) and be using PostgreSQL to be affected. This issue has been resolved in version 2.5.1. There are no known workarounds. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-5g92-6hpp-w425 - https://github.com/flipped-aurora/gin-vue-admin/pull/1024 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5016.
CVE ID: CVE-2024-5016 Date Updated: 2024-08-01T20:55:10.382Z Date Published: 2024-06-25T20:23:46.895Z Description: In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization tool to achieve a Remote Code Execution as SYSTEM.  The vulnerability exists in the main message processing routines NmDistributed.DistributedServiceBehavior.OnMessage for server and NmDistributed.DistributedClient.OnMessage for clients. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.progress.com/network-monitoring - https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5725.
CVE ID: CVE-2015-5725 Date Updated: 2024-08-06T06:59:04.331Z Date Published: 2018-02-21T16:00:00 Description: SQL injection vulnerability in the offset method in the Active Record class in CodeIgniter before 2.2.4 allows remote attackers to execute arbitrary SQL commands via vectors involving the offset variable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://forum.codeigniter.com/thread-62743.html - https://github.com/bcit-ci/CodeIgniter/issues/4020 - https://www.codeigniter.com/userguide2/changelog.html - https://github.com/bcit-ci/CodeIgniter/commit/0dde92def6b9f276f05ff77abb07ead318f9ec23 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-36048.
CVE ID: CVE-2020-36048 Date Updated: 2024-08-04T17:16:14.103Z Date Published: 2021-01-07T23:24:33 Description: Engine.IO before 4.0.0 allows attackers to cause a denial of service (resource consumption) via a POST request to the long polling transport. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/socketio/engine.io/commit/734f9d1268840722c41219e69eb58318e0b2ac6b - https://blog.caller.xyz/socketio-engineio-dos/ - https://github.com/bcaller/kill-engine-io No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2118.
CVE ID: CVE-2022-2118 Date Updated: 2024-08-03T00:24:44.265Z Date Published: 2022-07-17T10:36:11 Description: The 404s WordPress plugin before 3.5.1 does not sanitise and escape its fields, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/9a19af60-d6e6-4fa3-82eb-3636599b814c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2366.
CVE ID: CVE-2009-2366 Date Updated: 2024-08-07T05:44:56.098Z Date Published: 2009-07-08T15:00:00 Description: SQL injection vulnerability in login.asp in DataCheck Solutions ForumPal FE 1.1 and ForumPal 1.5 allows remote attackers to execute arbitrary SQL commands via the (1) password parameter in 1.1 and (2) p_password parameter in 1.5. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.osvdb.org/55497 - https://exchange.xforce.ibmcloud.com/vulnerabilities/51403 - http://secunia.com/advisories/35603 - http://www.osvdb.org/55496 - http://www.exploit-db.com/exploits/9024 - http://secunia.com/advisories/35589 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27154.
CVE ID: CVE-2024-27154 Date Updated: 2024-08-02T00:27:59.466Z Date Published: 2024-06-14T02:58:55.751Z Description: Passwords are stored in clear-text logs. An attacker can retrieve passwords. As for the affected products/models/versions, see the reference URL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.toshibatec.com/information/20240531_01.html - https://www.toshibatec.com/information/pdf/information20240531_01.pdf - https://jvn.jp/en/vu/JVNVU97136265/index.html - http://seclists.org/fulldisclosure/2024/Jul/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-17514.
CVE ID: CVE-2020-17514 Date Updated: 2024-08-04T14:00:48.549Z Date Published: 2021-05-27T12:10:10 Description: Apache Fineract prior to 1.5.0 disables HTTPS hostname verification in ProcessorHelper in the configureClient method. Under typical deployments, a man in the middle attack could be successful. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://issues.apache.org/jira/browse/FINERACT-1211 - https://lists.apache.org/thread.html/rc011b25289c8a6e14f8bc6d07e727382a1df3c8cf2aa5369598bbf64%40%3Cdev.fineract.apache.org%3E - http://www.openwall.com/lists/oss-security/2021/05/27/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18133.
CVE ID: CVE-2018-18133 Date Updated: 2023-02-27T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49312.
CVE ID: CVE-2023-49312 Date Updated: 2024-08-02T21:53:44.977Z Date Published: 2023-11-26T00:00:00 Description: Precision Bridge PrecisionBridge.exe (aka the thick client) before 7.3.21 allows an integrity violation in which the same license key is used on multiple systems, via vectors involving a Process Hacker memory dump, error message inspection, and modification of a MAC address. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://precisionbridge.net/738vulnerability - https://processhacker.sourceforge.io/archive/website_v2/features.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36278.
CVE ID: CVE-2022-36278 Date Updated: 2024-08-03T10:00:04.240Z Date Published: 2023-02-16T20:00:05.751Z Description: Insufficient control flow management in the Intel(R) Battery Life Diagnostic Tool software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00726.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7525.
CVE ID: CVE-2015-7525 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-14403.
CVE ID: CVE-2020-14403 Date Updated: 2024-08-04T12:46:34.094Z Date Published: 2020-06-17T15:12:21 Description: An issue was discovered in LibVNCServer before 0.9.13. libvncserver/hextile.c allows out-of-bounds access via encodings. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13 - https://github.com/LibVNC/libvncserver/commit/74e8a70f2c9a5248d6718ce443e07c7ed314dfff - https://lists.debian.org/debian-lts-announce/2020/06/msg00035.html - https://usn.ubuntu.com/4434-1/ - https://lists.debian.org/debian-lts-announce/2020/08/msg00045.html - https://usn.ubuntu.com/4573-1/ - https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-29186.
CVE ID: CVE-2024-29186 Date Updated: 2024-08-28T14:01:37.957Z Date Published: 2024-03-22T17:07:10.899Z Description: Bref is an open-source project that helps users go serverless on Amazon Web Services with PHP. When Bref prior to version 2.1.17 is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed. In the parsing process, the `Content-Type` header of each part is read using the `Riverline/multipart-parser` library. The library, in the `StreamedPart::parseHeaderContent` function, performs slow multi-byte string operations on the header value. Precisely, the `mb_convert_encoding` function is used with the first (`$string`) and third (`$from_encoding`) parameters read from the header value. An attacker could send specifically crafted requests which would force the server into performing long operations with a consequent long billed duration. The attack has the following requirements and limitations: The Lambda should use the Event-Driven Function runtime and the `RequestHandlerInterface` handler and should implement at least an endpoint accepting POST requests; the attacker can send requests up to 6MB long (this is enough to cause a billed duration between 400ms and 500ms with the default 1024MB RAM Lambda image of Bref); and if the Lambda uses a PHP runtime <= php-82, the impact is higher as the billed duration in the default 1024MB RAM Lambda image of Bref could be brought to more than 900ms for each request. Notice that the vulnerability applies only to headers read from the request body as the request header has a limitation which allows a total maximum size of ~10KB. Version 2.1.17 contains a fix for this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/brefphp/bref/security/advisories/GHSA-j4hq-f63x-f39r - https://github.com/brefphp/bref/commit/5f7c0294628dbcec6305f638ff7e2dba8a1c2f45 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4141.
CVE ID: CVE-2019-4141 Date Updated: 2024-09-16T18:43:22.998Z Date Published: 2019-09-27T14:00:20.780461Z Description: IBM MQ 7.1.0.0 - 7.1.0.9, 7.5.0.0 - 7.5.0.9, 8.0.0.0 - 8.0.0.11, 9.0.0.0 - 9.0.0.6, 9.1.0.0 - 9.1.0.2, and 9.1.1 - 9.1.2 is vulnerable to a denial of service attack caused by a memory leak in the clustering code. IBM X-Force ID: 158337. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/876772 - https://exchange.xforce.ibmcloud.com/vulnerabilities/158337 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4564.
CVE ID: CVE-2013-4564 Date Updated: 2024-08-06T16:45:14.868Z Date Published: 2014-01-07T17:00:00 Description: Libreswan 3.6 allows remote attackers to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/56276 - https://lists.libreswan.org/pipermail/swan-announce/2013/000007.html - http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124928.html - https://libreswan.org/security/CVE-2013-4564/CVE-2013-4564.txt.asc - http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124943.html - http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124911.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5291.
CVE ID: CVE-2019-5291 Date Updated: 2024-08-04T19:54:52.966Z Date Published: 2019-12-13T14:35:50 Description: Some Huawei products have an insufficient verification of data authenticity vulnerability. A remote, unauthenticated attacker has to intercept specific packets between two devices, modify the packets, and send the modified packets to the peer device. Due to insufficient verification of some fields in the packets, an attacker may exploit the vulnerability to cause the target device to be abnormal. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-validation-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-9640.
CVE ID: CVE-2017-9640 Date Updated: 2024-08-05T17:11:02.350Z Date Published: 2017-08-25T19:00:00 Description: A Path Traversal issue was discovered in Automated Logic Corporation (ALC) ALC WebCTRL, i-Vu, SiteScan Web prior to 6.5; ALC WebCTRL, SiteScan Web 6.1 and prior; ALC WebCTRL, i-Vu 6.0 and prior; ALC WebCTRL, i-Vu, SiteScan Web 5.5 and prior; and ALC WebCTRL, i-Vu, SiteScan Web 5.2 and prior. An authenticated attacker may be able to overwrite files that are used to execute code. This vulnerability does not affect version 6.5 of the software. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/100452 - https://www.exploit-db.com/exploits/42543/ - https://ics-cert.us-cert.gov/advisories/ICSA-17-234-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6582.
CVE ID: CVE-2019-6582 Date Updated: 2024-08-04T20:23:22.276Z Date Published: 2019-06-12T13:47:57 Description: A vulnerability has been identified in Siveillance VMS 2017 R2 (All versions < V11.2a), Siveillance VMS 2018 R1 (All versions < V12.1a), Siveillance VMS 2018 R2 (All versions < V12.2a), Siveillance VMS 2018 R3 (All versions < V12.3a), Siveillance VMS 2019 R1 (All versions < V13.1a). An attacker with network access to port 80/TCP can change user-defined event properties without proper authorization. The security vulnerability could be exploited by an authenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation compromises integrity of the user-defined event properties and the availability of corresponding functionality. At the time of advisory publication no public exploitation of this security vulnerability was known. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-212009.pdf - https://ics-cert.us-cert.gov/advisories/ICSA-19-162-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-43322.
CVE ID: CVE-2024-43322 Date Updated: 2024-09-03T15:22:26.530Z Date Published: 2024-08-18T21:31:11.216Z Description: Authorization Bypass Through User-Controlled Key vulnerability in Dylan James Zephyr Project Manager.This issue affects Zephyr Project Manager: from n/a through 3.3.100. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-100-insecure-direct-object-references-idor-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20085.
CVE ID: CVE-2019-20085 Date Updated: 2024-08-05T02:32:10.512Z Date Published: 2019-12-30T02:28:29 Description: TVT NVMS-1000 devices allow GET /.. Directory Traversal No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/47774 - http://packetstormsecurity.com/files/157196/TVT-NVMS-1000-Directory-Traversal.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-20219.
CVE ID: CVE-2020-20219 Date Updated: 2024-08-04T14:15:28.832Z Date Published: 2021-07-21T13:25:16 Description: Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/igmp-proxy process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mikrotik.com/ - https://seclists.org/fulldisclosure/2021/May/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21331.
CVE ID: CVE-2023-21331 Date Updated: 2024-09-06T19:58:06.508Z Date Published: 2023-10-30T16:56:33.193Z Description: In InputMethod, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/docs/security/bulletin/android-14 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2645.
CVE ID: CVE-2010-2645 Date Updated: 2024-08-07T02:39:37.608Z Date Published: 2010-07-06T17:00:00 Description: Unspecified vulnerability in Google Chrome before 5.0.375.99, when WebGL is used, allows remote attackers to cause a denial of service (out-of-bounds read) via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html - http://code.google.com/p/chromium/issues/detail?id=42396 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12090 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4418.
CVE ID: CVE-2008-4418 Date Updated: 2024-08-07T10:17:09.997Z Date Published: 2008-12-11T15:00:00 Description: Unspecified vulnerability in DCE in HP HP-UX B.11.11, B.11.23, and B.11.31 allows remote attackers to cause a denial of service via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://securitytracker.com/id?1021377 - http://www.vupen.com/english/advisories/2008/3411 - http://securityreason.com/securityalert/4705 - http://marc.info/?l=bugtraq&m=122893704624601&w=2 - http://osvdb.org/50679 - http://marc.info/?l=bugtraq&m=122893704624601&w=2 - http://www.securityfocus.com/bid/32754 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-24393.
CVE ID: CVE-2024-24393 Date Updated: 2024-08-01T23:19:52.389Z Date Published: 2024-02-08T00:00:00 Description: File Upload vulnerability index.php in Pichome v.1.1.01 allows a remote attacker to execute arbitrary code via crafted POST request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/zyx0814/Pichome/issues/24 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5167.
CVE ID: CVE-2019-5167 Date Updated: 2024-08-04T19:47:56.596Z Date Published: 2020-03-10T22:25:48 Description: An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). At 0x1e3f0 the extracted dns value from the xml file is used as an argument to /etc/config-tools/edit_dns_server %s dns-server-nr=%d dns-server-name=<contents of dns node> using sprintf(). This command is later executed via a call to system(). This is done in a loop and there is no limit to how many dns entries will be parsed from the xml file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-1000109.
CVE ID: CVE-2016-1000109 Date Updated: 2024-08-06T03:55:26.447Z Date Published: 2020-02-19T12:38:56 Description: HHVM does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. This issue affects HHVM versions prior to 3.9.6, all versions between 3.10.0 and 3.12.4 (inclusive), and all versions between 3.13.0 and 3.14.2 (inclusive). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://httpoxy.org/ - https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25 - https://www.facebook.com/security/advisories/cve-2016-1000109 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10609.
CVE ID: CVE-2016-10609 Date Updated: 2024-09-16T16:43:23.996Z Date Published: 2018-06-01T18:00:00Z Description: chromedriver126 is chromedriver version 1.26 for linux OS. chromedriver126 downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nodesecurity.io/advisories/203 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-2006.
CVE ID: CVE-2020-2006 Date Updated: 2024-09-16T16:57:44.922Z Date Published: 2020-05-13T19:07:14.307575Z Description: A stack-based buffer overflow vulnerability in the management server component of PAN-OS that allows an authenticated user to potentially execute arbitrary code with root privileges. This issue affects: All versions of PAN-OS 7.1 and 8.0; PAN-OS 8.1 versions earlier than 8.1.14. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.paloaltonetworks.com/CVE-2020-2006 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1972.
CVE ID: CVE-2023-1972 Date Updated: 2024-08-02T06:05:27.088Z Date Published: 2023-05-17T00:00:00 Description: A potential heap based buffer overflow was found in _bfd_elf_slurp_version_tables() in bfd/elf.c. This may lead to loss of availability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=2185646 - https://sourceware.org/bugzilla/show_bug.cgi?id=30285 - https://security.gentoo.org/glsa/202309-15 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0844.
CVE ID: CVE-2020-0844 Date Updated: 2024-08-04T06:18:02.963Z Date Published: 2020-03-12T15:48:37 Description: An elevation of privilege vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations, aka 'Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0844 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3392.
CVE ID: CVE-2013-3392 Date Updated: 2024-09-16T23:55:53.485Z Date Published: 2013-06-21T21:00:00Z Description: Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco WebEx Social allow remote attackers to hijack the authentication of arbitrary users via unspecified vectors, aka Bug IDs CSCuh10405 and CSCuh10355. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3392 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32835.
CVE ID: CVE-2021-32835 Date Updated: 2024-08-03T23:33:56.105Z Date Published: 2021-09-09T01:50:11 Description: Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC). In Keti a sandbox escape vulnerability may lead to post-authentication Remote Code execution. This vulnerability is known to exist in the latest commit at the time of writing this CVE (commit a1c8dbe). For more details see the referenced GHSL-2021-063. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2941.
CVE ID: CVE-2022-2941 Date Updated: 2024-08-03T00:53:00.461Z Date Published: 2022-09-06T17:19:00 Description: The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in versions up to, and including 2.88.0. This is due to the fact that all fields in the "Naming Conventions" section do not properly sanitize user input, nor escape it on output. This makes it possible for authenticated attackers, with administrative privileges, to inject JavaScript code into the setting that will execute whenever a user accesses the injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/5c4fb14c-de6d-4247-8f83-050f1350f6a2?source=cve - https://github.com/lesterchan/wp-useronline/commit/59c76b20e4e27489f93dee4ef1254d6204e08b3c - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2770235%40wp-useronline&new=2770235%40wp-useronline&sfp_email=&sfph_mail= - https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2941 - https://packetstormsecurity.com/files/168479/wpuseronline2880-xss.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15841.
CVE ID: CVE-2019-15841 Date Updated: 2024-08-05T00:56:22.455Z Date Published: 2019-08-30T16:16:57 Description: The facebook-for-woocommerce plugin before 1.9.15 for WordPress has CSRF via ajax_woo_infobanner_post_click, ajax_woo_infobanner_post_xout, or ajax_fb_toggle_visibility. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wordpress.org/plugins/facebook-for-woocommerce/#developers No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4000.
CVE ID: CVE-2012-4000 Date Updated: 2024-08-06T20:21:04.079Z Date Published: 2012-07-12T21:00:00 Description: Cross-site scripting (XSS) vulnerability in the print_textinputs_var function in editor/dialog/fck_spellerpages/spellerpages/server-scripts/spellchecker.php in FCKeditor 2.6.7 and earlier allows remote attackers to inject arbitrary web script or HTML via textinputs array parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2012/dsa-2522 - http://secunia.com/advisories/49606 - http://disse.cting.org/blog/2012/06/22/fckeditor-reflected-xss-vulnerability/ - https://exchange.xforce.ibmcloud.com/vulnerabilities/76604 - http://www.securityfocus.com/bid/54188 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15825.
CVE ID: CVE-2020-15825 Date Updated: 2024-08-04T13:30:21.840Z Date Published: 2020-08-08T20:39:03 Description: In JetBrains TeamCity before 2020.1, users with the Modify Group permission can elevate other users' privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.jetbrains.com - https://blog.jetbrains.com/blog/2020/08/06/jetbrains-security-bulletin-q2-2020/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18181.
CVE ID: CVE-2018-18181 Date Updated: 2023-02-27T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0241.
CVE ID: CVE-2016-0241 Date Updated: 2024-08-05T22:15:23.230Z Date Published: 2016-10-22T01:00:00 Description: IBM Security Guardium Database Activity Monitor 8.2 before p310, 9.x through 9.5 before p700, and 10.x through 10.1 before p100 allows remote authenticated users to spoof administrator accounts by sending a modified login request over HTTP. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/93828 - http://www-01.ibm.com/support/docview.wss?uid=swg21990219 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2018-10657
CVE-CVE-2018-10657 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1574.001: DLL Search Order Hijacking. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2018 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2020-2265.
CVE ID: CVE-2020-2265 Date Updated: 2024-08-04T07:01:41.215Z Date Published: 2020-09-16T13:20:44 Description: Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not escape the method information in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin's post-build step. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1913 - http://www.openwall.com/lists/oss-security/2020/09/16/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5502.
CVE ID: CVE-2024-5502 Date Updated: 2024-08-26T16:34:21.951Z Date Published: 2024-08-23T08:29:41.176Z Description: The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Accordion, Dual Heading, and Vertical Timeline widgets in all versions up to, and including, 2.4.30 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/921616e4-2b66-4847-869a-90c1c459685f?source=cve - https://plugins.trac.wordpress.org/browser/piotnet-addons-for-elementor/trunk/widgets/pafe-image-accordion.php#L627 - https://plugins.trac.wordpress.org/browser/piotnet-addons-for-elementor/trunk/widgets/pafe-dual-color-headline.php#L392 - https://plugins.trac.wordpress.org/browser/piotnet-addons-for-elementor/trunk/widgets/pafe-vertical-timeline.php#L622 - https://plugins.trac.wordpress.org/changeset/3138599/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-47318.
CVE ID: CVE-2022-47318 Date Updated: 2024-08-03T14:47:29.527Z Date Published: 2023-01-17T00:00:00 Description: ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ruby-git/ruby-git - https://github.com/ruby-git/ruby-git/pull/602 - https://jvn.jp/en/jp/JVN16765254/index.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KPFLSZPUM7APWVBRM5DCAY5OUVQBF4K/ - https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.